Network security: Isolation vs separation

Isolation: Separating Malware from the Network, Not Devices

Cover

In the aftermath of the massive patient record breach at SingHealth, Singapore’s largest group of healthcare institutions, organizations around the world have been working to protect their networks by disconnecting endpoint devices, commonly known as network separation.

However popular, network security can provide a false sense of security. In this white paper, go in-depth into isolation and network separation in order to answer:

  • What goes into network separation?
  • Who uses network separation?
  • What is isolation and how does it differ from separation?
Vendor:
Menlo Security
Posted:
26 Nov 2019
Published:
26 Nov 2019
Format:
PDF
Length:
7 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!