Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security

02:35 PM
Dan Reis
Dan Reis
Dan Reis

Enterprise Firms Are Simplifying & Securing Networks With a More Flexible Network Edge

Distributed enterprises are on a digital transformation journey. As a result, enterprises are turning to secure SD-WAN to deploy a robust networking ecosystem that accelerates their digital transformation.

Digital transformation is driving network edge requirements
A distributed enterprise's network is the digital frontline connecting them to suppliers, partners or consumers located anywhere on the planet. Unfortunately, managing such a wide range of connectivity points creates an increasingly complex network environment -- especially at the edge of the network. That's because each of these connectivity points can increase the risk of network issues or security threats.

However, the benefits of such extensive network access far outweigh the potential risks, for both enterprises and everyone in their ecosystem. These benefits include helping enterprises accelerate the speed of business by offering new options and choices for their partners and consumers. In turn, these additional options drive demand for even more devices, services and applications.

These are the typical circumstances enterprises are experiencing every day. Unfortunately, traditional enterprise networks have been too rigid to support these dynamic business requirements -- impeding adaptability and manageability while forcing trade-offs between crucial functions. These networks struggle to support modern demands, and are under growing risk of being overwhelmed by a continuing increase in demand for more functionality and access. There are several reasons for this.

The challenges posed by traditional networks
To start with, businesses and their customers are transforming the traditional analog approach of processing content and communications to a digital ecosystem. This puts tremendous pressure on IT infrastructure, where a convergence of IP networks now need to provide a number of demanding services together. This includes voice systems such as VoIP, electronic data communication, support for a wide array of IoT device types, security and other applications that require instantaneous access within distributed enterprises.

Deploying and managing all of these elements together makes it more difficult for enterprise network staff to provide easy access and acceptable performance levels to everyone who needs it. Likewise, network staff face greater challenges in improving and adapting security practices to address new and emerging threats.

Digital transformation is pushing enterprises to modernize their networks so they can address both current and future needs for performance, reliability and security. Enterprises can often achieve modernization by simplifying their networks to create a more adaptable and manageable environment. The key to their success is finding network technologies that don't force them to make trade-offs between performance, security or other functionality.

The strategic emergence of secure SD-WAN
One such technology is software-defined WAN, or SD-WAN. SD-WAN provides a balanced, flexible approach to networking that integrates key product elements designed to deliver performance, security and other functions without sacrificing one for the other. One example is utilizing SD-WAN for dedicated logical network segmentation that enables enterprises to implement and enforce security policies on a per-application basis without sacrificing application performance. For instance, network staff can set up SD-WAN for complete end-to-end segmentation on individual applications so any exposure to a security breach is limited to that particular application or segment.

Unlike traditional network and security systems that require additional expensive and proprietary systems to achieve layered security, SD-WAN enables enterprises to easily extend a multi-layered security approach across the network. And, with the ability to automate functionality, SD-WAN can extend data center-level capabilities all the way to the edge of the network without enterprises having to deploy expensive equipment or highly skilled IT professionals at remote locations.

To support digital transformation, SD-WAN delivers a new generation of capabilities that are simple, easy to maintain and secure while fitting within existing budgets. These capabilities include:

  • Helping network staff quickly identify and respond to changing activity in regard to user and application demand.
  • Increasing scalability to handle the continuous demand for new applications, services and IoT devices.
  • Responding to changing demands or making updates at remote sites (even though those sites might lack IT staff).
  • Automatically delivering defined functions from a central source based on a site's local user and application activity, security requirements and profiles.

The resulting business benefits of SD-WAN can be both immediate and extensive. For example, SD-WAN can integrate multi-device functionality in a single system, including necessities such as WiFi, wireless backup, next-generation firewall and intrusion detection and prevention -- without specialized hardware. Reducing network complexity and the number dedicated devices can streamline support and maintenance while speeding up deployment. Moreover, increasing efficiency can reduce overall capital and operating expenditures. Enterprises can deploy these devices within a virtualized SD-WAN environment to gain comprehensive network and device visibility that can reduce the cost of deployment, upgrades and ongoing support.

A flexible solution for complex business challenges
Instead of enterprises historically being forced into a quagmire of inflexible dedicated systems, SD-WAN can deliver multiple advantages within an agile software-defined networking strategy. This can be a cloud-based delivery model that provides all the modern network and security functionality required today, along with the ability to grow in functionality for tomorrow. SD-WAN offers a simplified, integrated and purpose-built approach that empowers enterprises to capitalize on today's digital transformation, while better managing both current and future issues and risks to deliver a captivating digital experience well into the future.

This article is sponsored by Cybera. To learn more about how Cybera redefines SD-WAN for remote sites visit them at Cybera.

— Dan Reis, SecurityNow Expert

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-19
An out-of-bounds (OOB) memory access flaw was found in fs/f2fs/node.c in the f2fs module in the Linux kernel in versions before 5.12.0-rc4. A bounds check failure allows a local attacker to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The hi...
PUBLISHED: 2021-04-19
A flaw was found in cifs-utils in versions before 6.13. A user when mounting a krb5 CIFS file system from within a container can use Kerberos credentials of the host. The highest threat from this vulnerability is to data confidentiality and integrity.
PUBLISHED: 2021-04-19
If Ethernet communication of the JTEKT Corporation TOYOPUC product series’ (TOYOPUC-PC10 Series: PC10G-CPU TCC-6353: All versions, PC10GE TCC-6464: All versions, PC10P TCC-6372: All versions, PC10P-DP TCC-6726: All versions, PC10P-DP-IO TCC-6752: All versions, PC10B-P TCC-6373: Al...
PUBLISHED: 2021-04-19
An exploitable SQL injection vulnerability exists in ‘getAssets.jsp’ page of OpenClinic GA 5.173.3. The serialnumber parameter in the getAssets.jsp page is vulnerable to unauthenticated SQL injection. An attacker can make an authenticated HTTP request to trigger...
PUBLISHED: 2021-04-19
GStreamer before 1.18.4 might access already-freed memory in error code paths when demuxing certain malformed Matroska files.