Hybrid networks and how we can secure them

Issue 1 2021 Editor's Choice

Organisations have distributed data and workloads across both cloud environments and on-premises data centres. As a result, IT teams have to deploy, manage, and secure increasingly complex and hybrid networks. And even though many organisations have moved much of their workloads into the cloud, the majority of them still operate hybrid environments.

Hybrid environments allow organisations to keep important data on-premises. This allows them to maintain full control over sensitive assets, while also taking full advantage of the scalability and agility the cloud provides. However, as organisations become more hybrid and distributed, their security needs to be able to span across all environments.


John Maddison.

Defining the hybrid network and determining how to secure it

As applications, resources, devices and workers work from anywhere, networks need to be able to adapt in real time. Workflows now often span physical data centres as well as multiple cloud environments; applications follow users regardless of where they are connecting from or what device they are using; and data and other resources need to be securely accessed by any user on any device in any location. Security needs to be able to adapt and scale to meet these new requirements.

Five essential security functions for hybrid networks

To properly protect and defend these hybrid environments, organisations should look for security solutions that provide the following critical functions:

1. Broad: Security solutions need to support a distributed security model where the exact same security solutions can be deployed in any environment.

2. Integrated: All of the various security solutions deployed across the network need to be able to see each other and work together as a single system to detect threats and respond to them in a coordinated fashion, regardless of where they occur.

3. Fast: These security functions need to operate not just at the speed of business, but at the speed of threats as well.

4. Automated: Anomalous and malicious behaviours need automated responses.

5. Security-driven networking: Security-driven networking weaves security and networking into a single, integrated system. This enables them to establish and enforce zero-trust access, dynamic network segmentation, and unified enforcement anywhere, on any device, in any location, without introducing security gaps or performance lags.

Networking and security to function as a single solution

The majority of today’s security solutions are simply not fast enough, nor smart or responsive enough, don’t operate in enough places, and can’t adapt as quickly as today’s businesses require. This is especially true in multi-vendor environments with disparate security solutions that don’t integrate when deployed. This lack of integration makes it impossible for organisations to securely use the flexible network environments they need to compete effectively.

Instead, these organisations need a security platform, like the Fortinet Security Fabric, designed to span, adapt to, and protect today’s dynamic environments. If they can’t, their business will not be able to keep up. And that is critical in today’s digital business environment, where the difference between success and failure can be measured in microseconds.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

FortiGuard labs reports disruptive shift of cyber threats
Issue 1 2021 , Editor's Choice
Threat intelligence from the second half of 2020 demonstrates an unprecedented cyber-threat landscape where cyber adversaries maximised the constantly expanding attack surface to scale threat efforts around the world. Adversaries proved to be highly adaptable, creating waves of disruptive and sophisticated attacks.

Read more...
The year resilience paid off
Issue 8 2020 , Editor's Choice, Security Services & Risk Management
Hi-Tech Security Solutions spoke to Michael Davies about business continuity and resilience in a year when everything was put to the test.

Read more...
Retail solutions beyond security
Issue 8 2020, Axis Communications SA, Technews Publishing, Hikvision South Africa , Editor's Choice, CCTV, Surveillance & Remote Monitoring
The need for security technology to deliver more than videos of people falling or stealing from retail stores is greater than ever.

Read more...
Smart healthcare
Issue 2 2021 , Editor's Choice
In the past year, hospitals, elder care and other healthcare facilities have found themselves overwhelmed with new patients, COVID-19 regulations and other side effects of the pandemic. As efforts focused ...

Read more...
Platform-based access management solution
Issue 2 2021, ASSA ABLOY South Africa , Editor's Choice
Available in South Africa and throughout sub-Saharan Africa, new Incedo Business connects all your security software and hardware within one platform. You can easily scale it up or down, based on your needs, to keep your people moving and your business growing.

Read more...
FS Systems celebrates 50 years
Issue 2 2021 , Editor's Choice
This year, FS Systems celebrates 50 years in the fire detection and enterprise security market, successfully executing projects in over nine countries in Africa and LATAM.

Read more...
Formative AI and distributed cloud among four megatrends revealed at MIPS 2021
Issue 2 2021, Milestone Systems , Editor's Choice
Almost 4000 participants representing end customers, technology partners and media from across the globe attended the first virtual MIPS conference, held over two days in March 2021.

Read more...
Kiss passwords G00dby3
Issue 2 2021 , Editor's Choice
Cisco Secure has unveiled infrastructure agnostic, passwordless authentication by Duo which enables enterprise users to skip the password and securely log into cloud applications via security keys or biometrics built into modern laptops and smartphones.

Read more...
200 000 daily access transactions
Issue 2 2021, Impro Technologies , Editor's Choice
The University of KwaZulu-Natal’s legacy access control system was suffering from increasingly limited support, both in terms of hardware and software, with maintenance becoming a pressing concern as it on-boards approximately 9000 new students each year across five campuses.

Read more...
From the editor's desk: Maybe security should STTFS
Issue 2 2021, Technews Publishing , News
The IT industry has an acronym, RTFM, Read the Manual; you’ll notice I left the F out. The same can be said for the security industry, but a recent experience has shown me that both industries, even as ...

Read more...