Overcoming the Limitations of VPN with SD-WAN
Ensure Application Performance and Security at the Edge
August 19, 2019

Michelle Arney
Cybera

Share this

Public or private, commercial or nonprofit, digital transformation has become today's paradigm for organizations seeking to improve business processes, control costs, and gain or maintain competitive advantage. Unfortunately for most, they are hampered with legacy infrastructures that were simply not intended or designed for today's compute reality, and are incapable of delivering the performance, agility and security necessary to realize the promise of true digital transformation.

One common infrastructure challenge arises with virtual private networks (VPNs). VPNs have long been relied upon to deliver the network connectivity and security enterprises required at a price they could afford. Organizations still routinely turn to them to provide internal and trusted third-parties with "secure" remote access to isolated networks. However, with the rise in mobile, IoT, multi- and hybrid-cloud, as well as edge computing, traditional enterprise perimeters are extending and becoming blurred. And, today's VPNs are actually introducing the security and compliance risks that they were originally employed to prevent.

Today's Inherent VPN Issues

Reliance on VPNs presents enterprises with a number of fundamental problems in today's digital business environment, such as management complexity. Enterprises oftentimes find themselves with multiple disparate VPN connections to accommodate the networking technology of each third party. This can become not only an administrative nightmare, but also opens up the opportunity for "lateral movement attacks" as it dramatically expands the network surface area that is exposed and vulnerable since each external user has now essentially been granted access to a "slice of the network."

Today's VPNs are also rigid and require labor-intensive management to support dynamic network conditions, especially when it comes to remote locations. For example, adjusting to changing network requirements, the addition of new applications, or responding to emerging security situations must be done quickly and continuously to ensure business continuity. Legacy networks are often too bulky to adapt to shifting circumstances in a well-timed manner.

Compounding the problems, traditional security approaches are falling short of the requirements of today's highly distributed enterprises. For example, multiple touch points for manual security configurations leave networks prone to misconfigurations or inconsistent configurations — exposing them to security risks. Moreover, then there is the rising cost factor. The capital expenditure for various point-product hardware, public IP addresses, and software continues to escalate, as do the costs of qualified IT professionals to support remote locations.

With such significant challenges presented by traditional VPNs, it is clear that distributed enterprises need a modern approach to modernize network connectivity, and support their digital transformation strategies. A software-defined wide area network (SD-WAN) presents an ideal alternative. One that is quickly being adopted by today's forward looking organizations.

Enter the SD-WAN

SD-WAN is a software-based technology for connecting remote locations to distributed enterprise networks. SD-WANs operate as a network overlay, enabling remote sites to consolidate multiple network functions and applications across low-cost broadband connections.

Because they are software-based, SD-WANs decrease the number of network devices and connections needed at each site, dramatically decreasing network complexity and costs — particularly at the network edge. Here, agility is key, as enterprises can remotely customize and reconfigure SD-WANs to support rapidly changing requirements and deploy system updates.

In particular, secure SD-WAN solutions significantly simplify enterprise networks and dramatically reduce both the capital and operating expenses (CapEx and OpEx) associated with managing enterprise WANs. SD-WANs also simply extend the multi-layer security defenses used in data centers to remote locations. Most importantly, they are able to segment various types of applications into their own dedicated logical networks, preventing them from interacting with other application traffic on the network. For example, mission-critical applications (such as payment processing) can safely coexist with public applications (such as Guest Wi-Fi) on a single network.

By virtualizing the network so that all network intelligence is managed in the software, enterprises can concurrently establish remote locations and keep them in sync using centralized cloud-based policy administration that is inherent in SD-WAN connectivity models. This modern cloud-based approach further reduces cost and complexity while increasing overall network flexibility.

Easy Street to Digital Transformation, and Application Security and Performance at the Edge

Any enterprise that would like to get started with an SD-WAN deployment should create a data connectivity and security program for their remote locations. To ensure a holistic approach, engaging stakeholders to is critical. A pilot installation can rapidly demonstrate the practical benefits of a secure SD-WAN solution. A wider, incremental roll-out on a site-by-site basis can then help to ensure a seamless deployment with virtually zero interruption in service.

The need to address legacy technology is an inescapable reality in today's dynamic IT and business environment. For most, connectivity architectures are at the top of the list. While an ideal and smart choice at the time of deployment, most VPNs have outlived their usefulness and now pose a security risk and put a damper on productivity.

The challenge for any organization on a digital transformation journey is that from infrastructure to applications to processes, every element is so very crucial. Consequently, dependence on a legacy network when for example you are deploying an innovative new application, can quickly derail your efforts. Only a modern approach to connectivity — such as a cloud-based SD-WAN solution — ensures a clear road to continued business success from the data center to the network edge and beyond.

Michelle Arney is Head of Product at Cybera
Share this

The Latest

July 25, 2024

The 2024 State of the Data Center Report from CoreSite shows that although C-suite confidence in the economy remains high, a VUCA (volatile, uncertain, complex, ambiguous) environment has many business leaders proceeding with caution when it comes to their IT and data ecosystems, with an emphasis on cost control and predictability, flexibility and risk management ...

July 24, 2024

In June, New Relic published the State of Observability for Energy and Utilities Report to share insights, analysis, and data on the impact of full-stack observability software in energy and utilities organizations' service capabilities. Here are eight key takeaways from the report ...

July 23, 2024

The rapid rise of generative AI (GenAI) has caught everyone's attention, leaving many to wonder if the technology's impact will live up to the immense hype. A recent survey by Alteryx provides valuable insights into the current state of GenAI adoption, revealing a shift from inflated expectations to tangible value realization across enterprises ... Here are five key takeaways that underscore GenAI's progression from hype to real-world impact ...

July 22, 2024
A defective software update caused what some experts are calling the largest IT outage in history on Friday, July 19. The impact reverberated through multiple industries around the world ...
July 18, 2024

As software development grows more intricate, the challenge for observability engineers tasked with ensuring optimal system performance becomes more daunting. Current methodologies are struggling to keep pace, with the annual Observability Pulse surveys indicating a rise in Mean Time to Remediation (MTTR). According to this survey, only a small fraction of organizations, around 10%, achieve full observability today. Generative AI, however, promises to significantly move the needle ...