Tech Guide

How to Buy Inquiry

TiFRONT ZT Micro-segmentation: A Practical Guide for Real-World Application

2025-07-16
게시물 보기

 

 

 

 

■ Check Network Client Operational Status

- Monitor network connectivity and traffic status.
- Acquire client information such as MAC, IP, connected switch port, VLAN, and OS NetBIOS.

 

■ Check Client and Resource Operational Status

- View the topology map of client resource access status.
- Verify all internal and external resources accessed by the client.

* Note: Resources refer to all targets to be protected or accessed.

 

 

 

 

■ Network Asset Registration Methods

- Manual registration by the network administrator.
- User Registration (URL) → Asset Registration (URL) → Network Admin Approval.
- Integration with user authentication solutions & HR databases. 

 

 

 

■ Precise Control of Resource Access by Granular Segment

- Flexibly control accessible resources by user and device.
- Utilize resource TAGs for flexible, batch control. 

 

■ Segment (Client)-Based Precision Control

1) Precision control using real-time client information.
2) Precision control via integration with user authentication solutions & HR databases.

 

 

 

 

■ Topology Map Visualization

Visualize which resources each client is connected to and what communication is occurring at a glance. 

 

 

 

■ Client Abnormal Behavior Detection & Isolation

- TiMatrix: Detect abnormal Scans and Floods (DoS).
- CTI: Monitor access to C&C servers and threat sites.
- vCAT: Advanced blocking of internal worm/virus propagation; Client risk scoring and separation into isolation segments.