Ease IoT Complexity at the Branch with SD-WAN
February 08, 2018

Shamus McGillicuddy
EMA

Share this

Software-defined WAN (SD-WAN) solutions will play an important role in enabling enterprise Internet of Things (IoT) initiatives. Most enterprises are experiencing growth in the number of endpoints connecting to the network in branch offices and remote sites. According to recent Enterprise Management Associates (EMA) research, 59% of enterprises say that IoT devices are a significant source of that growth, contributing more than smartphones and tablets.

IoT devices in remote sites will present challenges around bandwidth, security, policy management, and more. These challenges will be exacerbated by the fact that most remote sites lack onsite IT personnel who can ensure that IoT devices are safely connected to the network. SD-WAN solutions have the potential to address many of these challenges.

SD-WAN Addresses IoT Bandwidth Demands, QoS Complexity

Nearly half (47%) of network professionals involved in an IoT initiative are delivering IoT connectivity via their existing WAN services, according to EMA research. Additionally, 77% of network teams expect their IoT ecosystems to add “significant” or “very significant” traffic to the network by next year. And many IoT applications receive a high priority on the network.

Our research has found that 27% of network pros assign IoT traffic a high quality of service (QoS) setting, and only 12% dump IoT traffic into a best-effort QoS tier. Thus, IoT devices not only demand bandwidth. They may bump other applications out of the way. Enterprises are going to need more bandwidth and more sophisticated QoS technology.

Fortunately, SD-WAN solutions deliver added bandwidth and granular, easy-to-use QoS controls. SD-WAN solutions are highly programmable via a graphical user interface, allowing engineers to assign and adjust QoS settings for applications on a global basis. SD-WAN solutions also enable hybrid connectivity, allowing enterprises to supplement MPLS connectivity with cheaper broadband links. This drives down the cost per bit at remote sites without sacrificing network service reliability.

SD-WAN Will Help Secure IoT at the Branch

The very same programmatic controls that facilitate QoS management in SD-WAN technology will also help enterprises segment the network and secure IoT connectivity. From a central location, network engineers can use a SD-WAN’s graphical user interface to create global VLANs dedicated to IoT, ensuring that thermostats and factory robots are never able to ping a financial records database, for instance. This is critical because IoT presents myriad security problems for the network team.

IoT devices often lack the power and computing resources necessary to support channel-based security techniques like TLS. These same constraints also make it difficult for network managers to discover IoT devices with traditional network management tools, which challenges their ability to find rogue devices. Strict LAN segmentation that maps onto SD-WAN segments ensures that isolation is maintained throughout the network.

SD-WAN solutions also typically offer native or third-party integrated security services, like firewall and malware detection. These security services can be deployed in a distributed architecture, allowing granular security controls at every branch. As EMA research has shown that nearly half of network teams (47%) have determined that their existing network security infrastructure cannot cope with the scale of their IoT ecosystems, these security controls will prove especially valuable to enterprises. The distributed security model of an SD-WAN solution will ease this scaling issue.

If you are supporting IoT on your WAN, ask your SD-WAN vendor if they can help.

Shamus McGillicuddy is Senior Analyst, Network Management at Enterprise Management Associates (EMA)
Share this

The Latest

April 19, 2018

In the course of researching, documenting and advising on user experience management needs and directions for more than a decade, I've found myself waging a quiet (and sometimes not so quiet) war with several industry assumptions. Chief among these is the notion that user experience management (UEM) is purely a subset of application performance management (APM). This APM-centricity misses some of UEM's most critical value points, and in a basic sense fails to recognize what UEM is truly about ...

April 18, 2018

We now live in the kind of connected world where established businesses that are not evolving digitally are in jeopardy of becoming extinct. New research shows companies are preparing to make digital transformation a priority in the near future. However most of them have a long way to go before achieving any kind of mastery over the multiple disciples required to effectively innovate ...

April 17, 2018

IT Transformation can result in bottom-line benefits that drive business differentiation, innovation and growth, according to new research conducted by Enterprise Strategy Group (ESG) ...

April 16, 2018

While regulatory compliance is an important activity for medium to large businesses, easy and cost-effective solutions can be difficult to find. Network visibility is an often overlooked, but critically important, activity that can help lower costs and make life easier for IT personnel that are responsible for these regulatory compliance solutions ...

April 12, 2018

This is the third in a series of three blogs directed at recent EMA research on the digital war room. In this blog, we'll look at three areas that have emerged in a spotlight in and of themselves — as signs of changing times — let alone as they may impact digital war room decision making. They are the growing focus on development and agile/DevOps; the impacts of cloud; and the growing need for security and operations (SecOps) to team more effectively ...

April 11, 2018

As we've seen, hardware is at the root of a large proportion of data center outages, and the costs and consequences are often exacerbated when VMs are affected. The best answer, therefore, is for IT pros to get back to basics ...

April 10, 2018

Risk is relative. The Peltzman Effect describes how humans change behavior when risk factors are reduced. They often act more recklessly and drive risk right back up. The phenomenon is recognized by many economists, its effects have been studied in the field of medicine, and I'd argue it is at the root of an interesting trend in IT — namely the increasing cost of downtime despite our more reliable virtualized environments ...

April 09, 2018

How do enterprises prepare for the future that our Cloud Vision 2020 survey forecasts? I see three immediate takeaways to focus on ...

April 06, 2018

When will we be at a point where virtually all enterprise workloads are run in the cloud and how will that change things for IT? To find out, we commissioned a survey, Cloud Vision 2020: The Future of the Cloud. The results were fascinating. I'll share three fundamental lessons we learned in the survey ...

April 05, 2018

The digital war room — physical, virtual or hybrid — is not in retreat but in fact is growing in scope to include greater participation from development and security. It's also becoming more proactive, with on average more than 30% of "major incidents" before they impacted business service performance. In this blog I'm providing a few additional highlights from the insights we got on digital war room organization and processes ...