• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Network Security Microsegmentation

Network Security Microsegmentation Reviews and Ratings

What is Network Security Microsegmentation?

Gartner defines network security microsegmentation — also referred to as zero-trust network segmentation — as an effort that can create more granular and dynamic access policies than traditional network segmentation (often north-south traffic segmentation). It allows the insertion of a security policy between any two workloads in the same broadcast domain — with microsegmentation technologies narrowing fine-grained network zones down to individual assets and applications. Microsegmentation tools support the implementation of finer-grained zoning across public, private and hybrid cloud infrastructures. Cybersecurity leaders must understand the key features, use cases, and role of microsegmentation in their environment, as well as determine which model is the best fit for their needs.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Zero Networks Segment
Zero Networks Segment
Logo of Xshield Enterprise Microsegmentation Platform
Xshield Enterprise Microsegmentation Platform
Logo of Amazon Virtual Private Cloud
Amazon Virtual Private Cloud
For 50M-1B USD Companies
Logo of Zero Trust Segmentation Platform
Zero Trust Segmentation Platform
Logo of Zero Networks Segment
Zero Networks Segment
Logo of Akamai Guardicore Segmentation
Akamai Guardicore Segmentation
For North America
Logo of Zero Networks Segment
Zero Networks Segment
Logo of Zero Trust Segmentation Platform
Zero Trust Segmentation Platform
Logo of Xshield Enterprise Microsegmentation Platform
Xshield Enterprise Microsegmentation Platform
Integration & Deployment
Logo of Zero Networks Segment
Zero Networks Segment
Logo of Xshield Enterprise Microsegmentation Platform
Xshield Enterprise Microsegmentation Platform
Logo of Amazon Virtual Private Cloud
Amazon Virtual Private Cloud

Product Listings

Filter by

Products 1 - 20 of 33
Sort by
Logo of Akamai Guardicore Segmentation

Akamai Guardicore Segmentation

By Akamai

4.8
(211 Ratings)
customers choice 2026

Akamai Guardicore Segmentation is a security solution designed to protect organizations against ransomware and advanced threats with microsegmentation controls. It enables granular segmentation of network traffic within data centers, clouds, and hybrid environments, making lateral movement for attackers much more difficult. Akamai Guardicore provides deep visibility into application flows and user activity, allowing for rapid detection and containment of breaches. Its agent and agentless-based approaches support diverse IT environments-from virtual machines to legacy tech to containers-offering flexible policy creation and enforcement. Businesses use Akamai Guardicore to minimize attack surfaces for critical applications, streamline compliance with regulatory standards, and reduce the risk of downtime due to cyber incidents. The platform integrates easily with existing security stacks, delivering actionable insights and control over complex, distributed infrastructures.

Show More Details
Logo of Zero Trust Segmentation Platform

Zero Trust Segmentation Platform

By Illumio

4.8
(169 Ratings)
customers choice 2026

Illumio specializes in ransomware and breach containment, redefining how organizations contain cyberattacks and enable operational resilience. Powered by the Illumio AI Security Graph, our breach containment platform identifies and contains threats across hybrid multi-cloud environments – stopping the spread of attacks before they become disasters. Illumio enables Zero Trust, strengthening cyber resilience for the infrastructure utilizing microsegmentation, systems, and organizations.

Show More Details
Logo of Microsoft Azure

Microsoft Azure

By Microsoft

4.5
(69 Ratings)

Microsoft Azure is a cloud computing software that offers a range of services including virtual machines, databases, networking, storage, artificial intelligence, and analytics. The software enables organizations to build, deploy, and manage applications across a global network of data centers. It allows users to scale resources as required and supports multiple operating systems and development frameworks. Azure provides tools for security, compliance, and disaster recovery to help address business continuity challenges. It is designed to support workloads from simple web hosting to complex data analysis, allowing businesses to optimize infrastructure management and operational efficiency.

