Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Network Security

End of Bibblio RCM includes -->
02:35 PM
Dan Reis
Dan Reis
Dan Reis

Enterprise Firms Are Simplifying & Securing Networks With a More Flexible Network Edge

Distributed enterprises are on a digital transformation journey. As a result, enterprises are turning to secure SD-WAN to deploy a robust networking ecosystem that accelerates their digital transformation.

Digital transformation is driving network edge requirements
A distributed enterprise's network is the digital frontline connecting them to suppliers, partners or consumers located anywhere on the planet. Unfortunately, managing such a wide range of connectivity points creates an increasingly complex network environment -- especially at the edge of the network. That's because each of these connectivity points can increase the risk of network issues or security threats.

However, the benefits of such extensive network access far outweigh the potential risks, for both enterprises and everyone in their ecosystem. These benefits include helping enterprises accelerate the speed of business by offering new options and choices for their partners and consumers. In turn, these additional options drive demand for even more devices, services and applications.

These are the typical circumstances enterprises are experiencing every day. Unfortunately, traditional enterprise networks have been too rigid to support these dynamic business requirements -- impeding adaptability and manageability while forcing trade-offs between crucial functions. These networks struggle to support modern demands, and are under growing risk of being overwhelmed by a continuing increase in demand for more functionality and access. There are several reasons for this.

The challenges posed by traditional networks
To start with, businesses and their customers are transforming the traditional analog approach of processing content and communications to a digital ecosystem. This puts tremendous pressure on IT infrastructure, where a convergence of IP networks now need to provide a number of demanding services together. This includes voice systems such as VoIP, electronic data communication, support for a wide array of IoT device types, security and other applications that require instantaneous access within distributed enterprises.

Deploying and managing all of these elements together makes it more difficult for enterprise network staff to provide easy access and acceptable performance levels to everyone who needs it. Likewise, network staff face greater challenges in improving and adapting security practices to address new and emerging threats.

Digital transformation is pushing enterprises to modernize their networks so they can address both current and future needs for performance, reliability and security. Enterprises can often achieve modernization by simplifying their networks to create a more adaptable and manageable environment. The key to their success is finding network technologies that don't force them to make trade-offs between performance, security or other functionality.

The strategic emergence of secure SD-WAN
One such technology is software-defined WAN, or SD-WAN. SD-WAN provides a balanced, flexible approach to networking that integrates key product elements designed to deliver performance, security and other functions without sacrificing one for the other. One example is utilizing SD-WAN for dedicated logical network segmentation that enables enterprises to implement and enforce security policies on a per-application basis without sacrificing application performance. For instance, network staff can set up SD-WAN for complete end-to-end segmentation on individual applications so any exposure to a security breach is limited to that particular application or segment.

Unlike traditional network and security systems that require additional expensive and proprietary systems to achieve layered security, SD-WAN enables enterprises to easily extend a multi-layered security approach across the network. And, with the ability to automate functionality, SD-WAN can extend data center-level capabilities all the way to the edge of the network without enterprises having to deploy expensive equipment or highly skilled IT professionals at remote locations.

To support digital transformation, SD-WAN delivers a new generation of capabilities that are simple, easy to maintain and secure while fitting within existing budgets. These capabilities include:

  • Helping network staff quickly identify and respond to changing activity in regard to user and application demand.
  • Increasing scalability to handle the continuous demand for new applications, services and IoT devices.
  • Responding to changing demands or making updates at remote sites (even though those sites might lack IT staff).
  • Automatically delivering defined functions from a central source based on a site's local user and application activity, security requirements and profiles.

The resulting business benefits of SD-WAN can be both immediate and extensive. For example, SD-WAN can integrate multi-device functionality in a single system, including necessities such as WiFi, wireless backup, next-generation firewall and intrusion detection and prevention -- without specialized hardware. Reducing network complexity and the number dedicated devices can streamline support and maintenance while speeding up deployment. Moreover, increasing efficiency can reduce overall capital and operating expenditures. Enterprises can deploy these devices within a virtualized SD-WAN environment to gain comprehensive network and device visibility that can reduce the cost of deployment, upgrades and ongoing support.

A flexible solution for complex business challenges
Instead of enterprises historically being forced into a quagmire of inflexible dedicated systems, SD-WAN can deliver multiple advantages within an agile software-defined networking strategy. This can be a cloud-based delivery model that provides all the modern network and security functionality required today, along with the ability to grow in functionality for tomorrow. SD-WAN offers a simplified, integrated and purpose-built approach that empowers enterprises to capitalize on today's digital transformation, while better managing both current and future issues and risks to deliver a captivating digital experience well into the future.

This article is sponsored by Cybera. To learn more about how Cybera redefines SD-WAN for remote sites visit them at Cybera.

— Dan Reis, SecurityNow Expert

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.