Zero Trust Segmentation

Eliminate lateral movement, even on the LAN with per-device microsegmentation at the network level.

Designed to prevent devices from communicating with each other, ready for when they get compromised.

Whether you're protecting a branch office, an industrial site or a core datacentre, Zero Trust Segmentation gives you hard guarantees on isolation and access without traditional VLANs or complex overlays.

Prevent lateral flow

At its core, Evolving Zero Trust Segmentation embraces and enforces Zero Trust thinking by assuming every device on the LAN is a potential attack vector.

No trusted versus untrusted networks – everything is untrusted.

Zero broadcast domains.  Zero flat LANs.

It applies Zero Trust principles right where traditional segmentation fails – inside the so called "trusted" LAN.

The result is a clean, tight segmentation model that works out-of-the-box and scales easily across branches, sites or embedded environments.

What it does

At its core, Evolving Zero Trust Segmentation:

Assigns every device a /32 IP address

Implements strict, default-deny policies at the EVX gateway

Blocks all lateral east-west traffic by default

Enforces identity- and policy-based exceptions only as needed

Why it's different

Traditional segmentation methods – VLANs, zones, static firewall rules – were not designed for the speed, scale, or complexity of modern access models.

A full NAC system involves huge disruption and integration between all of the LAN hardware.  Zero Trust Segmentation solves that.

Default-deny at layer 3

No IP or MAC-based assumptions.

Plug-and-play

with existing LAN switching, no overlay required, zero compatibility issues.

No inter-device reachability

Unless explicitly authorised by policy.

Up-and-out topology

Enforces zero peer, upstream-only, not outdated hub-and-spoke.

Integrated into Evolving ZERO SDWAN

But can be deployed standalone.

Agentless

No need to install client software.

Banish outdated topologies

Hub-and-spoke and full-mesh are not fit for purpose in a Zero Trust world.

Traditional LAN networking is a free for all.  The hub-and-spoke and full-mesh topology default of "any to any" has left us with significant conceptual debt.

Zero Trust needs a radical rethink of the standard LAN and WAN topologies. One where up-and-out becomes the default, and zero peer the norm.

Part of ZERO SDWAN. Powerful on Its Own.

Zero Trust Segmentation is a standalone service, but it also forms the foundation of ZERO SDWAN. Within the SDWAN context, it allows:

Per-site, per-user, or per-flow dynamic path control

Safe onramp to mesh connectivity, with identity-based segmentation preserved

Segmentation-aware routing decisions (e.g., deny WAN breakout for isolated devices)

Easy to deploy. Hard to breach.

You don’t need to rearchitect your LAN. Drop in an EVX running Zero Trust Segmentation and the following happens automatically:

All devices get isolated by default

No lateral movement between endpoints

Admins can apply exceptions based on policy

Enforcement is transparent and deterministic

From the moment a device receives an IP, it’s ringfenced.

Home