Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • IT Management
    • Networking

    How to Refocus Network Security During a Crisis

    Written by

    Zeus Kerravala
    Published June 23, 2020
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Enterprises are especially vulnerable during a pandemic crisis like the current one, since the majority of employees working from home open up new vulnerabilities—everything from shadow IT to unmanaged devices to unsecured internet access.

      Because companies are at an increased risk for cyberattacks, safeguarding networks and systems is more crucial than ever. To address today’s challenges, it’s important to consider network architectures that can secure voice, video, application and data traffic while also protecting headquarters and branch offices.

      Work From Home Creates New Security Risks

      A recent alert from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned about rising COVID-19-related malware and ransomware attacks, as well as an increase in “potentially vulnerable services” such as virtual private networks (VPNs) that create additional threats for businesses and individuals. Cybercriminals are taking advantage of weaknesses in VPNs, remote office tools and teleconferencing platforms. Attacks on Microsoft’s Remote Desktop Protocol (RDP) endpoints are also on the rise, with a 127 percent increase in exposed RDP endpoints, according to CISA.

      Uncertainties surrounding the pandemic are driving business leaders to prioritize network security. Enterprises need robust solutions and technical expertise to help navigate the challenges of securing networks as the number of endpoints continue to skyrocket. More companies are turning to software-defined wide-area networking (SD-WAN) as a virtual architecture of choice to mitigate the security risks of connecting remote users to enterprise networks.

      SD-WANs Secure Private WANs and Cloud Connectivity

      SD-WANs enable multiple secure connections—both private and public—directly to the cloud without backhauling all traffic back to corporate data centers. Yet, unauthorized access to cloud services that goes undetected by IT continues to be a problem. That’s due to vanilla SD-WAN solutions that fail to provide enough protection from increasingly sophisticated security threats. Internet protocol (IP) communications, in particular, are susceptible to denial of service (DoS) attacks and privacy breaches.

      Only a SD-WAN with built-in multilayered security can fully safeguard enterprise multicloud environments against unauthorized traffic. A secure SD-WAN must have failsafe features, dynamically changing encryption keys to encrypt all traffic, and it should be able to support any architecture. Oracle incorporated those capabilities into its SD-WAN solution, designed specifically for enterprises that want to secure and consolidate their communications infrastructure. Oracle SD-WAN shields IP-based systems from threats by securing real-time communications on both trusted and untrusted networks.

      Oracle’s SD-WAN Takes a Multilayered Approach to Security

      Oracle SD-WAN provides five layers of encryption, secure message session and cloud/network authentication and service protection with distributed firewalls. When data is sent across public links, the SD-WAN ensures that it won’t be compromised by using either 128-bit or 256-bit Advanced Encryption Standard (AES). Meanwhile, distributed firewalls give enterprises control over every office and branch location that accesses the network. Distributed firewalls deliver additional security and segmentation of the network by employing virtual routing and forwarding (VRF).

      With so many remote workers needing access from home, the traditional hub-and-spoke model that requires all security services to be located in a centralized site is problematic for enterprises with evolving networks. A SD-WAN that serves as a regional hub can improve performance and security by grouping branches into regions that connect back to a central hub in a specific location. Regional hubs offer effective backhauling over short distances, which minimizes changes to network security.

      SD-WANs Simplify Global Policy Management

      Oracle SD-WAN simplifies the configuration process since firewall policies are created at the global level. The global configuration consists of policy templates that can be applied to all sites. Such firewall policies can block inbound traffic that didn’t result from an outbound session. An external firewall wouldn’t have the ability to look inside SD-WAN’s traffic in this manner to apply policies.

      Oracle integrates with other cloud-based security providers such as Zscaler and Palo Alto Networks to provide internet protocol security (IPsec) connectivity. For example, Oracle SD-WAN can forward all internet traffic to the Zscaler cloud gateway and run Palo Alto’s next-generation firewall (NGFW).

      A clear understanding of which security features are built into a SD-WAN solution can help enterprises make informed decisions based on their needs. Most importantly, it’s time for enterprises to move away from the hub-and-spoke security model to a distributed model, so that every remote connection to cloud services can be secured from the get-go.

      The need for endpoint security isn’t going away after the pandemic, because multicloud networks will continue to grow more complex.

      Zeus Kerravala is an eWEEK regular contributor and the founder and principal analyst with ZK Research. He spent 10 years at Yankee Group and prior to that held a number of corporate IT positions.

      Zeus Kerravala
      Zeus Kerravala
      https://zkresearch.com/
      Zeus Kerravala is an eWEEK regular contributor and the founder and principal analyst with ZK Research. He spent 10 years at Yankee Group and prior to that held a number of corporate IT positions. Kerravala is considered one of the top 10 IT analysts in the world by Apollo Research, which evaluated 3,960 technology analysts and their individual press coverage metrics.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.