Independent reference. Not affiliated with any zero trust vendor. Updated Q1 2026.
ZeroTrustCost
Network pillar deep dive

Microsegmentation cost: agent vs fabric, per-workload pricing

Microsegmentation contains east-west lateral movement by enforcing policy at the workload level rather than the subnet level. This page breaks down agent-based versus fabric-based pricing, the per-workload economics, sizes the cost by organisation, and explains why deploying microsegmentation in Phase 1 wastes 40 to 60 percent of the investment.

What it does

Microsegmentation in zero trust terms

Microsegmentation limits east-west (workload-to-workload) network traffic to only what is explicitly authorised. Where traditional segmentation operates at the subnet level with firewalls between zones, microsegmentation operates at the workload level: every workload gets its own policy describing which other workloads it can talk to. The goal is to contain blast radius after an initial endpoint compromise. An attacker who lands on a web server cannot pivot to the database server unless explicit policy allows web-to-database traffic, even if both are on the same network segment.

CISA Zero Trust Maturity Model v2.0 treats microsegmentation as an Advanced-tier network pillar capability, deployed after identity and basic network controls (ZTNA, SWG) are mature. The Forrester Microsegmentation Wave tracks the commercial platform category. The dominant vendors are Illumio, Akamai Guardicore, Cisco Secure Workload, VMware NSX, plus newer entrants like Zero Networks and Elisity.

The pillar has two distinct architectural patterns. Agent-based microsegmentation installs a small software agent on every protected workload that enforces policy at the workload's network stack. Fabric-basedmicrosegmentation enforces policy at the underlying network or hypervisor layer. Agent-based is more portable across heterogeneous infrastructure; fabric-based is faster (no agent overhead) but locked to specific infrastructure. Most modern mid-market deployments use agent-based for portability.

Platform pricing

Cost by microsegmentation platform category

Representative per-workload pricing across the major platform categories. Pricing is market-typical from vendor public materials and aggregated Vendr / G2 data; expect 20 to 35 percent discount at multi-year enterprise term.

Platform / categoryModelScopePriceNotes
Illumio Core / EndpointAgent-basedServers, endpoints, containers$5 - $15 / workload / monthEstablished enterprise leader. Premium pricing. Strong policy automation and flow visualisation.
Akamai Guardicore CentraAgent-basedServers, VMs, containers$4 - $12 / workload / monthAcquired by Akamai 2021. Strong on hybrid (on-prem + cloud). Good policy-automation engine.
Cisco Secure Workload (Tetration)Agent-based + flow telemetryData centre workloads$6 - $18 / workload / monthMost comprehensive flow telemetry. Highest implementation complexity. Best fit for Cisco-centric data centres.
Zero NetworksAgentless (Active Directory + agentless segmentation)Windows-centric estates$3 - $8 / endpoint / monthNewer entrant. Strong in Windows AD estates. Lower implementation cost than incumbents.
VMware NSXFabric-basedVMware vSphere estatePer-CPU socket, variesDominant in VMware data centres. Embedded in vSphere licensing for some bundles.
Cisco ACIFabric-based (data centre)Cisco Nexus data centreHardware + licenseData centre fabric controller. Only relevant in greenfield Cisco data-centre builds.
Cloud-native (AWS SG, Azure NSG, GCP)Native primitivesSingle-cloud workloadsFreeAdequate for most cloud-native estates if policy stays within one cloud. Plus service mesh at app layer.
Sizing

Microsegmentation cost by organisation size

OrganisationWorkloadsYear 1 licenseYear 1 PS / implYear 1 totalOngoing / yr
Mid-market1,000-3,000 workloads$50K - $300K$150K - $500K$200K - $800K$80K - $350K
Upper mid-market3,000-8,000 workloads$200K - $700K$300K - $900K$500K - $1.6M$300K - $800K
Enterprise8,000-25,000 workloads$600K - $1.8M$800K - $2.0M$1.4M - $3.8M$800K - $2.0M
Large enterprise25,000+ workloads$1.8M - $5.0M+$2.0M - $5.0M+$3.8M - $10M+$2.0M - $5.0M+
Why Phase 2, not Phase 1

