24x7x365 e360 Client Technical Support: Call (877) 368-4797 opt 9, or

Information technology (IT) and security budgets are tight. Organizations are struggling to keep customers, employees, and shareholders. Imagine that this was the year you were going to upgrade that application or group of devices, as they are no longer supported by the manufacturer. Your budget has disappeared and most everything has been put on hold. However, you still have to protect your customers and employees from an elevated threat of attackers that are using the pandemic to spread malware and steal credentials and data. It may look like all doom and gloom, but there are steps you can take to be proactive in protecting against most attacks aimed at your infrastructure and ways in which adopting principals will provide mitigating controls for audit and compliance.

Micro Segmentation

When it comes to protecting devices from attackers, one of the best lines of defense is preventing access to the device in the first place. Micro segmentation allows for isolation where only devices on the same segment are allowed to talk to each other. When reducing the amount of traffic traversing the network, analysis becomes easier and protection is inherited by belonging to the segment. There are several approaches to micro segmentation, but the most popular forms are host based and network based.

East/West Firewall

Traditional organizations protected internal assets by erecting a barrier between the internet and the internal network. As time went on and attacks became more sophisticated, organizations found themselves victims of attacks that moved laterally through the organization. East/west firewalls help prevent lateral movement by inspecting traffic as it moves inside of the organization vs. north/south to the internet. Both firewall configurations should be considered in todays security architecture, especially in the data center.

Micro Firewall

Most organizations have devices that are unable to have an agent installed on them or have an unsupported operating system that can no longer be patched. Micro firewalls are small devices that sit in front of a system or device and filter ports and protocols. Imagine a medical device that performs a singular task and only communicated on a handful of ports. Why would you leave the device open to any other port than the ones it needs for operation? By limiting the ports and protocols, you are in essence reducing the attack surface of the device.

Treat legacy devices like Internet of Things (IoT) devices

With medical devices and manufacturing devices making up the bulk of devices with unsupported operating, organizations are searching for practical ways to secure them. The reality of the situation is that unsupported devices, in effect, become IoT for the simple reason that they can’t be patched or updated by traditional means. Sure, some of the more progressive IoT technologies are coming out with more secure systems that can be updated, but these make up a small number and don’t address the existing billions of “things”. By leveraging approached like micro segmentation, east/west firewalls, and micro firewalls – you have a path forward in securing unmanaged devices. 

Up your analytics game

As the old adage goes “You can’t manage what you don’t measure”. Reporting and Analytics are key when it comes to managing legacy devices and applications. Behavior-based analytics are important to help understand what a device should be doing and what it is doing. Secondarily, analytics should be able to trigger actions when a device falls out of normal behavior by segmenting it off or removing connectivity to the device completely while investigations happen. They key is to tie analytics, reporting, and actions into a repeatable process that evolves as your attack landscape changes.

Advyz Cyber Risk Services

The main goal of Advyz Cyber Risk Services is to help clients mature their cybersecurity programs. Teaming with leading security providers, we work closely with you to ensure that your organization is prepared and has the tools and technologies in place to help you navigate the right solutions partners. Our team focuses on protecting your data, applications, and infrastructure from the threat of data breaches or other cybersecurity incidents.

Your content goes here.

Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.



Creating a strategy for managing risk and compliance while helping to filter the myriad of cybersecurity technologies

Modern Infrastructure

Empowering your enterprise to its greatest potential through an efficient and secure IT infrastructure

Digital Workplace

Helping businesses keep infrastructure up-to-date, minimizing security risks, and maintaining compliance

Cloud Enablement

Accelerating IT service delivery through the adoption of agile methodologies using systems-oriented approach

Microsoft Expertise

Helping set goals and establishing benchmarks with the successful deployment of Microsoft solutions

Enterprise Managed Services

Best IT practices with design, configuration, implementation, licensing and environmental services

Markets and Market Support Vehicles


Professional services and renowned expertise aligned with the trends and challenges facing a variety of industries


Addressing IT challenges faced by healthcare organizations through trusted services, solutions and relationships

Public Sector

Helping organizations manage costs and high availability while increasing security, compliance and efficiency

Group Purchasing

Industry-leading IT consulting services and technology solutions through a streamlined contracting process

Resource Library


e360 in-person and online events

Solutions Literature

Access content on e360 services


Read about trending technology

Press Releases

Get official updates about e360

News Stories

Read about industry and e360 news


e360 webinar and podcast content

About e360

Who We Are

Our mission, vision, leadership and team


e360 awards and recognition


e360's commitment to privacy


e360's commitment to privacy


e360 career opportunities

Connect With e360

e360 locations and contact resources