Convequity

Convequity

Share this post

Convequity
Convequity
The Investor Guide To Zero Trust (2/2)

The Investor Guide To Zero Trust (2/2)

A Technical Overview Of Segmentation – The Panacea To Stopping Ransomware

Convequity's avatar
Convequity
Feb 03, 2022
∙ Paid

Share this post

Convequity
Convequity
The Investor Guide To Zero Trust (2/2)
Share

Executive Summary

  • This is part 2 of the Zero Trust report for ATI members only, specifically focusing on east-west segmentation - an emergent and critical component of Zero Trust.

  • Ransomware has become the #1 problem in cybersecurity, and east-west segmentation at the micro level appears to be the missing component that could finally stop it.

  • We'll go through a technical overview of the different types of east-west segmentation to help you as investors get a better understanding of this budding area of cybersecurity.

  • We review the competitor landscape and review where each vendor falls among the different areas of east-west segmentation.

The Need for Segmentation

Ransomware has become the number one problem in cybersecurity. Since the Colonial Pipeline attack in May 2021, to avoid a national law enforcement response, cybercriminals have shifted more focus toward mid-size companies as targets for ransomware. Investments in automated network scanning and the emergence of the RaaS [Ransomware-as-a-Service] model are significant levers in the proliferation of attacks. The highly skilled actors sponsored by nation states or criminal groups, can specialize in malware development and target entry points and then rent out these assets and knowledge to lesser skilled actors to launch the ransomware mission. Such specialization enables far greater scale and provides an additional layer between the criminal groups and law enforcement.

This post is for paid subscribers

Already a paid subscriber? Sign in
© 2025 Convequity
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share