The Rise Of SD-WAN And Its Implications For Security & Performance (2024)

Uploaded on 2024-09-02 in , FREE TO VIEW, TECHNOLOGY--Developments

The Rise Of SD-WAN And Its Implications For Security & Performance (1)In this digitally enabled hybrid and remote working world, it’s hard to recall the days when fixed Wide Area Networks (WAN) universally delivered our everyday enterprise network user experience by solidly moving data over a single, private network fixed grade connection.

Back in the early 2010’s when online collaboration tools, video conferencing and VOIP were in their infancy, some forward-thinking vendors including Viptela (now part of Cisco) and SilverPeak (Aruba/HP) started pioneering a Software-Defined Wide Area Networking (SD-WAN) as an alternate decentralised approach for networking that would allow for intelligent routing of traffic over multiple connections.

This approach - they promised - would optimise network traffic more efficiently for digital work enablement and respond far quicker to changing business needs such as adding more users/workspaces on the fly.

It would also reverse the backhauling of network traffic back through corporate HQs. Momentum and adoption was quick to follow and by 2015, Cisco, VMware, Fortinet, Palo Alto, Aruba and Citrix had all added SD-WAN cloud networking solutions. Users were able to significantly modernise their network performance and improve connectivity to apps and cloud services by enabling intelligent routing of traffic over multiple cloud connections.

Rapid growth of SD-WAN is still occurring with IDC continuing to project rapid annual growth of over 30%. Market analysts anticipate a global market projection of $13.7 billion by 2026. There are now millions of SD-WAN installations globally, enticed by its flexible design which supports optimised direct access to cloud-first strategies. Enterprises have found it essential for connecting branch locations and remote offices with SaaS applications and AWS and Microsoft Azure public clouds. Network Managers note some of the organisational key benefits as:-

1. Enhanced Performance: With intelligent traffic routing and dynamic path selection over multiple protocols and technologies, SD-WAN elects for the most efficient paths based on real-time conditions. This brings optimal performance for applications prioritising high-bandwidth and low latency paths. SD-WAN also self-prioritises different types of applications depending on criticality to the business, ultimately delivering a premium user experience.

2. Fast Deployment and Cloud Integration:Connecting new sites to a SD-WAN network is a comparative breeze given centralised management, zero touch provisioning and optimised access into cloud-based apps.

3. Greater Resilience: With automatic rerouting in the event of network failovers and multiple connection support (including MPLS, & broadband) SD-WAN can improve network reliability.

4. Greater Management: SD-WAN offers a single view of managing the entire network. It splits functions into two – managing the control plane and the data plane. With this holistic management comes finer controls, easier analytics on network performance and traffic; and when provisioned correctly from the outset, enhanced security.

5. Lower costs: In using WANs, organisations relied on expensive MPLS circuits to offer secure and reliable WAN connections. SD-WAN enables use of public internet connections like broadband or LTE, reducing connectivity costs. Often too, network devices like firewalls and VPNs can be combined into a single platform, reducing costs and IT required resources.

The Security Challenge of SD-WAN – Security needs seamless integration and consideration into every phase of deployment:

But while this decentralised and joined approach offered by SD-WAN allows for greater agility and a better UX delivered from a dynamic core, it also broadens the possible number of ‘attack surfaces’ with the introduction of multiple entry points into the network. The dynamic nature of SD-WAN with multiple connection paths and constantly changing traffic patterns, needs a vigilant ‘monitor, manage, detect and respond’ security approach. All entry points need flexible and comprehensive security strategies to reduce vulnerabilities to cyber-attacks, cyber breaches and lack of compliance to digital security best practices.

Vulnerabilities are even greater still as SD-WAN often routes traffic over public internet connections which are inherently less secure.

It’s therefore essential that deployment of SD-WAN should go hand in hand with increased cyber surveillance; tracking and tools such as stronger encryption; vigilant monitoring; increased training of users and sophisticated firewalls. Ideally integrating these increased security measures and monitoring should be planned in detail at the very beginning of the SD-WAN implementation, with security layered from the ground up.

Enterprises with branches, remote offices and mobile users have embraced SD-WAN as new facilities can be extended and revoked with ease. However, without necessarily having dedicated IT onsite at these facilities, enterprises’ need to necessitate the same protection levels, monitoring, and consistent security policies across all locations.

