Hybrid networks and how we can secure them

Issue 1 2021 Editor's Choice

Organisations have distributed data and workloads across both cloud environments and on-premises data centres. As a result, IT teams have to deploy, manage, and secure increasingly complex and hybrid networks. And even though many organisations have moved much of their workloads into the cloud, the majority of them still operate hybrid environments.

Hybrid environments allow organisations to keep important data on-premises. This allows them to maintain full control over sensitive assets, while also taking full advantage of the scalability and agility the cloud provides. However, as organisations become more hybrid and distributed, their security needs to be able to span across all environments.


John Maddison.

Defining the hybrid network and determining how to secure it

As applications, resources, devices and workers work from anywhere, networks need to be able to adapt in real time. Workflows now often span physical data centres as well as multiple cloud environments; applications follow users regardless of where they are connecting from or what device they are using; and data and other resources need to be securely accessed by any user on any device in any location. Security needs to be able to adapt and scale to meet these new requirements.

Five essential security functions for hybrid networks

To properly protect and defend these hybrid environments, organisations should look for security solutions that provide the following critical functions:

1. Broad: Security solutions need to support a distributed security model where the exact same security solutions can be deployed in any environment.

2. Integrated: All of the various security solutions deployed across the network need to be able to see each other and work together as a single system to detect threats and respond to them in a coordinated fashion, regardless of where they occur.

3. Fast: These security functions need to operate not just at the speed of business, but at the speed of threats as well.

4. Automated: Anomalous and malicious behaviours need automated responses.

5. Security-driven networking: Security-driven networking weaves security and networking into a single, integrated system. This enables them to establish and enforce zero-trust access, dynamic network segmentation, and unified enforcement anywhere, on any device, in any location, without introducing security gaps or performance lags.

Networking and security to function as a single solution

The majority of today’s security solutions are simply not fast enough, nor smart or responsive enough, don’t operate in enough places, and can’t adapt as quickly as today’s businesses require. This is especially true in multi-vendor environments with disparate security solutions that don’t integrate when deployed. This lack of integration makes it impossible for organisations to securely use the flexible network environments they need to compete effectively.

Instead, these organisations need a security platform, like the Fortinet Security Fabric, designed to span, adapt to, and protect today’s dynamic environments. If they can’t, their business will not be able to keep up. And that is critical in today’s digital business environment, where the difference between success and failure can be measured in microseconds.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
From the editor's desk: Showtime for Securex
Technews Publishing News & Events
We have once again reached the time of year when the security industry focuses on Securex. This issue includes a short preview, with more coming online and via our special Securex Preview news briefs. ...

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
Digitising security solutions with AI and smart integration
Regal Security Distributors SA Technews Publishing Integrated Solutions
The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Read more...
From the editor's desk: We’ve only just begun
Technews Publishing News & Events
The surveillance market has expanded far beyond the analogue days of just recording and/or monitoring screens. The capabilities of surveillance technology today extend to black screen monitoring with ...

Read more...
The future of the surveillance channel
Duxbury Networking Technews Publishing Elvey Security Technologies SMART Security Solutions Surveillance
The video surveillance market has evolved from camera-based specifications to integrated solutions that solve customers’ problems. Moreover, the growth of AI and cloud has changed the channel even more, with more to come.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
AI means proactive surveillance
DeepAlert Technews Publishing SMART Security Solutions AI & Data Analytics Surveillance
SMART Security Solutionsasked DeepAlert for some insight into how AI is transforming video surveillance, even to the extent of it being taught to protect the privacy of those in the cameras’ view.

Read more...