LogoThreatmatic
Policies

Apply microsegmentation

Isolate workloads and control host-to-host traffic with quantum-safe microsegmentation

Apply microsegmentation

Threatmatic's quantum-safe microsegmentation lets you divide your network into isolated segments — controlling which hosts can talk to which, and blocking lateral movement from malware or compromised endpoints.

Unlike traditional VLANs or firewall rules, Threatmatic microsegmentation is identity-aware, policy-driven, and enforced at the endpoint level — meaning it works regardless of where hosts are located.

When to use microsegmentation

  • Isolate a compromised or suspected endpoint immediately
  • Separate sensitive workloads (e.g. finance, HR) from general traffic
  • Enforce host-to-host allow-lists in high-security environments
  • Comply with regulations that require network segmentation (PCI-DSS, HIPAA, NIS2)

Steps

Define your segments

Segments are defined by device tags. Plan your segmentation before configuring policies:

SegmentTagAllowed to communicate with
Production serversenv=prodenv=prod, role=devops
Finance workstationsdept=financedept=finance, env=prod
Contractor devicesrole=contractorInternet only
IoT devicestype=iotenv=prod (specific ports only)

Tag your devices

Apply the relevant tags to all enrolled devices. See Use tags and annotations for how to apply tags in bulk.

Create a default-deny policy

Start with a base policy that blocks all host-to-host traffic:

  1. Go to Policies → New Policy
  2. Name it Default Deny - East-West
  3. Scope: All devices
  4. Add rule:
    • Match: All traffic
    • Action: Block
    • Priority: 1000 (lowest priority — evaluated last)
  5. Set mode to Observe initially
  6. Click Save and Apply

Add allow rules for each segment

For each permitted communication path, add a higher-priority Allow rule:

Example — production servers can communicate with each other:

  1. Add a new rule to the policy (or a new policy with higher priority)
  2. Scope: tag: env=prod
  3. Match destination: tag: env=prod
  4. Action: Allow
  5. Priority: 100

Repeat for each permitted path in your segment plan.

Isolate a compromised endpoint

To immediately isolate a device:

  1. Go to Devices and click the device
  2. Click Isolate
  3. The device will be moved to a quarantine segment with no east-west or outbound access (except to the Threatmatic control plane)

Isolation is immediate and takes effect in under 50ms. Confirm you have selected the correct device before proceeding.

Verify segmentation

  1. Go to Policies → Simulation
  2. Enter a source device and destination device
  3. Click Simulate — Threatmatic will show which rules would apply and whether traffic would be allowed or blocked

Quantum-safe encryption

All microsegmented traffic between Threatmatic endpoints is encrypted using quantum-safe algorithms, ensuring that segments remain secure against future cryptographic threats.

No additional configuration is required — quantum-safe encryption is on by default.

Next steps

How is this guide?

Last updated on

On this page