Show More Details
Logo of Xshield Enterprise Microsegmentation Platform

Xshield Enterprise Microsegmentation Platform

By ColorTokens

4.8
(49 Ratings)

Xshield Enterprise Microsegmentation Platform is a software designed to provide security and control within enterprise networks by segmenting application workloads and data center environments. The software uses microsegmentation to isolate applications, monitor traffic flows, and apply granular security policies to minimize lateral movement of threats. It enables visibility into network assets and supports policy creation without altering underlying infrastructure. The software helps organizations address the business problem of internal threat containment, compliance enforcement, and reducing attack surfaces by creating secure zones that limit unauthorized access and movement within the network.

Show More Details
Logo of AlgoSec Horizon

AlgoSec Horizon

By AlgoSec

4.5
(48 Ratings)

AlgoSec Horizon is a software that provides proactive security risk visualization and analysis for hybrid network environments. The software enables organizations to identify network vulnerabilities by correlating network connectivity with relevant security policies and configurations. It offers features for continuously monitoring network access paths, simulating potential risks, and highlighting exposure to security threats based on policy misconfigurations and connectivity gaps. AlgoSec Horizon supports businesses in identifying risk across on-premises and cloud networks to support compliance initiatives and reduce the likelihood of security incidents. The software aims to improve network security posture by delivering actionable insights into how policies and connectivity impact risk surface throughout complex environments.

Show More Details
Logo of Zero Networks Segment

Zero Networks Segment

By Zero Networks

5
(37 Ratings)

Zero Networks Segment is a network security software designed to automate microsegmentation and least privilege access control for enterprise environments. The software enables organizations to restrict lateral movement within their networks by dynamically enforcing firewall policies and access rules based on validated identity and activity. Zero Networks Segment utilizes machine learning to map network connections, recommend segmentation policies, and continuously monitor for unauthorized access attempts. The software aims to address the business challenge of securing internal network resources and preventing the spread of threats by minimizing unnecessary connectivity between devices and users. It integrates with existing network infrastructures and provides centralized management for policy enforcement, helping organizations achieve granular network segmentation without manual intervention.

Show More Details
Logo of Cisco Secure Workload

Cisco Secure Workload

By Cisco Systems

4.5
(34 Ratings)

Secure Workload tackles tasks that are beyond human scale. An open platform, it provides comprehensive visibility into every workload application flow, so you know what your applications are doing and their behavioral interaction with users and devices. AI/ML-powered automation generates best-practice policy recommendations that are tailored to your environment and applications. Secure Workload strengthens your security posture, reduces risk, and decreases costs associated with application downtime at every step in your journey. And with microsegmentation in place, it eases the path for compliance initiatives and easily supports the onboarding of new applications and processes.

Show More Details
Logo of Google Cloud Platform

Google Cloud Platform

By Google

4.5
(34 Ratings)

Google Cloud Platform is a software that offers a suite of cloud computing services, including infrastructure as a service, platform as a service, and serverless computing environments. It provides tools for computing, storage, networking, data analytics, artificial intelligence, and machine learning. The software supports the deployment and scaling of applications and services on a highly available and secure global infrastructure. It enables organizations to manage workloads, develop and run applications, and analyze large volumes of data to address business challenges such as resource optimization, faster time-to-market, and scalability for enterprise and developer needs.

Show More Details
Logo of Amazon Virtual Private Cloud

Amazon Virtual Private Cloud

By Amazon Web Services (AWS)

4.6
(30 Ratings)

Amazon Virtual Private Cloud is a software that enables users to provision a logically isolated section of the Amazon Web Services cloud where they can launch AWS resources within a virtual network defined by the user. This software provides control over the virtual networking environment, including selection of IP address range, creation of subnets, and configuration of route tables and network gateways. It facilitates secure and scalable hosting of resources and allows customization of network configuration. Amazon Virtual Private Cloud solves the business problem of securely connecting resources while enabling isolation, segmentation, and management within a cloud infrastructure.

