Understanding the need to secure your SD-WAN platform

Issue 7 2020 IT infrastructure

An increasing number of businesses are switching to a Software-Defined Wide Area Network (SD-WAN), which is a unique approach to wide area networking, because it combines traditional WAN technologies with the internet and provides more visibility within an organisation.

The move to SD-WAN is largely driven by distributed enterprises with multiple remote offices, which are increasing using business-critical, cloud-based applications and tools that are migrating away from performance-inhibited wide-area networks (WAN).

Louis Kirstein.

According to Louis Kirstein, DSM expert: Connectivity Services at T-Systems South Africa, the visibility provided by a SD-WAN enables network administrators to oversee the network and monitor traffic for inconsistencies. From a security perspective, this functionality allows network administrators to ensure applications are performing accordingly and make sure security elements are running correctly.

“SD-WAN is an element of the bigger security framework of an organisation. If there’s one way to summarise how an SD-WAN fits into the overall security landscape of an organisation, it is to say that it enables centralised policy management and distributed policy enforcement,” Kirstein says.

Thus, one of the main advantages of SD-WAN is that it is software-defined and not hardcoded in infrastructure, so policies can be distributed from a central console to all sites and branches and these can be executed by various components.

Lukas van der Merwe.

Considering security

What makes SD-WAN technology so popular is that it allows businesses to make their networks more efficient and dynamic when it comes to consuming network resources, increasing bandwidth at a lower cost, as well as providing more options for connection types and vendor selection when building their networks.

At the same time, says Kirstein, organisations must give due consideration to securing their SD-WAN, as SD-WAN solutions do not provide in-built security, which is critical for direct Internet access. Yet, the need for an organisation to protect its IT environment from a hostile, public Internet, which is the carrier of its Internet traffic, is fundamental.

“SD-WAN platforms are inherently not secure. It’s the security technology within a secure SD-WAN solution that makes it safe. Secure SD-WAN allows each branch location to benefit from diverse security policies and connectivity, while IT enables corporate and Internet traffic simultaneously – on the same circuits,” he added.

“For organisations that are looking to address the security aspects of their SD-WAN deployments, certain vendors can deliver proprietary secure SD-WAN solutions that use the network’s firewall technology to perform routing,” says Lukas van der Merwe, specialist sales executive: Security at T-Systems South Africa.

No need for bolt-on layer

“There is no need for a bolt-on security layer to provide a holistic end-to-end security solution, in terms of network access. Secure SD-WAN has an architecture that includes a secure perimeter protection capability, as well as components that are needed to access cloud-based solutions.”

Van der Merwe notes that what is essentially different in a secure SD-WAN solution is that it has a distributed firewall topography, managed from a single point.

“A secure SD-WAN solution uses the firewall platform, which is distributed across the entire enterprise environment, towards each endpoint, the perimeter is broadened towards the branch offices and it is all managed centrally.”

SD-WAN functions need to be virtualised to keep up with evolving security threats and to control the cost of updating and upgrading security elements. Van der Merwe says that virtualising the functions, or the ability to define policies and deploy them centrally and in real time, provides more control and visibility, which – in the context of a secure SD-WAN solution – does improve security.

Ultimately, the benefits of a secure SD-WAN solution are undeniably extensive, and enable enterprises to not only meet compliance mandates, reduce infrastructure and circuit costs, but also to improve and simplify segmentation and decrease branch sprawl.

For more information contact T-Systems in South Africa, +27 11 254 7400, thami.malinga@t-systems.co.za, www.t-systems.com/za/en

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

TRENDnet introduces ONVIF conformant Smart Surveillance switches
Issue 7 2020, TRENDnet , IT infrastructure
Gigabit PoE+ Smart Surveillance switches support PoE self-healing and integrated camera management features, and are ONVIF Profile Q conformant.

COVID-19 will foster much needed collaboration in the future of work
Issue 7 2020 , IT infrastructure
Business leaders are starting to discuss the lessons learnt from these challenging times and how they can be used to shape the future world of work.

Fake cloud vs true cloud
Issue 7 2020 , IT infrastructure
Many organisations have invested in fake cloud solutions only to find out that the benefits they expected have not materialised.

Fibre the key to more effective community security
CCTV Handbook 2020 , IT infrastructure
Bringing reliable, affordable, high-speed fibre connectivity to a community signifies opportunities for upliftment, safety and security.

A cloud in your data centre
CCTV Handbook 2020 , IT infrastructure
Fully managed and configurable racks of AWS-designed hardware let customers in South Africa run their workloads on-premises and seamlessly connect with the broad array of AWS services in the cloud.

AI and self-healing
Issue 7 2020 , IT infrastructure
Storage infrastructure that has in-built capacity as well as the ability to self-heal and self-tune is critical.

Software-defined everything
Issue 7 2020 , IT infrastructure
BCX prepares businesses for the future with the launch of its Multi Domain Software Defined Network, applying intent-based networking throughout the enterprise.

Beating the recessionary blues
Issue 6 2020 , IT infrastructure
Most companies are looking to eke out savings by sweating technology assets a bit longer and by trimming operating costs.

Designing a modern security network
Issue 6 2020, Regal Distributors SA , IT infrastructure
Traditionally security networks have served us well, but with the rapid advancements in technology it may be time to review the requirements for your security network.

Home-grown, cloud-based safety and security solutions
Residential Estate Security Handbook 2020 , IT infrastructure, Integrated Solutions
BeSecure has taken security and communications technologies and turned them into what is best described as care and safety solutions for the estate community in South Africa.