Dynamic Segmentation
What is Dynamic Segmentation?

Dynamic Segmentation utilizes policy-based access control across wired, wireless, and WAN infrastructure, ensuring that users and devices can only communicate with destinations consistent with their access permissions—foundational for Zero Trust and SASE frameworks.

Group of people having a discussion.
  • Dynamic Segmentation explained
  • How does Dynamic Segmentation work?
  • Why use Dynamic Segmentation?
  • Benefits of Dynamic Segmentation
Dynamic Segmentation explained

Dynamic Segmentation explained

Dynamic Segmentation establishes least privilege access to IT resources by segmenting traffic based on roles and associated access permissions. This is a fundamental concept of both Zero Trust and SASE frameworks where trust is based on identity and policies, rather than where and how a user or device connects.

A role is a logical grouping of permissions. Permissions can include applications and services that can be accessed, users and devices that can be reached, or even days of the week a particular user can connect to the network.

Because roles and policies define access and segmentation, Dynamic Segmentation eliminates the need to manually configure SSIDs, ACLs, subnets, and port-based controls. This reduces complex network segmentation, sprawling VLANs, and costly administrative functions.

Related products

HPE Aruba Networking ClearPass Policy Manager

Secure your network with policies based on the principles of zero trust security to support hybrid workplace initiatives, IoT devices, and edge computing.

HPE Aruba Networking Central

Unify cloud-native network management across branch, remote, campus, data center, and IoT networks with AI-powered insights, workflow automation, and edge-to-cloud security.

Related topics

Network security

Zero Trust

Network management