Show More Details
Logo of Cisco ACI

Cisco ACI

By Cisco Systems

4.8
(25 Ratings)

Cisco Application Centric Infrastructure (ACI) is a software-driven solution designed for data center networking and automation. The software provides centralized policy-based management, automation of network services, and support for multi-cloud environments. Cisco ACI enables integration of physical and virtual network elements, facilitating application agility and scalability. It addresses business challenges related to network performance, security segmentation, and resource optimization by allowing organizations to streamline operations and maintain consistent policies across various infrastructure components. The software includes features for monitoring, troubleshooting, and advanced analytics to assist with efficient network provisioning and maintenance.

Show More Details
Logo of Zscaler Zero Trust SASE

Zscaler Zero Trust SASE

By Zscaler

4.5
(17 Ratings)

Zscaler Zero Trust SASE is a software designed to provide secure access to applications and data across distributed environments by integrating secure access service edge (SASE) capabilities with a zero trust security model. The software offers features such as secure web gateway, cloud firewall, zero trust network access, and cloud data protection to address risks associated with remote work, cloud adoption, and unmanaged devices. Zscaler Zero Trust SASE enables organizations to authenticate users and devices, apply granular access controls, and monitor network traffic without backhauling data through traditional data centers. This software helps businesses reduce the attack surface, enforce policy compliance, and enhance visibility into application usage and user activity across networks, supporting organizations in managing security challenges in hybrid and multi-cloud environments.

Show More Details
Logo of Tufin Orchestration Suite

Tufin Orchestration Suite

By Tufin

4.1
(12 Ratings)

Tufin Orchestration Suite is a software that focuses on network security policy management for enterprise IT environments. The software enables organizations to automate and manage security policies across hybrid networks, including on-premises, cloud, and software-defined infrastructures. Tufin Orchestration Suite provides visibility into network topology, allowing users to design, review, and enforce security policies while ensuring compliance with regulatory requirements. The software supports rule change automation and risk analysis to reduce manual effort and minimize errors associated with configuration changes. It aims to address challenges related to complex network environments and policy controls by centralizing policy management, improving auditing capabilities, and streamlining processes for change management and policy enforcement.

Show More Details
Logo of VMware NSX Distributed Firewall

VMware NSX Distributed Firewall

By Broadcom (VMware)

4.3
(11 Ratings)
Show More Details
Logo of Cisco Multicloud Defense

Cisco Multicloud Defense

By Cisco Systems

4.6
(7 Ratings)

Cisco Multicloud Defense is a software designed to provide security and visibility for applications and workloads operating across multiple cloud environments. The software offers features such as threat detection, automated policy enforcement, secure connectivity, and centralized management for cloud-native and hybrid deployments. It helps organizations manage risks by integrating with various cloud service providers and delivering consistent security controls. Cisco Multicloud Defense supports scalability and compliance objectives by enabling rapid response to emerging threats and simplifying security operations through integrated monitoring and analytics. The software addresses the challenges of protecting distributed resources in dynamic multicloud infrastructures.

Show More Details
Logo of Elisity Identity-based Microsegmentation

Elisity Identity-based Microsegmentation

By Elisity

5
(7 Ratings)

Elisity Identity-based Microsegmentation is a software solution designed to enhance network security by segmenting access based on identity, context, and policy enforcement. The software enables organizations to define granular access controls, reducing lateral movement of potential threats within networks. By leveraging a decentralized approach and integrating with existing infrastructure, Elisity Identity-based Microsegmentation allows enforcement of policies at the identity and asset level, helping address business challenges related to securing hybrid and cloud environments, regulatory compliance, and risk management. The software supports real-time visibility and adaptation to changing network conditions, providing a framework for protecting sensitive resources without reliance on traditional network boundaries.

Show More Details
Logo of Airwall

Airwall

By Tempered

5
(5 Ratings)

Airwall is a software that provides secure network segmentation and micro-segmentation for information technology and operational technology environments. The software creates secure encrypted connections between devices, applications, and users across various types of networks including cloud, on-premises, and hybrid infrastructures. Airwall enables organizations to manage network access, protect communications, and enforce policies without requiring changes to existing network architecture. It is designed to address challenges related to unauthorized access, lateral movement, and data breaches by limiting network exposure and segmenting resources. The software supports management and visibility into network-connected assets, aiming to simplify compliance with cybersecurity frameworks and regulations.

