SecurityBrief Asia logo
Story image

Overcoming the challenge of securing SD-WAN

Software-defined wide area networks (SD-WANs) help overcome networking challenges that make branch-level activities slower than those processed at the network core. SD-WAN delivers better application performance along with deeper visibility into traffic. 

However, businesses shouldn’t assume that SD-WAN is easy to secure when, in fact, the opposite is usually true, according to Wavelink, distributor of Fortinet security solutions. 

Wavelink MD Ilan Rubin says, “SD-WAN delivers significant benefits but it’s those very benefits that can make it incredibly challenging to secure. 

“Because it enables direct internet access from devices from anywhere in the network, this means branch security solutions need to take SD-WAN into account alongside split-tunnel challenges created by running various services and remote users from branch resources.”

“This creates complexity that needs to be simplified with an integrated security and network solution.”

However, this can be easier said than done, especially considering the global shortage in relevant security skills. 

Experienced cybersecurity professionals are already under pressure and can struggle to develop a clear strategy to leverage existing security solutions to protect SD-WAN. Without strong security built-in to existing solutions, effective security can be overlooked. 

Even existing security solutions may not be sufficient to protect SD-WAN. They are unlikely to be sophisticated and wide-ranging enough to provide strong protection beyond encrypting traffic and detecting malware. 

Rubin continues, “The best and most reliable way to secure SD-WAN is using built-in security tools. Embedding these tools directly into the solution overcomes challenges around the distributed nature of connections and services carried by SD-WAN.

“These tools should include a next-generation firewall, intrusion protection systems, web filtering, anti-virus, anti-malware, encryption, sandbox, and high-speed inspection of encrypted data.”

“It’s important that this security is natively embedded into SD-WAN to reduce the device footprint and to avoid retro-fitted solutions. Ideally, businesses should deploy SD-WAN functionality through a next-generation firewall device, which lets the business centrally manage the tools and orchestrate security policies through a single pane of glass. This simplifies security management while ensuring a more robust approach.”

It’s equally important to ensure security solutions deployed as part of the SD-WAN solution integrate seamlessly with other security solutions across the network. 

This supposedly helps raise the level of security across the entire network and helps preserve IT resources, reducing security overhead and letting the company achieve better security despite the skills shortage. 

Story image
Aruba updates edge security platform with SD-WAN capabilities
Aruba’s latest iteration of its Edge Services Platform (ESP) has been quick to make use of HPE’s acquisition of Silver Peak in September last year.More
Story image
Egnyte ensures greater security across Microsoft 365 with latest integrations
The new integrations are aimed at helping mid-sized organisations prevent data loss, address a growing number of regional privacy regulations, and simplify the overall management of content with minimal administrative overhead.More
Story image
Dell Technologies unveils new data protection innovations for hybrid cloud workloads
The Dell EMC PowerProtect Backup Service, powered by Druva, is designed to deliver SaaS app protection without increasing IT complexity.More
Story image
Why a more secure organisation is a collective responsibility
With vast volumes of data moving to the cloud, many IT professionals are frequently challenged to protect their enterprise environment, and there is a greater focus being placed on advancing cybersecurity strategies.More
Story image
Remote work continues, and endpoint security cited as a must
Nearly half of workers will stay remote after the pandemic ends, and two out of three IT professionals are concerned with endpoint misuse, according to Prey Software's new study.More
Story image
97% of organisations experienced a mobile threat in 2020 — report
93% of these attacks originated in a device network, which includes attempts to trick users into installing a malicious payload via infected websites or URLs, or to steal users’ credentials.More