To achieve this integrated approach of the entire estate, some organisations have adopted a Unified Security Framework that combines and underlines the roles of firewalls, VPNs, cyber solutions, monitoring and external intrusion prevention with a formulated and integrated approach, often co-advised by a trusted networking partner. Adherence to a security framework has never been more important as the EU (and most developed countries) revise and release mandatory adherence to the NIS2 Directive in October 2024 to strengthen cybersecurity in critical and important infrastructure sectors – (and for their supply chain).

With the correct tools and continuous monitoring services, SD-WAN can be part of this NIS2 compliancy, enhancing visibility and control to mitigate risk, by ensuring regular updates, strong encryption and secure management across the organisation.

Some advanced network monitoring platforms now use machine learning to find anomalies and dynamically respond to cyber threats before they can impact SD-WAN infrastructures.

John Diamond is Solutions Architect with Park Place Technologies

Image:Sakorn Sukkasemsakorn

You Might Also Read:

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure:

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for aPremium Subscription.

  • Individual £5 per month or £50 per year.Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request
  • Inquiries:Contact Cyber Security Intelligence

Cyber Security Intelligence: Captured Organised & Accessible

« Standards: The Key To Building A Sustainable Quantum-Safe Future

Real Attacks. Real Tools. Real Scenarios. Schedule a demo

Training that transforms behaviours

Directory of Suppliers

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

ARIES is the Romanian Association for Electronic Industry and Software, the biggest and most influental organization created for the IT&C industry in Romania.

ICTSecurity Portal

The ICTSecurity Portal is an interministerial initiative in cooperation with the Austrian economy and acts as a central internet portal for topics related to security in the digital world.

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

SECUINFRA

Since 2010, SECUINFRA have specialized in detecting, analyzing and defending against cyber attacks.

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

The Rise Of SD-WAN And Its Implications For Security & Performance (2024)

References

Top Articles
Reliance Jio Outage in Kanīna Khās, State of Haryāna
Puppies For Sale Bay Area Craigslist
M3Gan Showtimes Near Cinemark Movies 8 - Paris
Diego Balleza Lpsg
Ascension St. Vincent's Lung Institute - Riverside
SSD an SATA Anschluss bei Futro S920
The 8 Best Santa Ynez Wineries to Visit in 2023
Pogo Express Recharge
Gay Black Scat
8Kun Hypnosis
Cookie Clicker The Advanced Method
Walgreens Boots Alliance, Inc.: Konsensus der Analysten und Kursziel | A12HJF | US9314271084 | MarketScreener
Crystal Lust Wiki
Care Guide for Platy Fish – Feeding, Breeding, and Tank Mates
Eggy Car Unblocked - Chrome Web Store
Voy Pageant Discussion
Apple Store Near Me Make Appointment
2013 Chevy Sonic Freon Capacity
Sermon Collections, Sermons, Videos, PowerPoint Templates, Backgrounds
Upper Rank Demons Wiki
Dabs Utah State Liquor Store #09 - Murray
Does Publix Have Sephora Gift Cards
Dayz Nyheim Map
2021 Lexus IS 350 F SPORT for sale - Richardson, TX - craigslist
-apostila-de-ingles-cn-epcar-eam-essa-eear-espcex-afa-efomm-en-e-ita-pr f3476c8ab0af975f02f2f651664c5f13 - Matemática
John Wick Megashare
Hannaford Weekly Flyer Manchester Nh
What happened to Gas Monkey Garage?
OC IDEAS TO DRAW [80+ IDEAS!] ✍🏼 | Spin the Wheel - Random Picker
2024-25 ITH Season Preview: USC Trojans
Circuit Court Peoria Il
Произношение и транскрипция английских слов онлайн.
Red Dragon Fort Mohave Az
Skyward Crawford Ausable
Bing Chilling Copypasta - Ricky Spears
Februarycash2023
Sa 0 Spn 2659 Fmi 18
Hypebeast Muckrack
Strange World Showtimes Near Harkins Theatres Christown 14
55000 Pennies To Dollars
Black Panther Pitbull Puppy For Sale
Roblox Mod Menu Platinmods
3143656395
Evangeline Shrine Club Banquet Hall Photos
Wis International Intranet
The many times it was so much worse
‘A Knights Tale’ Turns 20: Secrets Behind Heath Ledger’s Royal Rock Flick
18 Awesome Things to do in Fort Walton Beach Florida 2024 - The Wanderlust Within
Conan Exiles Rhino Guide - Conan Fanatics
[US/EU] ARENA 2v2 DF S4 Rating Boost 0-1800 / Piloted/Selfplay / ... | ID 217616976 | PlayerAuctions
Sterling Primary Care Franklin
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 5660

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.