Show More Details
Logo of Firewall Analyzer

Firewall Analyzer

By AlgoSec

4.4
(5 Ratings)

Firewall Analyzer is a software designed to provide organizations with visibility and management capabilities over their network security infrastructure. The software offers functions for monitoring firewall configurations, assessing policy compliance, and analyzing network traffic across multiple firewall vendors. It enables users to review rule usage, detect redundant or risky rules, and generate audit-ready reports to support regulatory requirements. Firewall Analyzer assists in identifying policy violations, change management issues, and security gaps, facilitating the optimization of firewall policies. By consolidating security policy data, the software helps organizations manage risks and maintain a consistent security posture across complex network environments.

Show More Details
Logo of Zscaler OT/IoT Segmentation

Zscaler OT/IoT Segmentation

By Zscaler

4
(4 Ratings)

Zscaler OT/IoT Segmentation is a software designed to provide visibility and security for operational technology and Internet of Things environments by segmenting industrial networks and devices. The software allows organizations to identify OT and IoT assets, analyze network communications, and implement granular segmentation policies to help reduce the attack surface and limit lateral movement within the network. Zscaler OT/IoT Segmentation supports real-time detection of potential threats and enables centralized policy management, assisting businesses in meeting compliance requirements and protecting critical infrastructure from cyber risks. The software integrates with existing security infrastructures to provide continuous monitoring and threat prevention for complex industrial and enterprise environments.

Show More Details
Logo of Forescout 4D Platform

Forescout 4D Platform

By Forescout

4.7
(3 Ratings)

Forescout 4D Platform is a software designed to provide automated security and compliance management for connected devices across enterprise environments. The software enables organizations to discover, assess, and control devices on corporate networks, including managed and unmanaged assets. It integrates with existing security tools to deliver asset visibility, risk assessment, and policy enforcement without requiring device agents or prior knowledge of endpoints. Forescout 4D Platform addresses the business problem of managing device security in complex networks by supporting continuous monitoring, threat detection, and automated orchestration of responses to security incidents, helping organizations maintain regulatory compliance and reduce the risk associated with evolving cybersecurity threats.

Show More Details
Logo of AlgoSec Cloud Enterprise (ACE)

AlgoSec Cloud Enterprise (ACE)

By AlgoSec

4.5
(2 Ratings)

AlgoSec Cloud Enterprise (ACE) is a software designed to manage and automate network security policies across cloud, hybrid, and on-premise environments. The software provides visibility into security policies, application connectivity, and traffic flows, helping organizations streamline firewall management and ensure compliance with regulatory requirements. ACE enables users to analyze risks, simulate changes, and automate policy workflows, which reduces the chances of misconfigurations and security gaps. By unifying security policy management across different platforms, the software addresses the challenge of maintaining consistent security posture in complex and dynamic network infrastructures.

Show More Details

Features of Network Security Microsegmentation

Updated August 2025

Mandatory Features:

  • The ability to deploy in both the virtualized and infrastructure-as-a-service environments

  • Workload isolation, which is isolation from other workloads based on security policy

  • Flow mapping, which is the ability to gather and show north-south and east-west traffic flows and use them in the policy definition (it can present this data in a visual manner)

  • Policy enforcement, including the definition of rules based on different factors such as port number, application traffic type and user identity

Gartner Research

Market Guide for Network Security Microsegmentation
Gartner Peer Insights 'Voice of the Customer': Network Security Microsegmentation

Top Trending Products

Akamai Guardicore SegmentationCisco ACIGoogle Cloud PlatformCisco Secure WorkloadZero Networks SegmentZero Trust Segmentation PlatformQuProtect R3

Popular Product Comparisons

Akamai Guardicore Segmentation vs Zero Trust Segmentation PlatformAkamai Guardicore Segmentation vs Cisco Secure WorkloadZero Networks Segment vs Zero Trust Segmentation PlatformZero Trust Segmentation Platform vs Zscaler Zero Trust SASEAkamai Guardicore Segmentation vs Zero Networks Segment

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.