<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2849132&amp;fmt=gif">

RESEARCHED BY

Group 1000002727

90% of Organizations Are Falling Behind on Microsegmentation.

Omdia's 2026 survey of 352 security leaders reveals the real state of microsegmentation — what's stalling programs, what's working, and where your peers stand. Get the independent benchmark report.

Omdia Whitepaper Hero Preview

The State of Microsegmentation

Straight from the people responsible for it
We asked 352 security leaders at 1,000+ employee organizations across healthcare and manufacturing how their microsegmentation programs are actually going. The answers were consistent, and they probably sound familiar. 99% are planning or implementing microsegmentation.
 
Only 9% have more than 80% of their critical systems protected. And nearly half experienced a lateral movement attack in the past year. This report, conducted independently by Omdia, is the clearest peer benchmark available on what's working, what's stalling, and what your counterparts are prioritizing next. If you're evaluating or rebuilding your own program, the data inside will tell you where you stand and what comes next.
 

Comparison

VLAN vs Microsegmentation: How Segmentation Approaches Compare​

Legacy Solutions

 VLAN-Based Segmentation ("Macro-segmentation")  

  • Pro: Simple yet complex. Leverages switches and existing network design.
  • Con: Coarse granularity: All devices in a VLAN can still reach each other unrestricted allowing lateral movement within the segment. 

Network ACLs / Firewall Rules 

  • Pro: Wide support: All enterprise-grade networks support ACLs or firewall rules.  
  • Con: Very much requires people resources and expertise: ACLs must be manually written and updated, which is error-prone and doesn't adapt to dynamic networks.  

Network Access Control (NAC) 

  • Pro: Pre-connect control: Blocks or isolates unknown devices at network entry. 
  • Con: Often provides macro-segmentation (by groups like employees vs guests) rather than per-workload microsegmentation.  


First Gen Microsegmentation

Agent-Based Microsegmentation

  • Pro: Granular, real-time control: Can enforce at the process/application level (Layer 7).  

  • Con: Requires deploying and managing software on every protected workload – which can be operationally heavy for organizations with thousands of servers, and impossible for devices that don't support agents (e.g. most IoT/OT gear). 

Modern Microsegmentation

Identity-Based Microsegmentation

  • Pro: No agents to install: Ideal for devices where agents aren't feasible (IoT, OT, IoMT, printers, SCADA PLCs, older OS). Makes deployment easier in environments with diverse devices. . Leverages switches and existing network design. 
  • Con: Limited visibility into encrypted or host-internal traffic: Agentless approaches often act on network headers. They might not see process-level info or be able to differentiate traffic once it's encrypted end-to-end. 

The Data
Doesn’t Lie.

Microsegmentation is no longer an awareness problem, it’s a scale problem: organizations understand it and know they need it, but very few are getting it across most of their critical environment.  

This report cuts through vendor noise and delivers peer-level intelligence about where enterprise security teams actually stand. 

Familiarity & Expectation of Microsegmentation

9%

Only 9% of organizations have 80%+ of their critical systems microsegmented.

51%

51% of security leaders demand fast segmentation. No more multi-year projects.

Key Insight: The Microsegmentation Gap is Real

With only 9% of organizations achieving 80%+ microsegmentation coverage, over 90% are falling behind, despite it being the #1 priority for stopping lateral movement. Security leaders are responding, with more than half demanding fast deployments to close the gap. 

Which features/functionalities are most desirable in a modern microsegmentation solution?

Enhanced compliance with industry regulations (e.g., HIPAA, NIST, PCI DSS)

59%

Lateral movement prevention

54%

Fast deployments

51%

Cloud-delivered management

48%

Integrations with existing security and tech stack

41%

Policy enforcement with existing infrastructure

39%

Dynamic policy automation

36%

Agentless

26%

Reports for auditors

25%

Rapid discovery of users, workloads and devices

23%

Policy simulation and testing before production

21%

Which benefits would you expect to experience from implementing amodern microsegmentation solution?

Enhanced compliance with industry regulations (e.g., HIPAA, NIST, PCI DSS

45%

Improves attack surface coverage area

37%

Improves visibility and context

33%

Increased network visibility and operational efficiency

31%

Improved protection against ransomware and lateral movement attacks

29%

Easier enforcement of Zero Trust security principles

28%

Improved security posture for IT and OT environments

24%

Reduced business disruption from security initiatives

21%

Cost savings from reduced breach risk and downtime

15%

Enhances automation and efficiency

13%

Faster implementation of solution

11%

Automated policy enforcement and reduced manual workload

10%

Key Insight: Microsegmentation is the Top-priority, and Biggest Blocker

Identity-based microsegmenation solution is the #1 desired feature in a modern microsegmentation solution.

Enabling a Zero trust Strategy

What are the primary business drivers for your organization’s microsegmentation initiative?

Network segmentation as part of a Zero Trust strategy

68%

Regulatory compliance (e.g. NIST, HIPAA, PCI DSS, etc.)

60%

Risk reduction from ransomware and lateral movement attacks

54%

Improved operational efficiency and security visibility

47%

Vendor requirements or industry standards

44%

Cyber insurance requirements

32%

Which user types require special consideration in your segmentation strategy?

Manufacturing

Equipment vendors

41%

Healthcare

Visiting clinicians

74%

Key Insight: Zero Trust Intent Isn’t Matching Zero Trust Action

68% say they're pursuing microsegmentation as part of a Zero Trust strategy, yet when asked what Zero Trust tools they've actually deployed, microsegmentation ranks near the bottom trailing MFA, EDR, IAM, and ZTNA by a wide margin. The intent is there but the execution isn't.

