Story image

Is your SD-WAN solution leaving you vulnerable?

26 Nov 2018

Article by Fortinet principal engineer and security strategist Joshua Alcock

Software-defined WAN (SD-WAN) is a highly disruptive force that is dramatically reshaping the enterprise router market, recent figures from Gartner show.

Enterprise spending on SD-WAN is growing at a CAGR of 76.2% from 2016 through 2020 as businesses use SD-WAN to save money and increase agility.

SD-WAN allows for the dynamic distribution of traffic across multiple locations while automatically responding to changing application policies.

Gartner has found that by 2018, more than 40% of WAN edge infrastructure refresh initiatives will be based on SD-WAN appliances versus traditional routers (up from less than 2% today)

SD-WAN is transport and carrier-agnostic, which means expensive dedicated WAN connections can be replaced with more cost-effective connections such as internet and LTE.  

Intelligent path selection ensures that the right traffic gets where it needs to in the most efficient way possible, whether it be out to an IaaS or SaaS platform, or to internally hosted applications.

Providing direct internet access to cloud-based applications has made deploying new security strategies designed for the distributed enterprise critical.

Why application detection?

Traditional security solutions tend to be placed in a single location on the perimeter, but as the perimeter disappears, security needs to be able to protect connections from any device in any location, and see and automatically adapt to the changing infrastructure on demand.

A key requirement of SD-WAN is to be able to accurately detect applications, as it forms the foundation for ensuring that critical business applications get the priority they require, while providing real-time threat protection.

Fortinet incorporates an application control as well as an internet services database that stays current, receiving ongoing updates from the FortiGuard threat intelligence services, leaving you better equipped to identify and classify new applications, including encrypted and cloud app traffic.

This application detection allows for control over path selection and prioritisation at an application and internet service level, providing greater visibility and control, ensuring that critical applications get the prioritisation and bandwidth they require.

With the rapid adoption of cloud applications, encrypted traffic has risen significantly, with over 75% of enterprise traffic expected to be encrypted by 2019.

Having the ability to decrypt and inspect this traffic at speed is critical for identifying traffic, and protecting against threats hiding inside these encrypted sessions, while still maintaining the expected agility these services offer.

Securing an expanded attack surface

As organisations look at SD-WAN options, what is often missing from their assessment is how to adequately address security risks, and these decisions are often made with security as an afterthought.

SD-WAN vendors are increasingly embedding security features into their offerings, but these tend to be basic controls and not the robust security functions that these environments require in order to protect against advanced threats that target the expanded attack surface introduced by SD-WAN.

Gartner is stating that by 2023, 50% of new firewall purchases in distributed enterprises will utilise SD-WAN features. Fortinet can deliver all of this functionality in one device, thereby reducing cost and power whilst simplifying deployments.

Fortinet is the only vendor with a “Recommended” designation for both SD-WAN and Next-Generation Firewall (NGFW) solutions by cybersecurity expert NSS Labs.

This demonstrates that our advanced SD-WAN offerings also provide completely integrated threat protection features such as NGFWs, anti-virus, intrusion prevention (IPS), and high-throughput SSL inspection.

Fortinet’s SD-WAN solutions are the first in the market to provide complete integrated security by replacing disparate WAN routers and security devices with a single integrated solution that can support and secure remote sites and users.

This unique approach provides exceptional cybersecurity while allowing them to deploy increased bandwidth applications, securely share cloud-based data, and automatically adapt to the evolving threat landscape - capabilities critical to successful digital transformation efforts.

How Red Hat aims to accelerate business value with container technologies
Red Hat announced that leading global companies are creating, extending and deploying integration services across hybrid and multicloud environments using agile integration architectures based on Red Hat technologies.
IT employers having to up salaries and bonuses to attract talent
As the modern economy relies increasingly on data, it’s certainly a good time to be working in IT.
Red Hat expands integration product capabilities
Adds end-to-end API lifecycle support and new capabilities for agile integration across hybrid architectures.
Electric car infrastructure needs to be a high priority
“Australians should be able to drive all over this massive nation with complete confidence in a zero-emission vehicle.”
Oracle updates enterprise blockchain platform
Oracle’s enterprise blockchain has been updated to include more capabilities to enhance development, integration, and deployment of customers’ new blockchain applications.
BMC adds IBM Cloud, Watson to Helix solution
BMC Helix with IBM Watson delivers cognitive insights across structured and unstructured federated knowledgebases.
Hyundai works with IBM to create a new blockchain-based platform
The network for commercial financing will supposedly provide participants with a single view of all the transactions happening in the network.
Why businesses should invest in energy automation
In industrial applications digital transformation allows businesses to do more with less.