The Rise Of SD-WAN And Its Implications For Security & Performance

In this digitally enabled hybrid and remote working world, it’s hard to recall the days when fixed Wide Area Networks (WAN) universally delivered our everyday enterprise network user experience by solidly moving data over a single, private network fixed grade connection. 

Back in the early 2010’s when online collaboration tools, video conferencing and VOIP were in their infancy, some forward-thinking vendors including Viptela (now part of Cisco)  and SilverPeak (Aruba/HP) started pioneering a Software-Defined Wide Area Networking (SD-WAN) as an alternate decentralised approach for networking that would allow for intelligent routing of traffic over multiple connections.

This approach - they promised - would optimise network traffic more efficiently for digital work enablement and respond far quicker to changing business needs such as adding more users/workspaces on the fly.

It would also reverse the backhauling of network traffic back through corporate HQs. Momentum and adoption was quick to follow and by 2015, Cisco, VMware, Fortinet, Palo Alto, Aruba and Citrix had all added SD-WAN cloud networking solutions. Users were able to significantly modernise their network performance and improve connectivity to apps and cloud services by enabling intelligent routing of traffic over multiple cloud connections.

Rapid growth of SD-WAN is still occurring with IDC continuing to project rapid annual growth of over 30%. Market analysts anticipate a global market projection of $13.7 billion by 2026. There are now millions of SD-WAN installations globally, enticed by its flexible design which supports optimised direct access to cloud-first strategies. Enterprises have found it essential for connecting branch locations and remote offices with SaaS applications and AWS and Microsoft Azure public clouds. Network Managers note some of the organisational key benefits as:-

1.    Enhanced Performance: With intelligent traffic routing and dynamic path selection over multiple protocols and technologies, SD-WAN elects for the most efficient paths based on real-time conditions. This brings optimal performance for applications prioritising high-bandwidth and low latency paths. SD-WAN also self-prioritises different types of applications depending on criticality to the business, ultimately delivering a premium user experience. 

2.    Fast Deployment and Cloud Integration:  Connecting new sites to a SD-WAN network is a comparative breeze given centralised management, zero touch provisioning and optimised access into cloud-based apps.

3.    Greater Resilience:  With automatic rerouting in the event of network failovers and multiple connection support (including MPLS, & broadband) SD-WAN can improve network reliability. 

4.    Greater Management:  SD-WAN offers a single view of managing the entire network.  It splits functions into two – managing the control plane and the data plane. With this holistic management comes finer controls, easier analytics on network performance and traffic; and when provisioned correctly from the outset, enhanced security.

5.    Lower costs:   In using WANs, organisations relied on expensive MPLS circuits to offer secure and reliable WAN connections. SD-WAN enables use of public internet connections like broadband or LTE, reducing connectivity costs. Often too, network devices like firewalls and VPNs can be combined into a single platform, reducing costs and IT required resources. 

The Security Challenge of SD-WAN – Security needs seamless integration and consideration into every phase of deployment:

But while this decentralised and joined approach offered by SD-WAN allows for greater agility and a better UX delivered from a dynamic core, it also broadens the possible number of ‘attack surfaces’ with the introduction of multiple entry points into the network. The dynamic nature of SD-WAN with multiple connection paths and constantly changing traffic patterns, needs a vigilant ‘monitor, manage, detect and respond’ security approach. All entry points need flexible and comprehensive security strategies to reduce vulnerabilities to cyber-attacks, cyber breaches and lack of compliance to digital security best practices.

Vulnerabilities are even greater still as SD-WAN often routes traffic over public internet connections which are inherently less secure.

It’s therefore essential that deployment of SD-WAN should go hand in hand with increased cyber surveillance; tracking and tools such as stronger encryption; vigilant monitoring; increased training of users and sophisticated firewalls.  Ideally integrating these increased security measures and monitoring should be planned in detail at the very beginning of the SD-WAN implementation, with security layered from the ground up. 

Enterprises with branches, remote offices and mobile users have embraced SD-WAN as new facilities can be extended and revoked with ease. However, without necessarily having dedicated IT onsite at these facilities, enterprises’ need to necessitate the same protection levels, monitoring, and consistent security policies across all locations. 

To achieve this integrated approach of the entire estate, some organisations have adopted a Unified Security Framework that combines and underlines the roles of firewalls, VPNs, cyber solutions, monitoring and external intrusion prevention with a formulated and integrated approach, often co-advised by a trusted networking partner. Adherence to a security framework has never been more important as the EU (and most developed countries) revise and release mandatory adherence to the NIS2 Directive in October 2024 to strengthen cybersecurity in critical and important infrastructure sectors – (and for their supply chain).

With the correct tools and continuous monitoring services, SD-WAN can be part of this NIS2 compliancy, enhancing visibility and control to mitigate risk, by ensuring regular updates, strong encryption and secure management across the organisation.

Some advanced network monitoring platforms now use machine learning to find anomalies and dynamically respond to cyber threats before they can impact SD-WAN infrastructures. 

John Diamond is Solutions Architect with Park Place Technologies

Image:  Sakorn Sukkasemsakorn

You Might Also Read: 

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Standards: The Key To Building A Sustainable Quantum-Safe Future 
Iranian State-Sponsored Hackers Attacking Israel »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

HackLabs

HackLabs

HackLabs is a penetration testing company providing services for network security, web application security and social engineering testing.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

Hassans International Law Firm

Hassans International Law Firm

Hassans is the largest law firm in Gibraltar, providing a full range of legal services across corporate and commercial law including Data Protection and GDPR compliance.

Kiberna

Kiberna

Kiberna are a small but niche company specialising in data driven security to manage your cyber risks.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

ZoobeTek

ZoobeTek

ZoobeTek are a company focused on preventing leaks related to the security of business information3.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

Cyro Cyber

Cyro Cyber

Cyro Cyber is a collective of some of the UK’s most experienced and savvy cybersecurity, information assurance, data protection, IT governance and compliance experts.

Auraya

Auraya

Auraya develops its next generation voice biometric AI to deliver easy-to-use and highly secure speaker recognition and fraud detection capabilities.