<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2849132&amp;fmt=gif">

Microsegmentation Guide


Types of Microsegmentation: 5 Approaches to Granular Network Security

Microsegmentation comes in five primary types: agent-based, agentless, identity-based, network-based, and host-based. Each approach enforces granular security policies at different layers of the infrastructure, and the right choice depends on your environment, your device mix, and how much operational overhead your team can absorb. Understanding the differences between these types of microsegmentation is not academic. It is the difference between a deployment that actually works in production and one that stalls in a proof of concept.

Choosing the Right Approach

Five distinct approaches to microsegmentation exist, each with different deployment models, infrastructure requirements, and trade-offs. Choosing the wrong type wastes budget and leaves gaps. Agent-based, agentless, identity-based, network-based, and host-based microsegmentation each solve different problems. Understanding the strengths and limitations of each approach is the first step to securing your environment.

Network engineer sketching microsegmentation architecture diagrams on whiteboard

Compare All 5 Microsegmentation Types

From agent-based to identity-based, each microsegmentation approach has distinct trade-offs. Find the right fit for your environment.
5 approaches to microsegmentation: agent-based, agentless, identity-based, network-based, host-based
5 approaches to microsegmentation: agent-based, agentless, identity-based, network-based, host-based

Industry Insight


"The most effective microsegmentation deployments use identity-based approaches that work without agents and without network redesign."

Gartner,
Market Guide for Microsegmentation, 2025

The Numbers

Choosing the wrong microsegmentation approach wastes budget and delays security outcomes. Understanding the five types helps you match the right technology to your environment and operational constraints.

5

Distinct microsegmentation approaches to evaluate

70%

Of agent-based projects stall due to deployment complexity

3x

Faster deployment with agentless vs agent-based approaches

25%

Of large enterprises using microsegmentation by 2026 (Gartner)

Approach


Why the Type of Microsegmentation You Choose Matters

Not all microsegmentation is created equal. I have seen organizations invest months deploying an agent-based solution only to realize that 40% of their devices (IoT sensors, medical equipment, industrial PLCs) cannot run agents. That is not a minor gap. That is the attack surface your adversary is going to find.

The type of microsegmentation you select determines three things:

Down_arrow
challenge-solution_icon

Approach


1. Agent-Based Microsegmentation

Agent-based microsegmentation installs lightweight software agents directly on endpoints (servers, virtual machines, workstations, and containers). These agents hook into the operating system's networking stack, often using mechanisms like Windows Filtering Platform or kernel-level APIs, to monitor process-to-process communication and enforce policy in real time.

Approach


2. Agentless Microsegmentation

Agentless microsegmentation enforces segmentation policies through the network infrastructure itself, without installing software on endpoints. Instead of deploying agents on every device, agentless solutions use existing switches, routers, or cloud-native APIs as enforcement points.

Down_arrow
challenge-solution_icon

Approach


3. Identity-Based Microsegmentation

Identity-based microsegmentation represents the most significant evolution in how segmentation policies are defined and enforced. Rather than relying on IP addresses, VLANs, or static firewall rules, identity-based approaches use contextual attributes (device type, user role, device posture, business function, location) to determine what each asset can communicate with.

Approach


4. Network-Based Microsegmentation

Network-based microsegmentation uses traditional networking constructs (VLANs, subnets, ACLs, and firewall rules) to create segmented zones within the network. It is the approach most familiar to network engineers and the one that most organizations already have some version of in place.

Down_arrow
challenge-solution_icon

Approach


5. Host-Based Microsegmentation

Host-based microsegmentation uses the built-in firewall capabilities of operating systems (iptables/nftables on Linux, Windows Firewall, macOS pf) to enforce segmentation policies directly on individual endpoints. It is microsegmentation without deploying third-party agents, instead leveraging what the OS already provides.

Get_Start_Eyebrow

Stop East-West Attacks, Microsegment Your Networks

Learn why and how large enterprises are reducing risks and accelerating their Zero Trust maturity with Elisity. 
Learn More

Resources


Elisity Microsegmentation: Accelerate Zero Trust Security in Weeks, Not Years

Download and discover a leap forward in network segmentation architecture.

Types of Microsegmentation FAQ

Get answers to common questions about the different approaches to microsegmentation and how to select the right type for your organization.
What are the main types of microsegmentation?

The five main types of microsegmentation are agent-based, agentless, identity-based, network-based, and host-based. Each approach differs in how policies are enforced, where visibility is gathered, and what operational overhead is required. Agent-based installs software on endpoints for process-level visibility. Agentless uses network infrastructure as the enforcement point. Identity-based uses contextual attributes like device type and user role instead of IP addresses. Network-based uses traditional VLANs, ACLs, and firewalls. Host-based uses OS-native firewalls. Many organizations deploy a combination of these approaches to cover different parts of their environment.

What is the difference between agent-based and agentless microsegmentation?

Agent-based microsegmentation installs software on each endpoint to monitor and enforce policy at the host level, providing deep process-level visibility but requiring deployment and maintenance on every device. Agentless microsegmentation enforces policy through network infrastructure such as switches and routers, or through cloud-native APIs, without touching endpoints. The practical implication is that agentless approaches deploy faster and work with devices that cannot run agents, like IoT and OT equipment, while agent-based approaches provide deeper visibility on devices that support them.

Which type of microsegmentation is best for IoT and OT environments?

Agentless and identity-based microsegmentation are the most practical choices for IoT and OT environments. These devices typically run proprietary or embedded operating systems that cannot support third-party software agents. Identity-based approaches are particularly effective because they classify devices by what they are (an infusion pump, a PLC, a security camera) and enforce policy based on that identity, regardless of IP address or network location. This is critical in environments with thousands of diverse device types that change IP addresses frequently.

How does identity-based microsegmentation differ from network-based microsegmentation?

Network-based microsegmentation relies on IP addresses, VLANs, and firewall rules to control traffic between segments. Identity-based microsegmentation uses contextual attributes such as device identity, user role, device posture, and business function to determine access. The key advantage of identity-based approaches is that policies follow the asset regardless of where it connects on the network, eliminating the brittleness of IP-dependent rules that break every time the network changes.

Can you combine multiple types of microsegmentation?

Yes, and many organizations do. A common hybrid approach uses identity-based, agentless microsegmentation as the primary platform for comprehensive coverage across all device types, then layers agent-based microsegmentation on critical servers where process-level visibility adds value. Host-based firewall rules can serve as an additional defense-in-depth layer on managed endpoints. Gartner projects that organizations using multiple microsegmentation strategies will grow from under 5% to 25% by 2027.

What is host-based microsegmentation?

Host-based microsegmentation uses built-in operating system firewalls (iptables on Linux, Windows Firewall, macOS pf) to enforce segmentation policies directly on individual hosts. While it leverages existing OS capabilities without additional software licensing costs, it requires managing firewall rules across potentially thousands of endpoints and does not work with devices that lack configurable host firewalls, like IoT sensors, OT controllers, and legacy embedded systems.

Back to top

Ready to Implement the Right Microsegmentation Approach?​

Elisity delivers identity-based microsegmentation that works on your existing infrastructure. No agents, no network redesign.
Elisity_White