PROTECTING SD-WAN DATA IN MOTION · VCPE OR SD-WAN BY 20233 1SD-WAN Infrastructure Forecast, IDC...
Transcript of PROTECTING SD-WAN DATA IN MOTION · VCPE OR SD-WAN BY 20233 1SD-WAN Infrastructure Forecast, IDC...
EXISTENTIAL
SD-WAN IN NUMBERS
SD-WAN, also known as software definednetworking, simplifies the deployment andmanagement of WAN infrastructure.While its benefits range from improved agilityand dynamic routing to cost efficiency andnetwork standardization, it poses an inherentsecurity risk if data is not encrypted end-to-end.
PREDICTED COMPOUND ANNUAL GROWTH RATE 2017-20221
PROTECTING SD-WAN DATA IN MOTION
40%$4.5BN
MARKET WORTH BY 20222
>90%WAN EDGE INFRASTRUCTURE REFRESH INITIATIVES BASED ON VCPE OR SD-WAN BY 20233
1SD-WAN Infrastructure Forecast, IDC2Ibid3Gartner Magic Quadrant for WAN Edge Infrastructure via SDxCentral
0% 10% 20% 30% 40% 50%
Increase availability
Increase performance/reliability
Agility
Reduce recurring WAN costs by using less-expensive transport
Access cloud services more directly/effectively
Easily add new applications to the network
Lower configuration change costs
To replace our existing routers
Service path selection based on business-controlled policies
To provide branch-level security/encryption
41%
41%
38%
36%
32%
24%
20%
20%
15%
15%EMEA (N=47) 23%NA (N=48) 10%
Percentage of Respondents
DRIVERS BEHIND SD-WAN ADOPTION4
TOP THREE WAN CONCERNS5
4Gartner Technology Insight for SD-WAN5Ibid
RISK FACTORS
Unencrypted network links Unsecure cloud computing platforms
Emerging trends such as quantum computing
Unprotected IoT devices & endpoints
THE THREAT LANDSCAPE
Global competitors
User error
Cyber attacks
Organized crime State-sponsored
attacks
Injection of rogue data
72%
58%
47%
34%
34%
31%
22%
0% 10% 20% 30% 40% 50% 60% 70% 80%
10% 10% 12%
10%
12% 12% 10%
12% 12%11%
9%4%
12% 15% 20%
16% 22% 19%
15%21%36%Security
Performance
Cost
Management: Visibility, monitoring and troubleshooting
Avaliability
Meeting cloud/digital-specific requirements
Lack of agility/flexibility
Percentage of Respondents
First Choice Second Third Sum of Top Three
62018 Cost of a Data Breach Study – Ponemon Institute
FINANCIALACCESS
DISCOVER MORE ABOUT THALES HIGH SPEEDENCRYPTION SOLUTIONS
CV1000 VIRTUAL ENCRYPTOR
CONSEQUENCES OF A BREACH
SOLUTION
Intellectual property
theft
Business disruption
Loss of customer
data
Privacy breaches
Financial loss
Loss of reputation
THALES CN SERIES NETWORK
ADAPTERS
Strong & effective WAN encryption
Rapid scalabilityacross '000s of links
Flexible pricing and licensing
Transport independentmulti-Layer encryption
Seamless integrationwith Thales Key Manager
CV SERIES
VIRTUALIZEDENCRYPTION
FOR VIRTUAL CPE & VIRTUALIZED WAN
Follow us on:
The people you rely on to protect your privacy rely on Thales to protect their data. When it comes to data security, organizations are faced with an increasing number of decisive moments. Whether the moment is building an encryption strategy, moving to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation.
Decisive technology for decisive moments.
On average, it takes 197 days to identify a breach
and a further 69 days to contain it 7.