The sequencing mistake that wastes 40-60% of microsegmentation investment

Microsegmentation policy is most effective when it can reference identity primitives: this user, this role, this workload identity, this asset class. Without identity context, policy falls back to IP addresses, hostnames and ports, which is what traditional firewalling does. IP-based policy works but is brittle: every workload IP change, every infrastructure refresh, every new application requires policy updates. Identity-aware policy is durable because identity primitives change much less than IP primitives.

The sequencing mistake is deploying microsegmentation in Phase 1 of a zero trust rollout, before identity context is mature. In Phase 1, the identity context is incomplete: only privileged accounts have MFA, only SaaS apps are SSO-integrated, only some workloads have workload identity. Policy authored against this incomplete context has to be re-authored once identity matures in Phase 2 or 3. The re-authoring cost is roughly half the original policy-authoring cost, which translates to 40 to 60 percent waste on the initial investment.

The fix is straightforward in principle and hard in practice: defer microsegmentation to Phase 2 or 3 of the zero trust rollout, after identity context is mature. The political challenge is that microsegmentation is exciting and visible (board reporting, analyst kudos) while identity is unglamorous (table-stakes infrastructure work). CISOs often face pressure to deploy microsegmentation early for narrative reasons. The right response is to use the early Phase 1 budget for identity work, then move to microsegmentation in Phase 2 with the savings from doing it once.

A useful intermediate path: deploy discovery-only microsegmentation in Phase 1 (the agent or fabric inspects flows and produces a behavioural baseline, but does not enforce policy). Discovery-only costs roughly 30 to 50 percent of full enforcement licensing and produces immediate value (network behaviour visibility, attack-path mapping). Move to full enforcement in Phase 2 once identity context is in place and the discovery data has produced clean policy candidates. This phased approach captures most of the value of early deployment without the re-work cost of full enforcement on incomplete identity context.

Cloud-native

When native security groups plus service mesh replace commercial microsegmentation

Cloud-native estates have a fundamentally different microsegmentation cost profile. AWS Security Groups, Azure Network Security Groups and GCP firewall rules provide basic microsegmentation at zero marginal cost. Service mesh (Istio, Linkerd, Consul Connect) provides identity-aware service-to-service traffic control at the application layer. The two together cover most microsegmentation requirements for cloud-native organisations at low cost.

Commercial microsegmentation platforms still add value in cloud-native estates in three scenarios. First, when policy needs to span multiple clouds with consistent tooling, native security groups become awkward (each cloud is different) and a multi-cloud microsegmentation platform pays back. Second, when policy granularity exceeds what native security groups can express (per-process policy, per-application-identity policy), commercial platforms offer expressiveness native primitives lack. Third, when the organisation needs unified policy management across hybrid (on-prem plus cloud) infrastructure, commercial platforms cover both; native primitives only cover their own cloud.

For pure cloud-native estates without these three scenarios, native security groups plus service mesh is the cost-effective microsegmentation strategy. The licensing saving versus commercial microsegmentation is 60 to 80 percent. The operational cost is higher (you need engineers fluent in each cloud's native primitives), but the total cost of ownership is typically lower. For hybrid estates with significant on-prem footprint, commercial microsegmentation is the cost-effective choice.