"It took us 6 months to fully segment an entire site [with legacy segmentation approaches]. Multiply that by 75 sites, the time to value and the time to secure becomes elongated. And I think we all know that in cybersecurity, time is the enemy." 

Mike Elmore
CISO, GSK

Preventing Lateral Movement

5

0 1 2 3 4 5

7

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7

%

57% of organizations prioritize microsegmentation to stop lateral movement.

5

0 1 2 3 4 5

3

0 1 2 3 4 5 6 7 8 9 0 1 2 3

%

53% of organizations prioritize Secure Access Service Edge (SASE). 

Which features/functionalities are most desirable in a modern microsegmentation solution?

Multi-factor authentication (MFA

76%

Endpoint detection and response (EDR)/extended detection and response (XDR)

70%

Identity and access management (IAM)

64%

Zero Trust security for third-party / vendor access

55%

Cloud security posture management (CSPM)

49%

Continuous authentication and monitoring

48%

Secure access service edge (SASE)

41%

Secure remote access (e.g. ZTNA, VPN alternatives)

40%

Least-privilege access controls

36%

Network access control (NAC)

28%

Microsegmentation of critical applications / systems

24%

Software-defined perimeter (SDP)

20%

Key Insight: What’s The Hold Up? Legacy Solutions.

1 in 2 experience a lateral attack yet 53% still rely on VLANs, 49% ACLs, 35% NAC. These tools were built for a different era — and they're showing it. Yet 78% have never seen modern microsegmentation. Teams aren't stalling because they don't care. They just don't know the hard part has been solved.  

Segmentation is One Piece of the Puzzle

Which tools must your segmentation tool integrate with?

SIEM

67%

EDR

54%

SOAR platforms

49%

Identity

43%

Network/Infrastructure security

40%

Asset management

38%

CMDB

28%

Others

3%

Microsegmentation is Not Widely Used

What types of network segmentation methods has your organization tried in the past?

1

0 1

7

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7

%

 17% of organizations have fabric overlay segmentation in place. 

1

0 1

2

0 1 2 3 4 5 6 7 8 9 0 1 2

%

12% of organizations use agent-based segmentation.

How familiar are you with modern microsegmentation solutions?

5%

Not familiar at all
I’ve never heard of them. 

31%

Slightly familiar

I have heard of them, but don’t know much about them. 

42%

Moderately familiar
I understand the basics but haven’t worked with them directly. 

22%

Very familiar
I have hands-on experience or
in-depth knowledge. 

Key Insight: What’s Organizations are Stuck.

Organizations still rely primarily on traditional segmentation methods such as VLANs (53%), ACLs (49%), and host-based firewalls (44%), while familiarity with modern microsegmentation remains limited: only 22% report being very familiar with it, highlighting a gap between the growing need for advanced segmentation and organizations’ readiness to adopt it.

Frequently Asked Questions About the Omdia 2026 Microsegmentation Report

Security leaders ask these questions most often when evaluating peer-benchmark research. The full report covers coverage rates, legacy-tool reliance, Zero Trust alignment, and deployment speed.
What is the Omdia 2026 Microsegmentation Survey?

The Omdia 2026 Microsegmentation Survey is independent research measuring microsegmentation programs across 352 cybersecurity decision-makers at organizations with 1,000+ employees in healthcare, manufacturing, and construction. It covers current segmentation approaches (VLANs, ACLs, NAC, agent-based, identity-based), microsegmentation coverage rates, Zero Trust alignment, deployment timelines, and the capabilities security leaders prioritize most in modern solutions. The report is vendor-agnostic peer-benchmark data — not a vendor evaluation.

Why are 90% of organizations falling behind on microsegmentation?

The Omdia data points to three converging blockers. First, legacy infrastructure dependence: 53% still rely on VLANs, 49% on ACLs, and 44% on host-based firewalls — tools that weren't built for modern east-west traffic. Second, a familiarity gap: only 22% of respondents report being "very familiar" with modern microsegmentation approaches, meaning most teams don't know that agentless, identity-based options now exist. Third, project scope: traditional approaches require months or years to deploy, and 51% of security leaders now demand fast segmentation — making legacy rollouts a non-starter.

Where does my organization stand against Omdia's 2026 benchmark?

Omdia's survey measured microsegmentation programs across 352 organizations with 1,000+ employees in healthcare and manufacturing. The full report includes peer-benchmark scoring on coverage (9% at 80%+), familiarity (22% "very familiar"), lateral-movement exposure (50% hit in the past year), and segmentation approach mix (53% VLAN / 49% ACL / 35% NAC / 12% agent-based / 17% fabric overlay). Download the report to see the detailed scoring methodology.

How is this different from the Forrester Wave or Gartner Cool Vendors report?

The Forrester Wave evaluates microsegmentation vendors. Gartner Cool Vendors identifies emerging providers. Omdia's 2026 Microsegmentation Survey is different — it's a peer-benchmark of organizations, showing you what your counterparts are actually doing, where they're stalling, and what they're prioritizing next. It's research for buyers, not about vendors.

Back to top

What now? Make modern microsegmentation solutions work for you.

Microsegmentation is now the #1 initiative to stop lateral movement. Modern, identity-based, agentless solutions can be deployed in days, not years, with no downtime. The message is clear: evolve your Zero Trust architecture now — or stay exposed. But where do you start?

Step 1 Circle

Identify the Right Platform
Demand unified user and device discovery, policy creation, simulation, and enforcement on existing infrastructure, with audit-ready reporting. 

Step 2 Circle

Implement in Weeks
Discover, simulate, enforce at the switch. Tackle high-impact zones first, then expand and report coverage, accuracy, and blocked east-west. 

Step 3 Circle

Run a POV
Run a POV on real segments, include remote / third-party access, and measure time-to-visibility, time-to-policy, and lateral-movement containment.