Cyber 2.0: the new armoury protecting the enterprise
How SASE technologies are helping organisations navigate network security for a hybrid future
“From this evening I must give the British people a very simple instruction. You must stay home.” These words in March 2020 by the prime minister kicked off lockdown #1 in the UK and triggered a revolution in the way companies operate.
Overnight every company became distributed. Susan from marketing worked from her laptop in her bedroom. Keith from accounts logged into cloud services via a 4G dongle from his kitchen. Data flowed from phones to cloud systems, from PCs to on-prem centres. For IT teams the entire enterprise geography changed.
Meanwhile, another group of professionals was hard at work. Ransomware criminals were expanding their activities. In the same month, the Hammersmith Medical Centre got hit – the private details of thousands of patients would be leaked out of spite as the centre refused all ransom demands. It was one of hundreds in the UK alone.
Between 2019 and 2020, ransomware attacks rose by 62% worldwide, and by 158% in North America alone. The result? A total rethink in the way IT security works.
“The pandemic has accelerated the pace at which businesses have had to adopt new technology,” says Andy Jane, chief technology officer at Onecom, a telecoms provider. He points out that the old approaches – firewalls, virtual private networks (VPNs), and wide area networks (WANs) – simply couldn't cut it. The post-covid enterprise needs a new set of security tools fit for the challenge.
The new arsenal
The old firewall is gone – we now have next-generation firewall. The concept of spotting bad actors is being replaced by zero trust, which ensures nothing is trusted by default and only authorised devices can connect, to be policed round the clock.
The acronym SASE, pronounced “sassy”, standing for secure access service edge, unifies multiple security concepts of this new ecosystem under a single, unified umbrella. And at the centre sits the workhorse, allowing traffic to flow across the distributed network: the software-defined wide area network (SD-WAN).
“SD-WAN is the application of software-defined networking technologies to wide area, enterprise networks,” says Steven O’Sullivan, head of cybersecurity practice at Enzen, a consultancy. “It is used to secure WAN connections between branch offices, remote workers and data centre facilities that are geographically dispersed.”
SD-WAN means companies can ditch the costly and fragile multiprotocol label switching (MPLS). Instead, companies pay for ordinary internet service provider (ISP) services from different providers and use SD-WAN to blend them together. It can even bundle 3G, 4G, 5G and ethernet into the mix. The result is an uplift in speed and reliability.
“Effectively a network overlay, SD-WAN is carrier agnostic and transport layer independent,” says O’Sullivan. “It promises reduced operational costs, greater control over network applications and simplified management. Additionally, with an SD-WAN, a business has the benefit of multiple layers of security to protect against internet and branch cyber threats.”
The bundling of multiple transport methods, such as three ISP connections into a unified pipe, is particularly attractive to organisations where downtime is catastrophic. “This is seen in organisations such as the UK’s National Grid NG IT RIIO-2 plan,” says O’Sullivan. “It is investing in SD-WAN infrastructure to deliver network routing securely, and to take advantage of lower-cost public networks for WAN connectivity and provide direct internet access in support of cloud and SaaS services. This will also allow them to reduce the frequency of bandwidth upgrades to our internet gateways.”
There’s one more plus. SD-WANs offer network control via a simple and centralised interface. For the utility sector, along with banks, defence, and retail, this is very attractive. “An important reason for the popularity of SD-WAN in the utilities sector is that it enables significant improvements in cybersecurity while reducing costs,” says O’Sullivan. “Management, granularity and control become much easier for the people managing the networks, especially the operational technology aspects. With the implementation of SD-WAN security, the teams and personnel responsible for the care and maintenance of process networks gain holistic visibility and granular control over connectivity into and out of the facility.”
Naturally, there is considerable innovation in the field of SD-WANs. The concept is fluid, and different providers bring their own philosophies. SD-WAN has already evolved from a connectivity infrastructure to a services platform. The first evolution of the technology worked at the networking communications layer. You had to write your own traffic routing rules, as it didn’t have the context to do so. The latest in SD-WAN technology works at the application layer, meaning it now has the context to learn itself without as much human input.
The result
The arrival of SASE technologies is a blessing for IT staff. The new systems are easier to run, quicker to install, and include the vast array of devices and cloud services used by a modern corporation.
The pandemic threw challenges at businesses. Now they are responding. In the long run, this new era of hybrid working may be more productive and more secure than ever before. For IT teams who want to give Susan and Keith guaranteed access to all services from wherever they are, safe from hackers and ransomware gangs, these are life-changing technologies.