Securevate Sd-Wan
Securevate Sd-Wan
www.securevate.com
CONTENTS
INTRODUCTION ...................................................................................................................................3
SD-WAN OVERVIEW ............................................................................................................................3
BENEFITS OF SD-WAN.........................................................................................................................5
WHY SECUREVATE SD-WAN................................................................................................................6
FEATURES OF SECUREVATE SD-WAN................................................................................................11
www.securevate.com
INTRODUCTION
What is SD-WAN ?
3 www.securevate.com
WHY SD-WAN?
With SD-WAN, companies can quickly add access to cloud services, set up a new
remote office, and dynamically route all types of network traffic for optimized
application and data delivery. SD-WAN allows for various deployment options,
including complete cloud- or software based, hardware based, or a hybrid
deployment. Also, a centrally-located orchestrator monitors all network activity to
deliver real-time analytics and reporting as well as remotely remediate any issues.
4 www.securevate.com
Benefits of SD-WAN
SD-WAN solves network complexity while cutting total cost of ownership. SD-WAN
simplifies operations through rapid zero touch provisioning and cloud management,
optimizes app performance over any WAN link, accelerates cloud adoption through
managed on-ramps, and offers robust edge security.
SD-WAN delivers hybrid, SD-WAN connects any Branch and remote site
multi-cloud, and SaaS device or any user to any deployments are made
functionality to support application across any simple with global WAN
the needs of businesses location on the WAN with visibility, agility, and scale
today. in-depth network delivered through an
analytics and security via automated platform.
a network overlay.
Overlay & underlay – Separating the network layer from the applications
Separation of data & control
Tunnels between sites and the cloud
Policies – application, quality of experience, security
Local internet breakout – Direct Internet Access (DIA) is typically possible
depending on the architecture of the specific solution and its deployment
5 www.securevate.com
Why SECUREVATE SD-WAN ?
Times have changed, and enterprises are using the cloud and subscribing to
software-as-a-service (SaaS). While users traditionally connected back to the
corporate data center to access business applications, they are now better served
by accessing many of those same applications in the cloud.
As a result, the traditional WAN is no longer suitable mainly because backhauling
all traffic—including that destined to the cloud—from branch offices to the
headquarters introduces latency and impairs application performance
Not all SD-WANs are created equal. Many SD-WAN solutions are basic SD-WAN
solutions or “just good enough” solutions. But we are here for the the best. We'll
provide
Faster Better
6 www.securevate.com
Faster
Agile network architectures – Network agility is also an important item on the SD-
WAN benefits list. Different from traditional WANs, being software defined and
centrally managed, network architecture of hub and spoke, full mesh or any
combination of these architectures, can be quickly provisioned and changed as
required on SD-WAN networks. Different from the fixed nature of traditional
networks, SD-WAN architecture gives agility in the hands of network
administrators, through automation, network performance may grow and shrink as
workloads and associated business requirements change. Backup network
interfaces may be added or removed as network requirements change. This
completely changes the traditional paradigm of fixed connectivity contracts and
network designs that inhibited flexibility.
7 www.securevate.com
Better
Reliability of the network – One of the important SD-WAN benefits relates to network
reliability. In the past, a site would lose its connectivity due to failure of a single dedicated
line that serves the site. Even if several connections were available, the routing policies
would be fixed so some of the applications or users in the organization would lose their
connectivity in the case of such network failure with no way for network admins to define
dynamically policies based on importance of services or users. SD-WAN changes this as
a typical SD-WAN product would allow to define failover and load balancing policies that
would ensure better and more reliable delivery of specific applications even when
network conditions deteriorate or even in cases of specific network interfaces failure. This
benefit of network reliability is one of the key elements of what is an SD-WAN solution all
about.
Cost Efficient
Reduced OPEX – Being transport and service provider agnostic is another pillar
of SD-WAN benefits. An enterprise can choose which Network Service Providers
(NSP) to purchase connectivity from, moreover, the enterprise can purchase
different types of network connections such as broadband, 4G or 5G cellular
connections or even MPLS, define the utilization of these different network
connections based on quality, cost and other enterprise requirements.
Additionally, such policies can be dynamically changed from one central
management system. The nature of centrally managed SD-WANs also results in
the reduction of IT people required for managing the network, instead of logging
into each edge device and configuring it through a Command Line Interface (CLI),
all edge devices can be centrally configured and managed.
8 www.securevate.com
Reduced CAPEX – This is one of those SD-WAN benefits that is many times
neglected in the decision making process. Although one of the promises
associated with the definition of what is SD-WAN was hardware agnostic, some of
the SD-WAN vendors continue to require a bundle of hardware and software
resulting in high Total Cost of Ownership (TCO) and greater vendor lock-in. Being
hardware agnostic is an important requirement enterprises and service provider
should present to SD-WAN vendors. Being able to run on commodity hardware
devices, on virtual machines or in public/private clouds gives enterprises choice,
more control and lower capital costs.
More secure
End-to-end encryption – Most of the cloud SaaS applications encrypt the traffic
of their applications, but not all enterprise data sent between locations is
encrypted. Even many of the voice and video communications services don’t
encrypt the payload (the actual data of voice and video). The SD-WAN
architecture typically allows for secure (encrypted) tunnels between locations of
edge devices (software and hardware) thus making sure that all traffic in motion
will be encrypted. In this regard, it is important to analyse the architecture of
some of the SASE vendors. When looking at the Gartner definition of
recommended SASE architecture, you would find a fixed network architecture of
hub and spoke where all enterprise traffic is routed through cloud Points of
Presence (POPs) of the SASE vendor or service provider. This SASE architecture
would typically require a man in the middle decryption of the traffic. It doesn’t
mean that this type of SASE network architecture doesn’t have merit, it does
mean that enterprises should understand the details of how the SASE service is
provided to them and understand the pros and cons of each option.
SECUREVATE SD-WAN allows for more flexibility and choice in all relevant areas
of SD-WAN and SASE deployments. This includes network architecture, routing
policies, the security services used and how each specific data or application is
routed according to those selected choices of security and network architectures.
9 www.securevate.com
Zero trust networks – this capacity of zero trust is one of the SASE benefits although it
is not always offered by all SASE vendors. Given the strong relationship between SASE
and SD-WAN, zero trust is also achieved with secure SD-WAN solutions. Providing 1:1
micro-segmentation between users and devices communicating with services,
applications, and data. Whitelist security policies of what is allowed in a least privileged
model instead of a blacklist model that defines where network traffic cannot go. Anomaly
detection provides early detection if a user is misbehaving or a device has been infected
with malware.
10 www.securevate.com
Features of SECUREVATE SD-WAN
Monitoring enhancements
Additional, non-ethernet,
interfaces (LTE, WiFi)
11 www.securevate.com
Features of SECUREVATE SD-WAN
Enhanced Monitoring
Zero-Touch Provisioning
12 www.securevate.com
Features of SECUREVATE SD-WAN
Application Identification
(L3/L4)
13 www.securevate.com
Features of SECUREVATE SD-WAN
14 www.securevate.com
Features of SECUREVATE SD-WAN
15 www.securevate.com
Thank You
www.securevate.com