The Case for Intent-Based Segmentation with SD-WAN

Intent-based Segmentation Allows Networks to Dynamically Adapt for Advanced Threat Mitigation 


SD-WAN is a perfect example of how digital innovation (DI) efforts are redefining how businesses operate and networks function. It combines remote workers, multi-cloud platforms, business-critical applications, and advanced networking into a single, integrated system. And when combined with a fully integrated security solution, it can vastly improve an organization’s security posture and protection across the distributed WAN.


However, providing an advanced set of technologies that enable fast and reliable access to critical resources is less effective if the network on the other side of the firewall hasn't been adequately secured. Traditional security approaches tend to be perimeter-centric, meaning that the majority of security resources are focused on things like posting a next-gen firewall and AAA services at the network edge. But far too often, the network behind the firewall is flat and open. With little effort, users can move laterally across the network, which also means that threats are often able to cross over to POS or other restricted corporate network resources. And worse, because there is so little security monitoring the internal network, events such as those can remain undetected for months. 


In addition, ongoing complexity from infrastructure expansion projects as well as mergers and acquisitions as part of business development can also compound the challenge to implementing security measures if not planned for ahead of time at a foundational level.


Of course, the requirement to build a more agile business model means that applications and workflows need to be able to move quickly and seamlessly across the internal network. The mandate to implement new public and private cloud networks, extend WAN connectivity to branch offices, support new IoT and privately-owned end-user devices, and develop aggressive application advan ..

Support the originator by clicking the read the rest link below.