Definition

Network Segmentation

Dividing a network into separate zones to contain threats and limit the blast radius of a breach. A foundational security control in healthcare and manufacturing where devices cannot be patched.

What is Network Segmentation?

Dividing a network into separate zones to contain threats and limit the blast radius of a breach. A foundational security control in healthcare and manufacturing where devices cannot be patched.

Network segmentation divides a flat network into isolated zones, limiting an attacker's ability to move laterally after gaining initial access. It is widely recognized as one of the highest-impact security controls available, and it is mandated or strongly recommended by virtually every major security framework including NIST CSF, ISA/IEC 62443, and CISA's OT security guidelines.

Despite its importance, segmentation is one of the most difficult controls to implement well at scale. Legacy environments were built as flat networks, and retrofitting segmentation without disrupting operations requires deep knowledge of what every device communicates with and why. Incorrect segmentation policies that block legitimate device-to-device communication can shut down production lines, silence medical alarms, or break building management systems.

The key to successful segmentation is starting from observed behavior rather than theoretical policy. Monitoring device communication for weeks or months to understand actual traffic flows — before any enforcement — allows organizations to build segmentation policies that restrict only unauthorized paths without disrupting legitimate operations. This "allow-list by behavior" approach is far more reliable than manually authored rules.

Key Facts

  • CISA identifies network segmentation as the single most effective control for limiting OT breach impact
  • 89% of manufacturing companies report incomplete or no segmentation between IT and OT networks
  • Proper IT/OT segmentation could have prevented the majority of high-profile ICS attacks of the past decade
  • Microsegmentation at the device type level reduces lateral movement risk by over 90% compared to flat networks

How ORDR Addresses Network Segmentation

ORDR automatically generates segmentation policies based on observed device communication patterns, then pushes them to enforcement points including firewalls, NAC systems, and SDN controllers. Policies are defined at the device type level — not just the VLAN level — so enforcement is granular and accurate. ORDR continuously monitors for policy drift and alerts when devices attempt communications outside their permitted profile.

See ORDR in action

Frequently Asked Questions

Complete visibility across your entire attack surface.

ORDR unifies IT, IoT, and OT asset intelligence so your team can see—and act on—what matters most.