TrueFort Listed as a Sample Vendor in 2022 Gartner Hype Cycle for Enterprise Networking

TrueFort-Listed-as-a-Sample-Vendor-in-2022-Gartner®-Hype-Cycle™-for-Enterprise-Networking

Growing Interest Confirmed in Using Application and Service Identities as the Foundation for Adaptive Application Segmentation

TrueFort, the real-time workload protection company, announced it has been recognized as a “Sample Vendor” in the 2022 Gartner Hype Cycle for Enterprise Networking report. Gartner has listed TrueFort in the Microsegmentation category.

According to Gartner, “Microsegmentation can reduce the risk and impact of cyberattacks. It is a form of zero-trust networking that controls the access between workloads and is used to limit lateral movement, if and when an attacker breaches the enterprise network. Microsegmentation also enables enterprises to enforce consistent segmentation policies across on-premises and cloud-based workloads, including workloads that host containers.”

Read More: Firefly Announces The Hiring Of Industry Veteran Anne Kolbo

“Some microsegmentation products provide rich application communication mapping, allowing data center teams to identify which communication paths are valid and secure.” Gartner recommends, “do not use IP addresses or network location as the foundation for east-west segmentation policies. Use the identities of applications, workloads and services —either via logical tags, labels, fingerprints or stronger identity mechanisms.”

“TrueFort enables customers to protect application runtime environments both on-premises and in the cloud by monitoring their behaviors to detect and prevent unauthorized activity associated with ransomware, lateral attacks, and data exfiltration,” said Sameer Malhotra, CEO of TrueFort. “We are pleased and consider that this report is highlighting the value of using host-based microsegmentation for applications, workloads, and services over network-based approaches to policy enforcement.”

Read More: SalesTechStar Interview with Mark Simon, Vice President, Strategy at Celigo

TrueFort features an integrated set of security controls that use workload behavioral baselining to instantly respond to compromise, segment workloads from critical data, spot abusive account usage and enforce optimal system configurations. These controls include:

Cloud Workload Protection. TrueFort protects workloads from compromise by dynamically adapting to unusual activity to maintain protection across cloud, hybrid, virtual, containers and traditional on-premises environments.

Microsegmentation. Where other solutions require manual IP address rules management, TrueFort makes workload isolation and ring-fencing possible through an application-centric baseline of expected activity to block the unknown and unapproved.

Write in to psen@itechseries.com to learn more about our exclusive editorial packages and programs.