We're Hiring!
Take the next step in your career and work on diverse technology projects with cross-functional teams.
LEARN MORE
Mountain West Farm Bureau Insurance
office workers empowered by business technology solutions
BLOG
6
14
2016

Network Microsegmentation Could be the Software Defined Answer to Security

Last updated:
9.16.2020
No items found.

According to a recent study by Emerson, cybercrime is the fastest growing cause of data center outages. To stay ahead of increasingly sophisticated attacks, infrastructure managers must combine software and hardware tools to constantly monitor, recognize, block, and remediate. Keeping an eye on network traffic is essential to accomplish this, and one developing method of network security control uses microsegmentation to do so.

Network microsegmentation is enabled by software-defined data center technology like VMware NSX. It gives network administrators new abilities to shape network traffic based on global policy, increasing security by crafting security policies around specific network segments or virtual machines.

 

Designing Microsegmentation Security Rules

network microsegmentation

Using the NSX firewall features, you can create a security group around any vCenter object: virtual machines, vNICs, or even vApps. These groups can allow traffic between any other allowed objects, or only allow outside traffic to specific object. For example, you can allow traffic between virtual network cards on a production application server and your company’s web server.

In order to take advantage of microsegmentation, you first need to have a solid grasp on your infrastructure’s network traffic, both from within and outside the data center. Using network scanning tools, map out workloads with overlapping network traits like the same subnet.

Design your microsegmentation security rules based on the descriptions you come with while mapping. For every virtual machine and/or virtual data center component like a vNIC, consider:

Workloads can now dynamically inherit specific security rules based on their categorization. These policies are applied when a VM is turned on or migrated and turned off when it is powered down. This saves network administrators time as they don’t need to reconfigure firewall rules with every VM. NSX policies can use the VM name, virtual network assignment, operating system, or many other VM settings in order to assign security rules.

The rules themselves are not necessarily tied to NSX and VMware tools like the built in ESXi firewall. Your existing vendor products can also be integrated with security tags so they can share their own information across an entire ecosystem. If you have Trend Micro cloud security, for example, your security rule can turn on strict anti-malware that isolates a VM from all network traffic when an infection is detected by Trend Micro’s IDS.

 

Network microsegmentation is a great solution for managing secure network traffic within your virtualized datacenter, to isolate multiple networks depending on their data security requirements, and for simplifying complex access policies, such as when dealing with virtual desktop administration.

Recent Blog Posts

lunavi logo alternate white and yellow
3.13.2025
3
.
12
.
2025
Unlocking the Power of Azure Managed Services with Lunavi

Cloud computing has become the backbone of modern business, offering agility, scalability, and cost efficiency. But managing cloud environments while keeping costs under control and security airtight? That’s a challenge. Azure Managed Services streamline cloud operations, helping businesses optimize spending, enhance security, and future-proof applications. Lunavi provides the expertise and tools to make it happen—so you can focus on growth instead of IT headaches.

Learn more
lunavi logo alternate white and yellow
2.11.2025
2
.
7
.
2025
The Future of Test Automation: Key Trends Shaping 2025 and Beyond

Software testing has gone from a chore to a game-changer, thanks to automation. But in 2025, sticking to old methods means falling behind. Stay ahead by embracing the future of test automation—let’s explore the key trends shaping what’s next.

Learn more
lunavi logo alternate white and yellow
2.11.2025
1
.
23
.
2025
The Importance of Cross Browser Testing

Making sure users have a smooth experience across all these platforms is crucial for businesses to stay competitive. Cross-browser testing is now a key part of modern development. It helps teams find and fix problems like layout issues, broken features, or slow performance before users are affected. Let’s look at why cross-browser testing matters and explore tools that make it easier to get the job done.

Learn more