Cross-links

Related cost references

Frequently asked

Microsegmentation cost questions

What is microsegmentation in zero trust terms?
Microsegmentation is the control that limits east-west (workload-to-workload) network traffic to only what is explicitly authorised. Where traditional segmentation operates at the subnet level with firewalls between zones, microsegmentation operates at the workload level: every workload gets its own policy describing which other workloads it can talk to. In zero trust terms, microsegmentation is the dominant network-pillar control for containing lateral movement after an initial endpoint compromise. CISA Zero Trust Maturity Model v2.0 treats microsegmentation as an Advanced-tier capability, deployed after identity and basic network controls are mature.
How much does microsegmentation cost per workload?
Per-workload per-month pricing is typically three to fifteen dollars at mid-market scale, dropping to one to six dollars at enterprise scale through volume discount. Agent-based platforms (Illumio Core, Akamai Guardicore Centra, Cisco Secure Workload, Zero Networks) price per agent installed on each workload. Fabric-based platforms (VMware NSX, Cisco ACI, Aviatrix) price per host CPU or per protected workload. The price spread within the category is wide: Illumio at the premium end, newer entrants like Zero Networks or Elisity at the value end, established VMware NSX at the upper-mid for fabric-based.
What is the difference between agent-based and fabric-based microsegmentation?
Agent-based microsegmentation installs a small software agent on every protected workload. The agent enforces policy at the workload's network stack and reports flow data centrally. Pros: works across heterogeneous infrastructure (any cloud, any OS), policy is workload-portable. Cons: agent management overhead, performance impact on the workload (small but measurable). Fabric-based microsegmentation enforces policy in the underlying network or hypervisor layer (VMware NSX in VMware estates, Cisco ACI in Cisco data centres). Pros: no agent overhead, policy enforcement at line rate. Cons: only works inside the specific fabric, less portable, expensive infrastructure refresh if you do not already have the fabric.
How much is implementation versus license cost?
Implementation typically dominates year-one cost for microsegmentation. A mid-market deployment (1,000 to 3,000 workloads) takes 90 to 270 days of professional services, costing $200K to $800K depending on complexity of the existing environment. Policy authoring is the dominant time sink: every workload needs a policy describing its expected behaviour, which means understanding the application architecture in detail. Mature programmes use traffic-discovery features to learn baseline behaviour automatically, then refine the auto-generated policy, which cuts policy-authoring time by 40 to 60 percent.
Why does deploying microsegmentation in Phase 1 waste 40-60% of the investment?
Microsegmentation policy depends on identity context to be effective. Without identity context, policy is based on IP addresses, hostnames and ports, which is basically advanced firewalling under a new name. Once identity context is mature (Phase 2 or later in a typical zero trust rollout), the policy can be re-authored to reference identity primitives (this user, this role, this workload identity), which is more durable and more granular. Organisations that deploy microsegmentation in Phase 1 typically re-author 40 to 60 percent of their policy within twelve to eighteen months as identity context comes online. The re-authoring is roughly half the original policy-authoring cost.
How does cloud-native microsegmentation differ from on-prem?
Cloud-native estates have native segmentation primitives (AWS Security Groups, Azure Network Security Groups, GCP firewall rules) that provide basic microsegmentation at zero marginal cost. For most cloud-native organisations, the native primitives plus service mesh (Istio, Linkerd) at the application layer cover the microsegmentation requirement at low cost. Standalone microsegmentation platforms add value in cloud-native estates only when policy needs to span multiple clouds with consistent tooling, when the policy granularity exceeds what native security groups can express, or when the organisation needs unified policy management across hybrid (on-prem plus cloud) infrastructure. For pure cloud-native estates, the build versus buy decision tilts more toward native plus service mesh than for on-prem-heavy estates.
What is the over-spend pattern in microsegmentation?
Two patterns recur. First, deploying microsegmentation in Phase 1 before identity context is mature, wasting 40 to 60 percent of policy work that has to be re-authored once identity is in place. Second, buying a premium agent-based platform for an environment that could be served by native cloud security groups plus service mesh, over-paying by 60 to 80 percent on licensing. The fix for both: sequence microsegmentation to Phase 2 or 3, and evaluate native versus commercial against the actual policy-granularity requirement, not against marketing positioning.