Story image

Is your SD-WAN solution leaving you vulnerable?

26 Nov 2018
Sponsored

Article by Fortinet principal engineer and security strategist Joshua Alcock

Software-defined WAN (SD-WAN) is a highly disruptive force that is dramatically reshaping the enterprise router market, recent figures from Gartner show.

Enterprise spending on SD-WAN is growing at a CAGR of 76.2% from 2016 through 2020 as businesses use SD-WAN to save money and increase agility.

SD-WAN allows for the dynamic distribution of traffic across multiple locations while automatically responding to changing application policies.

Gartner has found that by 2018, more than 40% of WAN edge infrastructure refresh initiatives will be based on SD-WAN appliances versus traditional routers (up from less than 2% today)

SD-WAN is transport and carrier-agnostic, which means expensive dedicated WAN connections can be replaced with more cost-effective connections such as internet and LTE.  

Intelligent path selection ensures that the right traffic gets where it needs to in the most efficient way possible, whether it be out to an IaaS or SaaS platform, or to internally hosted applications.

Providing direct internet access to cloud-based applications has made deploying new security strategies designed for the distributed enterprise critical.

Why application detection?

Traditional security solutions tend to be placed in a single location on the perimeter, but as the perimeter disappears, security needs to be able to protect connections from any device in any location, and see and automatically adapt to the changing infrastructure on demand.

A key requirement of SD-WAN is to be able to accurately detect applications, as it forms the foundation for ensuring that critical business applications get the priority they require, while providing real-time threat protection.

Fortinet incorporates an application control as well as an internet services database that stays current, receiving ongoing updates from the FortiGuard threat intelligence services, leaving you better equipped to identify and classify new applications, including encrypted and cloud app traffic.

This application detection allows for control over path selection and prioritisation at an application and internet service level, providing greater visibility and control, ensuring that critical applications get the prioritisation and bandwidth they require.

With the rapid adoption of cloud applications, encrypted traffic has risen significantly, with over 75% of enterprise traffic expected to be encrypted by 2019.

Having the ability to decrypt and inspect this traffic at speed is critical for identifying traffic, and protecting against threats hiding inside these encrypted sessions, while still maintaining the expected agility these services offer.

Securing an expanded attack surface

As organisations look at SD-WAN options, what is often missing from their assessment is how to adequately address security risks, and these decisions are often made with security as an afterthought.

SD-WAN vendors are increasingly embedding security features into their offerings, but these tend to be basic controls and not the robust security functions that these environments require in order to protect against advanced threats that target the expanded attack surface introduced by SD-WAN.

Gartner is stating that by 2023, 50% of new firewall purchases in distributed enterprises will utilise SD-WAN features. Fortinet can deliver all of this functionality in one device, thereby reducing cost and power whilst simplifying deployments.

Fortinet is the only vendor with a “Recommended” designation for both SD-WAN and Next-Generation Firewall (NGFW) solutions by cybersecurity expert NSS Labs.

This demonstrates that our advanced SD-WAN offerings also provide completely integrated threat protection features such as NGFWs, anti-virus, intrusion prevention (IPS), and high-throughput SSL inspection.

Fortinet’s SD-WAN solutions are the first in the market to provide complete integrated security by replacing disparate WAN routers and security devices with a single integrated solution that can support and secure remote sites and users.

This unique approach provides exceptional cybersecurity while allowing them to deploy increased bandwidth applications, securely share cloud-based data, and automatically adapt to the evolving threat landscape - capabilities critical to successful digital transformation efforts.

ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."
Forget endpoints—it’s time to secure people instead
Security used to be much simpler: employees would log in to their PC at the beginning of the working day and log off at the end. That PC wasn’t going anywhere, as it was way too heavy to lug around.
DimData: Fear finally setting in amongst vulnerable orgs
New data ranking the ‘cybermaturity’ of organisations reveals the most commonly targeted sectors are also the most prepared to deal with the ever-evolving threat landscape.
IXUP goes "post-quantum" with security tech upgrade
The secure analytics company has also partnered with Deloitte as a reseller, and launched a SaaS offering on Microsoft Azure.
Infoblox appoints channels head for A/NZ
Kenneth Cartwright’s appointment extends Infoblox’s position in secure cloud-managed network services throughout the region.
ExtraHop’s new partner program for enterprise security
New accreditations and partner portal enable channel partners to fast-track their expertise and build their security businesses.
Hackers increasingly ‘island hopping’ – so what does it mean?
Carbon Black's Rick McElroy discusses this new trend and what it means for the new age of cybercrime.
Trust without visibility is blind – Avi Networks
Enterprises are wanting to gain the trust of their customers, but are often found blindly defending themselves.