SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers
Hybrid it infrastructure network map cloud iot security visual

Zero Networks unveils real-time Network Map 2.0 tool

Fri, 13th Mar 2026

Zero Networks has launched Network Map 2.0, a real-time network mapping product that maintains a continuously updated view of enterprise environments and links that visibility to security controls.

The release is positioned as a move away from static network diagrams and point-in-time snapshots generated on demand. Network Map 2.0 is described as a "living map" that updates as assets and connections change across hybrid estates.

"Large enterprises do not struggle with a lack of data - they struggle with operational risk," said Benny Lakunishok, CEO and co-founder of Zero Networks. "Hybrid environments evolve faster than teams can document them, while static diagrams and flow logs fail to show what matters in the moment: which assets are communicating, which paths create risk, and how far an incident can spread."

Live mapping

Network mapping has long been a staple for network operations and security teams, but many tools rely on periodic discovery scans or retrospective log analysis. That approach can fall short in large organisations that mix on-premises infrastructure with cloud services and container platforms. Device churn, ephemeral workloads and frequent configuration changes can quickly make documentation obsolete.

Network Map 2.0 runs in real time and keeps the map current by processing network activity as it happens. Lakunishok said the platform "continuously ingests, normalizes, deduplicates, and correlates network activity" and is "immediately actionable".

Security teams often focus on east-west movement inside the data centre and internal cloud networks, which can provide routes for attackers after an initial breach. A cited industry infographic estimated east-west traffic accounted for about 86% of total data centre traffic in 2020, and noted continued growth tied to increased internal system-to-system communication.

Unified view

Network Map 2.0 presents activity across on-premises systems, cloud environments, IoT and operational technology networks, and Kubernetes deployments in a single interface. The map aims to show asset-to-asset communications and provide context on which connections matter at a given moment.

The product highlights areas that often feature in incident investigations and risk assessments, including privileged access paths, high-risk ports, external exposure and unusual communication routes. That focus is intended to reduce the need for teams to sift through large volumes of raw telemetry before acting.

Beyond visibility, the release is framed around enforceability. Teams can generate segmentation policies based on observed traffic patterns and simulate enforcement before rollout to reduce the risk of disrupting business applications.

Incident response

During live incidents, mapping tools can provide an investigative layer for triage and containment. Zero Networks said its map can help visualise potential lateral movement routes and assess the likely blast radius of a compromised system.

It said teams can use that view to quarantine or contain affected parts of the network more quickly, and claimed a "measurable reduction of exposure", without providing specific performance figures or customer outcomes.

Network Map 2.0 also includes features aimed at governance and audit requirements. The company said it can provide "continuous proof of control" for executives and auditors, and help organisations validate application isolation, demonstrate ring-fencing of critical systems, and generate evidence of segmentation and zero trust enforcement without relying on static documentation.

Market context

The product sits within a broader push towards microsegmentation and zero trust architectures. Organisations have expanded their attack surface as they adopt hybrid working patterns, cloud services and new classes of connected devices. At the same time, security teams face pressure to cut response times and reduce the impact of ransomware and other intrusions that spread internally.

Many security programmes still struggle to keep network policy aligned with real-world traffic patterns. This can leave teams either too permissive, increasing risk, or too restrictive, breaking applications and slowing operations. Vendors have responded with tools that aim to connect discovery, policy creation and enforcement in a single workflow.

Zero Networks is positioning Network Map 2.0 as an alternative to what it calls "legacy microsegmentation approaches" that depend on delayed analysis of historical data. "Unlike legacy microsegmentation approaches that rely on delayed, point-in-time analysis of historical data, Network Map 2.0 operates in real time," Lakunishok said. "It continuously ingests, normalizes, deduplicates, and correlates network activity so the environment is always current, always mapped, and immediately actionable. The result is real-time east-west clarity, not retrospective analysis."