Understanding the need to secure your SD-WAN platform

Issue 7 2020 IT infrastructure

An increasing number of businesses are switching to a Software-Defined Wide Area Network (SD-WAN), which is a unique approach to wide area networking, because it combines traditional WAN technologies with the internet and provides more visibility within an organisation.

The move to SD-WAN is largely driven by distributed enterprises with multiple remote offices, which are increasing using business-critical, cloud-based applications and tools that are migrating away from performance-inhibited wide-area networks (WAN).


Louis Kirstein.

According to Louis Kirstein, DSM expert: Connectivity Services at T-Systems South Africa, the visibility provided by a SD-WAN enables network administrators to oversee the network and monitor traffic for inconsistencies. From a security perspective, this functionality allows network administrators to ensure applications are performing accordingly and make sure security elements are running correctly.

“SD-WAN is an element of the bigger security framework of an organisation. If there’s one way to summarise how an SD-WAN fits into the overall security landscape of an organisation, it is to say that it enables centralised policy management and distributed policy enforcement,” Kirstein says.

Thus, one of the main advantages of SD-WAN is that it is software-defined and not hardcoded in infrastructure, so policies can be distributed from a central console to all sites and branches and these can be executed by various components.


Lukas van der Merwe.

Considering security

What makes SD-WAN technology so popular is that it allows businesses to make their networks more efficient and dynamic when it comes to consuming network resources, increasing bandwidth at a lower cost, as well as providing more options for connection types and vendor selection when building their networks.

At the same time, says Kirstein, organisations must give due consideration to securing their SD-WAN, as SD-WAN solutions do not provide in-built security, which is critical for direct Internet access. Yet, the need for an organisation to protect its IT environment from a hostile, public Internet, which is the carrier of its Internet traffic, is fundamental.

“SD-WAN platforms are inherently not secure. It’s the security technology within a secure SD-WAN solution that makes it safe. Secure SD-WAN allows each branch location to benefit from diverse security policies and connectivity, while IT enables corporate and Internet traffic simultaneously – on the same circuits,” he added.

“For organisations that are looking to address the security aspects of their SD-WAN deployments, certain vendors can deliver proprietary secure SD-WAN solutions that use the network’s firewall technology to perform routing,” says Lukas van der Merwe, specialist sales executive: Security at T-Systems South Africa.

No need for bolt-on layer

“There is no need for a bolt-on security layer to provide a holistic end-to-end security solution, in terms of network access. Secure SD-WAN has an architecture that includes a secure perimeter protection capability, as well as components that are needed to access cloud-based solutions.”

Van der Merwe notes that what is essentially different in a secure SD-WAN solution is that it has a distributed firewall topography, managed from a single point.

“A secure SD-WAN solution uses the firewall platform, which is distributed across the entire enterprise environment, towards each endpoint, the perimeter is broadened towards the branch offices and it is all managed centrally.”

SD-WAN functions need to be virtualised to keep up with evolving security threats and to control the cost of updating and upgrading security elements. Van der Merwe says that virtualising the functions, or the ability to define policies and deploy them centrally and in real time, provides more control and visibility, which – in the context of a secure SD-WAN solution – does improve security.

Ultimately, the benefits of a secure SD-WAN solution are undeniably extensive, and enable enterprises to not only meet compliance mandates, reduce infrastructure and circuit costs, but also to improve and simplify segmentation and decrease branch sprawl.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A smart start for South African cities
Integrated Solutions IT infrastructure
Cameras and sensors can kick off smart city strategies in cities around South Africa, leading to not only improved security and safety, but also better service delivery in areas like electricity and water provisioning.

Read more...
The smart foundation of the digital business
IT infrastructure
Autonomous networks take an advanced step beyond merely automating components: they use artificial intelligence (AI), machine learning to self-configure, self-manage, and self-heal, ideally becoming better all the time.

Read more...
Converged infrastructure: Beyond the hype
IT infrastructure Products
Technical teams no longer have to sit and try to work through a magnum opus of manuals for every layer of computing, networking, and storage, largely thanks to the growing popularity and increasing success of converged infrastructure.

Read more...
Blurring the lines between data management and cybersecurity
Cyber Security IT infrastructure
In the past, data management and cybersecurity would fall under separate domains, but with more organisations making the shift to the cloud, data management and data protection have merged, essentially blurring the lines between the two.

Read more...
Top skills young people need to get ahead in the tech industry in 2023
IT infrastructure
The rise of remote working, e-commerce, artificial intelligence and cloud computing means that software developers are, and will continue to be, at the coalface of the fourth industrial revolution.

Read more...
Storage trends for 2023
IT infrastructure
As a leader in the enterprise storage market, Infinidat sees five storage trends unfolding in 2023. Looking ahead, 2023 is shaping up to be an exciting year in the storage market.

Read more...
Remote cloud management support for access points
TRENDnet IT infrastructure Products
TRENDnet Hive is an advanced network cloud management solution, designed to save users time and cost by simplifying and centralizing the management and monitoring of a network(s) and networked devices.

Read more...
How to avoid a wipeout
Arcserve Southern Africa IT infrastructure Security Services & Risk Management
Wiper malware aims to delete your data permanently and cause as much destruction as possible. Byron Horn-Botha, Business Unit Head at Arcserve Southern Africa offers readers three steps to protect the organisation from these malicious applications.

Read more...
Hardening physical security against cyberattacks
Genetec Editor's Choice Cyber Security IT infrastructure
As the world becomes increasingly interconnected through the move to cloud computing and Internet of Things (IoT) devices, cybercrime has risen steadily, along with tools to combat it. Geopolitical tensions have the potential to rapidly unleash devastating cyberattacks worldwide.

Read more...
Fast, reliable and secure cloud services
Technews Publishing Editor's Choice Cyber Security IT infrastructure
Security and speed are critical components of today’s cloud-based services infrastructure. Cloudflare offers a range of services supporting these goals beyond what most people think it does.

Read more...