Updated: Dec 02, 2025
Kavita Rao, the CISO of a rapidly expanding Indian tech company, reached a breaking point the day her team traced a minor HR system compromise to a development VM three VLANs away. Nothing catastrophic happened. But it was a warning. A flat network had turned a routine misconfiguration into a potential blast radius. Segmentation had been on her roadmap for years. Now it was urgent.
This is the guide that emerged from that journey: a practical view of how ISE-based segmentation is designed, deployed, and fixed when real organisations, not idealised architectures, face sprawl, device diversity, and constant change.
Kavita’s organisation resembled a typical fast-growing Indian ITeS firm: high analyst churn, project-based access, a mix of managed and unmanaged devices, and dozens of client-specific data environments all accessed through the same broad network. VLANs originally created for 200 users now carried more than a thousand. Contractors and interns connected through personal laptops. IoT devices sat on the same broadcast domains as production endpoints. Project VMs, developer sandboxes, and customer environments shared east-west pathways.
ISE was deployed, but segmentation never left the design deck. Authentication worked. Authorisation did not. The network knew who users were but did not act on that knowledge. Kavita saw the result in the HR-system incident: lateral movement was possible because nothing segmented risk from risk.

Fast-growing tech and analytics organisations need segmentation that reflects how they operate, not how traditional campuses are designed. Kavita’s reference model landed on six zones.
Each zone represented a trust boundary. Movement between zones required an explicit policy, not implicit access based on VLAN membership.
ISE segmentation fails most often in environments that grow faster than their controls. Identity sources become inconsistent. AD groups accumulate outdated roles. Service accounts get mislabelled. Switches run mixed software versions. IoT devices lack classification. Firewall rules contain years of exceptions no one remembers creating.
Kavita found all of this. Before designing new segmentation, identity stores were cleaned, devices profiled, and zone candidates mapped based on how people worked and how data moved. Her implementation followed ten structured steps:
The earlier ten-step rollout already defined the structure. The corresponding enforcement actions aligned with it:
ISE became the identity and policy authority. Switches enforced DACLs. Wireless controllers applied role-based access. Firewalls validated east-west movement between critical zones. IoT devices landed in tightly restricted segments. Developers gained controlled access to project environments with elevated logging and monitoring.
The architecture was not theoretical. It matched how work happened inside Kavita’s organisation: analysts moving between client datasets, engineers testing builds, contractors joining mid-cycle, and project clusters spinning up and down.
ITeS firms deal with client data, analyst churn, project-based access, and pressure to pass strict enterprise audits. A flat network increases the blast radius of every minor compromise. Segmentation reduces this risk and makes incidents easier to contain.
For a CIO evaluating the shift, four questions determine direction.
CIOs who answer yes to these conditions find segmentation less an optional upgrade and more a structural requirement.
Kavita’s experience is common. Segmentation is not a theory problem. It is an identity and enforcement alignment problem. Organisations that fix it early avoid blast-radius failures later.
Proactive works with security and network teams to design and deploy ISE-based segmentation that fits fast-growing ITeS environments. If you want a rollout plan that holds up under audit and scales with growth, our team can help.