Hybrid networks and how we can secure them

Issue 1 2021 Editor's Choice

Organisations have distributed data and workloads across both cloud environments and on-premises data centres. As a result, IT teams have to deploy, manage, and secure increasingly complex and hybrid networks. And even though many organisations have moved much of their workloads into the cloud, the majority of them still operate hybrid environments.

Hybrid environments allow organisations to keep important data on-premises. This allows them to maintain full control over sensitive assets, while also taking full advantage of the scalability and agility the cloud provides. However, as organisations become more hybrid and distributed, their security needs to be able to span across all environments.


John Maddison.

Defining the hybrid network and determining how to secure it

As applications, resources, devices and workers work from anywhere, networks need to be able to adapt in real time. Workflows now often span physical data centres as well as multiple cloud environments; applications follow users regardless of where they are connecting from or what device they are using; and data and other resources need to be securely accessed by any user on any device in any location. Security needs to be able to adapt and scale to meet these new requirements.

Five essential security functions for hybrid networks

To properly protect and defend these hybrid environments, organisations should look for security solutions that provide the following critical functions:

1. Broad: Security solutions need to support a distributed security model where the exact same security solutions can be deployed in any environment.

2. Integrated: All of the various security solutions deployed across the network need to be able to see each other and work together as a single system to detect threats and respond to them in a coordinated fashion, regardless of where they occur.

3. Fast: These security functions need to operate not just at the speed of business, but at the speed of threats as well.

4. Automated: Anomalous and malicious behaviours need automated responses.

5. Security-driven networking: Security-driven networking weaves security and networking into a single, integrated system. This enables them to establish and enforce zero-trust access, dynamic network segmentation, and unified enforcement anywhere, on any device, in any location, without introducing security gaps or performance lags.

Networking and security to function as a single solution

The majority of today’s security solutions are simply not fast enough, nor smart or responsive enough, don’t operate in enough places, and can’t adapt as quickly as today’s businesses require. This is especially true in multi-vendor environments with disparate security solutions that don’t integrate when deployed. This lack of integration makes it impossible for organisations to securely use the flexible network environments they need to compete effectively.

Instead, these organisations need a security platform, like the Fortinet Security Fabric, designed to span, adapt to, and protect today’s dynamic environments. If they can’t, their business will not be able to keep up. And that is critical in today’s digital business environment, where the difference between success and failure can be measured in microseconds.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The year resilience paid off
Issue 8 2020 , Editor's Choice, Security Services & Risk Management
Hi-Tech Security Solutions spoke to Michael Davies about business continuity and resilience in a year when everything was put to the test.

Read more...
Retail solutions beyond security
Issue 8 2020, Axis Communications SA, Technews Publishing, Hikvision South Africa , Editor's Choice, CCTV, Surveillance & Remote Monitoring
The need for security technology to deliver more than videos of people falling or stealing from retail stores is greater than ever.

Read more...
Keep drivers and customer packages safe
Issue 1 2021, Technews Publishing , Editor's Choice
AURA, South Africa’s security and safety platform has partnered with The Courier Guy to ensure the safety of drivers and customer packages via a mobile panic app as well as a cutting-edge Internet-of-Things (IoT) linked panic button.

Read more...
YouTube makes everyone an installer
Issue 1 2021, Bidvest Protea Coin, RR Electronic Security Solutions, ISF SFP, Rhyco Risk Projects, Technews Publishing , Editor's Choice
Hi-Tech Security Solutions posed the question: can companies do all or some of their security work in-house or is there still a need for installers and integrators?

Read more...
Pay-per-use AI analytics
Issue 1 2021 , Editor's Choice
IoT Revolution Technologies has come to market with a new way of managing and analysing video feeds from any cameras, even analogue cameras, in a manner and at a cost most won’t believe until they see it.

Read more...
Six technology trends affecting the security sector in 2021
Issue 1 2021, Axis Communications SA , Editor's Choice
Looking back, we know that periods of uncertainty underscore the need for agility and an open approach to problem solving, whatever the future holds.

Read more...
Reset. Reboot. Redefine Business 2021.
Issue 1 2021 , Editor's Choice
It is time for organisations to reset their expectations and their goals to ensure that they can thrive in the next normal.

Read more...
Why you want to ‘pot’ your access equipment
Issue 1 2021 , Editor's Choice
Moisture, insulation and vibration, among other variables, can provide false alarms as well as damaged results and other failures to access control equipment.

Read more...
Top emerging technologies to watch in 2021
Issue 1 2021 , Editor's Choice
Foresight 2021 from Lux Research ranks the technologies and trends that will change the world over the next decade.

Read more...
Top ten security industry trends in 2021
Issue 1 2021, Hikvision South Africa , Editor's Choice
Several significant shifts in the use of technology are expected to accelerate in 2021, for example, increasing multi-perception technologies, the convergence of security systems, the popularity of artificial intelligence, and the rise of cloud solutions.

Read more...