Skip to content
.ca
Work being done in the backend.
2 minlow

Akamai Leads the Way: 2026 GigaOm Radar for Microsegmentation

This informational article highlights Akamai's recognition in the 2026 GigaOm Radar for Microsegmentation report. It emphasizes the strategic importance of microsegmentation and Zero Trust architectures in modern enterprise environments to contain breaches and prevent lateral movement.

Conf:lowAnalyzed:2026-03-25reports

Source:Akamai

Key Takeaways

  • Akamai Guardicore Segmentation was recognized as a Leader and Fast Mover in the 2026 GigaOm Radar for Microsegmentation.
  • Modern security requires an 'assume breach' mindset, prioritizing the containment of attacks to prevent enterprise-wide incidents.
  • Microsegmentation is a critical control for restricting unnecessary east-west communication and limiting lateral movement.
  • Effective microsegmentation relies on deep visibility into application communication at the process level to safely enforce Zero Trust policies.

Affected Systems

  • Enterprise networks
  • Hybrid infrastructure

Attack Chain

N/A. This article is a vendor announcement regarding an industry analyst report on microsegmentation and does not detail a specific attack chain or threat actor campaign.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

No detection rules or queries are provided in this informational marketing article.

Detection Engineering Assessment

EDR Visibility: None — The article discusses high-level network segmentation concepts and does not provide specific endpoint threat indicators. Network Visibility: None — No specific malicious network indicators or traffic patterns are detailed. Detection Difficulty: N/A — This is an informational post about a security product and industry report, not a threat intelligence report.

Required Log Sources

  • Network flow logs
  • Firewall logs

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Adversaries who have bypassed perimeter defenses will attempt unauthorized east-west lateral movement between internal applications or network segments.Network flow logs, internal firewall deny logs, process-level network connectionsLateral MovementHigh

Control Gaps

  • Lack of east-west traffic visibility
  • Inadequate internal network segmentation
  • Overly permissive internal access controls

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • N/A

Infrastructure Hardening

  • Implement microsegmentation to restrict unnecessary east-west communication and limit lateral movement opportunities.
  • Adopt Zero Trust architectures to enforce least-privilege communication among internal systems.
  • Map application dependencies to design and validate network policies safely without disrupting business operations.

User Protection

  • N/A

Security Awareness

  • Adopt an 'assume breach' mindset across the security organization to focus on rapid containment of intrusions.

MITRE ATT&CK Mapping

  • T1021 - Remote Services