Estimated reading time: 7 minutes
Almost every security leader wants microsegmentation. Almost none of them have it. That is the central finding of a new Omdia survey commissioned by Elisity, covering 352 US cybersecurity decision makers across healthcare and manufacturing. The numbers describe a market caught between intent and execution, and for underwriters assessing lateral movement controls, the microsegmentation cyber Insurance gap matters enormously.
The Numbers Behind The Gap
The headline statistic is stark. Ninety-nine percent of organizations are implementing or planning microsegmentation. Yet only 9% report that more than 80% of their critical systems are actually protected. In healthcare, that figure drops to 6%. Nearly half of all respondents experienced a lateral movement attack in the past year. At the same time, 57% rank microsegmentation as their top initiative to stop lateral movement. Organizations know what they need. They are not getting it done.
James Winebrenner, CEO of Elisity, frames the problem directly: “Microsegmentation has matured, but many organizations still carry the scars of earlier, complex approaches.” Those scars are real. Most organizations still rely on VLANs, access control lists, and agent-based tools built around network location rather than device identity. These legacy architectures require constant manual rework. They leave east-west traffic exposure wide open. And critically for cyber insurance underwriting, they check the segmentation box without delivering the control.
Why Microsegmentation Cyber Insurance Questions Need To Change
The survey includes a data point that should concern every cyber insurer. Only 32% of respondents cite cyber insurance requirements as a driver for microsegmentation investment. Zero Trust strategy leads at 68%. Regulatory compliance follows at 60%. Insurance sits last. That ranking tells underwriters something important: they currently have less influence over segmentation decisions than regulators do.
Winebrenner says the reason is straightforward. Most renewal questionnaires still ask whether an organization has network segmentation, a binary question that lets a 20-year-old VLAN architecture check the same box as identity-based microsegmentation. Only one of those approaches actually contains lateral movement. Underwriters should ask whether segmentation is identity-based or location-based, what percentage of critical assets sit under active policy, and whether that policy extends to OT and IoMT environments. The same evolution happened with MFA questions. Segmentation questions need to follow the same path.
The OT And IoMT Blind Spot
Healthcare and manufacturing are the two heaviest ransomware target sectors. They are also the two sectors where first-generation microsegmentation fails most visibly. Agent-based tools cannot be deployed to PLCs, MRI machines, or infusion pumps. Those are precisely the devices ransomware groups target to force payment. Manufacturing respondents rank ICS and building management systems as their top device challenge. Healthcare respondents name patient monitoring systems and IoMT devices. Ransomware groups, including Qilin and BlackSuit, have pivoted specifically to OT and IoMT environments after establishing an IT foothold.
Most cyber insurance application forms treat segmentation as a single line item. An organization with solid IT segmentation but a flat OT network looks adequately controlled when it is not. The production outage or patient-safety failure that drives a large claim comes from the OT and IoMT layer, not the corporate IT network. Underwriters should assess OT and IoMT segmentation as a separate, independently evidenced control.
Identity-Based Segmentation: The New MFA Inflection Point
Sixty-nine percent of respondents name identity-based microsegmentation as their most desired capability. Only 22% have hands-on experience with modern microsegmentation solutions. That awareness gap explains much of the 90% implementation shortfall. The technology has evolved significantly. Modern platforms enforce policy directly on existing network switches — no agents, no additional hardware, no VLAN reconfiguration. Sixty-two percent of respondents say today’s solutions are easier to deploy than those available five years ago.
For underwriters, this maturity signal matters. Identity-based microsegmentation ties access policy to user and device identity rather than IP address or network location. That means coverage is auditable per session, per device, and per asset class across IT, IoT, OT, and IoMT. For the first time, underwriters can ask a real, measurable question: what percentage of critical assets have least-privilege policy actively enforced? That is a verifiable control — not a marketing claim. Winebrenner compares this moment directly to MFA’s underwriting inflection point around 2020. The market signal is the same. The questionnaire evolution should follow.
Get The Cyber Insurance News Upload Delivered
Subscribe to our newsletter!
What Underwriters And Brokers Should Do Now
The Omdia data gives underwriters a concrete framework. Partial microsegmentation is not partial protection. It is full exposure of the uncovered assets. A handful of VLANs in front of an EHR or ICS environment will not stop a modern ransomware intrusion. Coverage that does not account for the availability and resilience of all operational assets, including OT and IoMT, creates a false sense of security on both sides of the policy.
Brokers placing coverage in healthcare and manufacturing should ask clients specifically what percentage of critical systems sit under active identity-based policy, not just whether segmentation exists. The answer to that question is now measurable, increasingly standardized, and directly relevant to claim frequency and blast radius. The 90% gap in this survey is the risk that underwriters are currently pricing without asking the right questions.
FAQ – Microsegmentation Cyber Insurance Gap
Microsegmentation divides a network into secure zones and controls access between them. In a cyber insurance context, it is a lateral movement control that limits how far an attacker can move after breaching one system and directly affects the ransomware blast radius and business interruption severity.
The gap means most organizations in high-risk sectors like healthcare and manufacturing have limited active containment for east-west attacks. Legacy VLAN and ACL architectures check the segmentation box on renewal questionnaires without delivering meaningful lateral movement control.
Identity-based microsegmentation ties access policy to user and device identity rather than network location. Unlike legacy approaches it is auditable per asset, covers OT and IoMT devices that cannot run software agents, and provides a measurable percentage of critical systems under active policy, a verifiable control underwriters can assess.
Why are OT and IoMT environments a separate underwriting concern?
Agent-based segmentation tools cannot be deployed to PLCs, medical devices, or industrial control systems. These are the environments ransomware groups target to cause production outages and patient-safety failures. Most application forms do not ask about OT and IoMT segmentation separately, creating a significant coverage assessment blind spot.
Ask whether segmentation is identity-based or location-based, what percentage of critical systems are covered by active policy, whether that policy extends to OT and IoMT environments, and how that coverage is monitored and evidenced. Binary yes/no segmentation questions no longer reflect the risk accurately.
The Omdia survey finds only 32% of organizations cite cyber insurance as a driver for microsegmentation the lowest-ranked driver behind Zero Trust strategy and regulatory compliance. Underwriters have less influence over segmentation investment than regulators. More prescriptive questionnaire language would close that gap.
Related Cyber Liability Insurance Posts
- State CISOs Sound The Alarm: What The 2026 NASCIO-Deloitte Study Means For Government Cyber Risk Insurance
- Cyber Insurance Blind Spots: Why 85% Of Cyber Attacks Never Make The News And What That Means For Your Coverage
- Cyber Insurance Market Size to Approach $120 Billion by 2032? So Says Bullish New Report on Growth in Cybersecurity Insurance
- Cybersecurity Starts With Understanding: Graylog’s Kimber Spradlin on Data Clarity, AI Limits, Cyber Hygiene and Mom
- As Cyber Insurance Growth Stalls: Report Shows Europe Key to Rebooting Market