SD-WANs potentially offer many compelling benefits. However, the result is that organizations have less knowledge about the infrastructure that is being used. Credit: Gerd Altmann Organizations are increasingly embracing the functionality and cost saving benefits offered by the blended or disaggregated network. However, current SD-WAN service models contain basic security flaws that threaten to compromise essential adoption.One of the biggest vulnerabilities is dependency on a vendor for security as an add-on. In the new connected, digital world, organizations need to protect data regardless of status location network; consistency of approach covering service provision and protection of data in transit needs to be considered at the forefront of network design.Service providers need to ask themselves how they can provide a trustworthy blended network, especially across public Internet and cloud services while reducing the need to deploy infrastructure at every gateway or network ingress point. How can they manage the encryption on encryption challenge? And how can they avoid the fundamental security risk associated with turning encryption off to investigate suspicious activity?Only in answering these fundamental questions will organizations be able to embrace the inherent benefits of all SDN based solutions without security compromise. Agility versus securityThe battle between achieving business agility and ensuring data in transit security has never been more challenging. Clearly the threat landscape has changed radically in recent years – just take the public announcement by the US Computer Emergency Readiness Team (US CERT) warning of state sponsored cyber-attacks on the US’s critical infrastructure. It is little wonder that recent CIO and CTO spend patterns reveal not only a concern with security, especially in securing the cloud, but also a need to understand what is happening to data and the ability to identify and address threats as they emerge.Yet, operationally driven moves away from MPLS networking technology towards Software Defined Networking (SDN), most notably for Wide Area Networks (WAN), could be creating security risks, or restrictions on the technology that can be deployed. Today, SD-WANs are offering an alternative to legacy WANs, offering agility, simplicity and the potential to lower costs. The model not only opens the opportunity to embrace blended communications infrastructures, from copper to Wi-Fi, fibre to satellite, to deliver the most efficient and low-cost solution for the distributed business, but the central management model transforms the excessive management overhead associated with complex legacy WAN infrastructure.The result of using an SD-WAN is reduced network costs of 30% to 50%, but only if it’s the same vendor end to end solution. For complex networks, networks at scale, or those operating in a High Information Assurance environment, those benefits remain questionable without an innovative approach to enabling third party infrastructure solutions to be deployed—and without a separate security overlay which can remove capacity constraints as well as vendor / network choice dependency.Current approach (what’s good and not so good)Many SDN vendors typically offer Layer 3 encryption technology as part of their SD-WAN service offerings: such security is beneficial for networks which have replaced a basic network with no protection. While counter-arguments suggest that encryption is too costly or too difficult to deploy for many enterprises, the reality is that deploying traditional Layer 3 encryption is better than nothing.But for new large SD-WAN providers who may be offering the solution from a shared orchestration instance, the question has to be asked as to how any enterprise can secure infrastructure operated by another vendor, and even where the orchestration platform is deployed, which presents another security concern. Furthermore, given that one of the most compelling reasons for embracing SD-WANs is the flexibility with which new infrastructure can be connected to support business change—a model that will, by default, result in infrastructure from multiple providers—how can an organization ensure each new connection is also secure?With organizations increasingly deploying application level encryption, there are also questions regarding performance and throughput. Encryption on encryption is a huge issue affecting both legacy and SD-WANs—with many SD-WAN deployments constrained not by the network bandwidth but the encryption overhead.Even more concerning is the fact that should an IT team wish to investigate an application or data source, these encryption solutions typically need to be turned off—leaving the organization wide open to attack from waiting hackers. Network disaggregationIt is in recognition of these many problems that growing numbers of CIOs and CSOs are pushing the disaggregation agenda, concluding that service and security should be separate and distinct from the management and maintenance of any SD-WAN. This trend reflects a different approach to safeguarding business critical communication infrastructure cost effectively and removing reliance on a single supplier.The only way to maximize the commercial benefits of SD-WANs and achieve essential security that reflects the emerging threat vectors is to embrace a security overlay model; to find a way to deploy end-to-end Layer 4 encryption across every part of the infrastructure, irrespective of the underpinning network technology.In addition to meeting the network disaggregation goals of many organizations, a network agnostic encryption solution can also reinforce the centralized management benefits of SD-WANs by providing centralized orchestration. This not only demonstrates how the network is being secured but also provides that essential insight into network activity and its security performance. And, should an application need to be investigated, there is no need to switch off all security protocols—ensuring the company is safeguarded at all times.SD-WANs potentially offer compelling benefits and in the new fiscal reality today are increasingly the only viable option for distributed organizations, especially given the growing use of Internet based infrastructure and the cloud. However, the result is that organizations have less knowledge about the infrastructure that is being used. Where is the data going? Who owns the network? Which route is being taken? And, critically, who is securing the data—and how? The less knowledge and control over the infrastructure, the more security control and knowledge an organization requires. It is only by taking that step towards network disaggregation, embracing a truly network agnostic encryption technology that can secure Data in Transit across any IP network, and achieving centralised security orchestration with full data visibility that organizations can confidently embrace SD-WANs and achieve that essential corporate agility without compromise. Related content opinion Cybersecurity – how confident (complacent?) are you? Cybersecurity must be a process of continual evolution: just because you feel protected today doesn’t mean you will be tomorrow. By Jim Kennedy Jun 21, 2018 5 mins Data Breach Technology Industry Hacking opinion Zero Trust: Why ‘cyber insurance’ offers no GDPR compliance With the finable GDPR compliance deadline just weeks away, the vultures are circling – and leading the pack is a group of companies touting so-called ‘cyber insurance’. While the majority of IT security vendors are opting to scare t By Jim Kennedy May 11, 2018 4 mins Regulation Government Technology Industry opinion Flexible security – time to forget the underlying infrastructure By focusing on the users, the applications and using pay-as-you-grow cryptographic segmentation to deliver scalable zero-trust access, organizations can achieve a far more flexible, affordable and effective security posture. By Jim Kennedy Mar 20, 2018 6 mins Technology Industry Data and Information Security Network Security opinion Cybersecurity skills shortage From vendor agnostic, standards and skills-based training to a commitment to inspiring the next generation to join the industry in the first place, everyone demanding a solution to cyber security skills shortage today needs to step up and become part By Jim Kennedy Mar 01, 2018 5 mins Technology Industry IT Skills Staff Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe