sb-eu logo
Story image

Why DX is not complete without a transformed security architecture

30 Jun 2020

A cloud-first strategy must consider the benefits and the challenges that IT teams will encounter.

Cloud migration can lead to better accessibility, agility, availability, better application performance, and lower costs.

However, Silver Peak states that challenges can include unpredictable application performance, error-prone policy configurations that extend deployment time, and policy enforcement becomes inconsistent when managing it across hundreds or thousands of sites.

Consider an organisation that is migrating its applications to the cloud. It will discover new traffic patterns that benefit from a new wide area network (WAN) approach and security model.

Today’s modern enterprises leverage applications from data centres, public and private clouds, and many different software-as-a-service (SaaS) providers. Users now access applications from anywhere any any device across more WAN transports, including broadband internet.

These come with security and cost challenges, which can be mitigated with smart thinking and the right processes in place.

Secure Access Services Edge (SASE) is the model by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways (SWG), firewall-as-a-service (FWaaS), cloud access security brokers (CASB), and more.

According to Silver Peak, the SASE model can offer:

  • Improved user experience by delivering better application performance by breaking out cloud traffic locally over the internet from the branch
  • Operational efficiency by simplifying branch WAN infrastructure and through centralised orchestration of application, network and security policies
  • Reduced risk with consistent, always-up-to date, business-driven security policy enforcement
  • Increased business agility by significantly reducing the time to bring new sites and applications online or to update application and security policies.

However, not all SD-WAN solutions adopt a SASE model within their cloud and security offerings.

Silver Peak and Zscaler launched an API-based integration that automates cloud-delivered security configuration through Silver Peak Unity Orchestrator.

The two companies recently enhanced this integration to include finer granularity of application, user and device controls. 

Furthermore, a new capability can improve both the performance and responsiveness of network and security services in the event of a failure or degradation issue.

Silver Peak and Zscaler’s joint automated orchestration can provide a seamless cloud-delivered security integration with WAN. This is all managed from the central Unity Orchestrator system. 

“Enterprises looking to adopt a SASE infrastructure require a ‘no compromise’ WAN edge and security transformation strategy to realise a multiplier effect from their existing and ongoing cloud investments,” Silver Peak concludes.

Find out how you can secure your SD-WAN without compromise here.

Story image
McAfee finds vulnerabilities in 'temi' the videoconferencing robot
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.More
Story image
Gartner predicts 75% of CEOs to be liable for cyber-physical security incidents by 2024
The nature of CPSs means incidents can quickly lead to physical harm to people, destruction of property or environmental disasters – and Gartner’s new research indicates that these incidents will increase drastically in the next few years if the lack of spending on these assets continues.More
Story image
Kaspersky releases new report on consumer’s approach to digital services
COVID-19 related restrictions and the necessity to stay indoors has influenced the way people approach digital services, making them more aware of how securely both they, and their housemates, use the internet.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More
Story image
Proofpoint launches new SMB focused security awareness training
Proofpoint has launched security awareness training for small to medium businesses (SMBs) with the aim of reducing successful phishing attacks and malware infections to almost zero. More