Virtual private networks (VPNs) traditionally have been depended upon to connect remote locations and/or for deploying new apps. Until more recently, VPNs were able to help control costs, while providing a level of security. However, as the data landscape has evolved, with organizations becoming increasingly decentralized and leveraging digital transformation to improve performance and productivity, it has become clear that VPNs can no longer deliver the benefits for which they were originally intended. They simply were not engineered with today’s requirements in mind.
Today’s applications, such as mobility, big data, social media, cloud, internet of things (IoT) and so on, continue to extend traditional enterprise perimeters, rendering VPNs inadequate and vulnerable to threats. Ironically, as new applications are added to distributed enterprise locations, the cost and complexity of adding more VPNs to secure them also have escalated.
By embracing innovative, multi-layered security solutions, today’s enterprise organizations are evolving to protect their assets. Unfortunately, the remote distributed sites of these newly modernized corporate data centers often are not brought up to date as quickly or as completely. And, even for those that are provided like compute resources, they likely do not possess the same level of onsite IT expertise to ensure ongoing optimum IT operation. This leaves the remote sites potential weak links in the overall security chain—and not just vulnerable at their unique location, but also potentially opening avenues of vulnerability into the corporate site. Given this all-too-common scenario, it is not surprising that the question of how to extend enterprise data center-grade security to remote sites with limited IT staff and tight budgets remains at the top of most IT and security professionals’ priority list.
Enter secure software-defined WAN (SD-WAN) for the network edge, which puts the power and security of the compute resources as close to the sources of data as possible—at the network’s edge, near where the work is actually being done. It is purpose-built to address these challenges of a modern infrastructure by combining security and simplicity into an integrated solution. The power of a secure SD-WAN edge lies in taking a defense-in-depth approach while simultaneously reducing the enterprise attack surface by logically segmenting the network on a per-application basis. Moreover, this multi-layered security approach is delivered with the architectural simplicity, scalability, reliability and dramatic cost savings of a virtual overlay network.
Let’s examine how traditional VPNs are failing to meet the challenges of distributed enterprises and why secure SD-WAN edge solutions are gaining broad market adoption.
Traditional Distributed Enterprise Connectivity’s Top 4 Challenges
Too Insecure. Multiple touchpoints for manual security configurations leave networks prone to misconfigurations or inconsistent configurations, opening them up to security risks. Traditional security approaches are falling short of the needs of today’s enterprise.
Too Complex. Connecting new locations and new applications is difficult. Each location may have multiple devices, different device configurations and various security requirements. Turning up a new location on a VPN requires knowledgeable IT staff to deploy, manage, troubleshoot and support.
Too Inflexible. Traditional infrastructures are rigid and necessitate labor-intensive efforts to support changing network conditions, especially when it comes to remote locations. For example, adapting to changing network needs, turning up new applications or responding to new security threats (such as POS malware) must be executed quickly to ensure business continuity. Traditional networks often are too bulky to adapt in a timely manner.
Too Expensive. Supporting the various point product solutions typically required for VPNs is costly. The capital expenditure for various point solution hardware, public IP addresses and software continues to rise. Also, the costs of qualified IT staff management required for supporting remote sites are growing.
Overcoming the Challenges
As more and more applications are deployed to help run your business, a simple solution to securely connect them with minimal effort is needed. Secure SD-WAN edge is particularly well-suited for this cause.
Secure SD-WAN edge solutions greatly simplify enterprise networks and dramatically reduce both the capex and opex costs of managing enterprise WANs. They easily extend the multi-layered security defenses used in data centers to branch locations. Most importantly, secure SD-WAN edge allows mission-critical applications such as payments and loyalty to co-exist with public applications such as Wi-Fi on a single network, while providing application-specific security and end-to-end network segmentation. These applications are segmented into their own dedicated logical networks, preventing them from intermingling with other application traffic on the network.
With secure SD-WAN edge solutions, these applications are connected in a cost-effective, scalable way without compromising security. This is a distinct benefit over VPNs, which provide an either/or scenario: Either all traffic intermingles on one VPN, which is lower cost but very insecure, or all traffic can be segmented on separate VPNs, which requires more cost and complexity to maintain security.
Secure SD-WAN Edge Overview
Secure SD-WAN edge virtualizes the WAN so that all network intelligence is handled in software.
For example, remote locations can be defined simultaneously and then kept perfectly in sync using centralized cloud-based policy administration inherent in SD-WAN edge connectivity models. This architecture helps reduce expenses and complexity, while increasing network flexibility. Plus, it can be piloted in your network incrementally branch by branch, mitigating concerns about network disruption and giving you a quick way to determine the return on your investment.
Benefits of Secure SD-WAN at the Network Edge
Increased Security. Logical network segmentation allows security policies to be enforced on a per-application basis. By applying complete end-to-end segmentation of each application, exposure from any potential breach is limited to that single application. Just as importantly, the centralized virtual overlay approach of secure SD-WAN edge configurations eliminates the multiple manual configurations that open your network to security risks. With secure SD-WAN edge, you can extend the multi-layered security approach used in data centers out to the edge of your network without having skilled IT professionals at the branch.
Reduced Complexity. Distributed enterprises can be operationalized in minutes. Secure SD-WAN edge simplifies network setup with automatic provisioning and configuration from a central controller. The remote location will also receive network updates and changes automatically.
Increased Agility. Secure SD-WAN edge functionality allows for zero-touch deployment, resulting in the rollout of network services “on-demand,” such as new cloud applications.
Proven Scalability. Secure SD-WAN edge is designed with scalability in mind and provides the level of security and performance on-demand network services need in large, distributed enterprises. Policy changes, software updates and new branch deployment can be done easily without compromising network performance.
Decreased Costs. With secure SD-WAN edge virtualization, the cost of WAN infrastructure hardware, software and support can be reduced by up to 79%. The technology eliminates the need for multiple, dedicated premise devices by integrating functionality, such as Wi-Fi, wireless backup, firewall and intrusion detection/prevention in one solution.
Here are the first steps to prime your organization for secure SD-WAN edge:
- Develop a data connectivity and security program for your remote locations.
- Be proactive about protecting your environment.
- Engage key stakeholders to ensure a holistic approach.
- Pilot a secure SD-WAN Edge solution.
- Roll out incrementally on a branch-by-branch basis.
- Avoid disrupting your existing architecture and minimize risk.