A method of Threat Mitigation that involves isolating critical information or vulnerable devices so that the scope of the breach cannot reach protected data.