Hybrid networks and how we can secure them

Issue 1 2021 Editor's Choice

Organisations have distributed data and workloads across both cloud environments and on-premises data centres. As a result, IT teams have to deploy, manage, and secure increasingly complex and hybrid networks. And even though many organisations have moved much of their workloads into the cloud, the majority of them still operate hybrid environments.

Hybrid environments allow organisations to keep important data on-premises. This allows them to maintain full control over sensitive assets, while also taking full advantage of the scalability and agility the cloud provides. However, as organisations become more hybrid and distributed, their security needs to be able to span across all environments.


John Maddison.

Defining the hybrid network and determining how to secure it

As applications, resources, devices and workers work from anywhere, networks need to be able to adapt in real time. Workflows now often span physical data centres as well as multiple cloud environments; applications follow users regardless of where they are connecting from or what device they are using; and data and other resources need to be securely accessed by any user on any device in any location. Security needs to be able to adapt and scale to meet these new requirements.

Five essential security functions for hybrid networks

To properly protect and defend these hybrid environments, organisations should look for security solutions that provide the following critical functions:

1. Broad: Security solutions need to support a distributed security model where the exact same security solutions can be deployed in any environment.

2. Integrated: All of the various security solutions deployed across the network need to be able to see each other and work together as a single system to detect threats and respond to them in a coordinated fashion, regardless of where they occur.

3. Fast: These security functions need to operate not just at the speed of business, but at the speed of threats as well.

4. Automated: Anomalous and malicious behaviours need automated responses.

5. Security-driven networking: Security-driven networking weaves security and networking into a single, integrated system. This enables them to establish and enforce zero-trust access, dynamic network segmentation, and unified enforcement anywhere, on any device, in any location, without introducing security gaps or performance lags.

Networking and security to function as a single solution

The majority of today’s security solutions are simply not fast enough, nor smart or responsive enough, don’t operate in enough places, and can’t adapt as quickly as today’s businesses require. This is especially true in multi-vendor environments with disparate security solutions that don’t integrate when deployed. This lack of integration makes it impossible for organisations to securely use the flexible network environments they need to compete effectively.

Instead, these organisations need a security platform, like the Fortinet Security Fabric, designed to span, adapt to, and protect today’s dynamic environments. If they can’t, their business will not be able to keep up. And that is critical in today’s digital business environment, where the difference between success and failure can be measured in microseconds.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...
Digital transformation in mines
NEC XON Technews Publishing Mining (Industry)
Digital transformation has been hyped to death, but is a reality all companies in all industries need to address, including the mining sector. BCX and NEC XON weigh in on the challenges mines face.

Read more...
Fire safety in mining
Technews Publishing Mining (Industry)
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...
Cybersecurity in mining
Technews Publishing Mining (Industry)
One does not usually associate mining with cybersecurity, but as big technology users (including some legacy technology that was not designed for cyber risks), mines are at risk from cyber threats in several areas.

Read more...