PROTECTING SD-WAN DATA IN MOTION · VCPE OR SD-WAN BY 20233 1SD-WAN Infrastructure Forecast, IDC...

1
EXISTENTIAL SD-WAN IN NUMBERS SD-WAN, also known as software defined networking, simplifies the deployment and management of WAN infrastructure. While its benefits range from improved agility and dynamic routing to cost efficiency and network standardization, it poses an inherent security risk if data is not encrypted end-to-end. PREDICTED COMPOUND ANNUAL GROWTH RATE 2017-2022 1 PROTECTING SD-WAN DATA IN MOTION 40% $4.5 BN MARKET WORTH BY 2022 2 >90% WAN EDGE INFRASTRUCTURE REFRESH INITIATIVES BASED ON VCPE OR SD-WAN BY 2023 3 1 SD-WAN Infrastructure Forecast, IDC 2 Ibid 3 Gartner Magic Quadrant for WAN Edge Infrastructure via SDxCentral 0% 10% 20% 30% 40% 50% Increase availability Increase performance/reliability Agility Reduce recurring WAN costs by using less-expensive transport Access cloud services more directly/effectively Easily add new applications to the network Lower configuration change costs To replace our existing routers Service path selection based on business-controlled policies To provide branch-level security/encryption 41% 41% 38% 36% 32% 24% 20% 20% 15% 15% EMEA (N=47) 23% NA (N=48) 10% Percentage of Respondents DRIVERS BEHIND SD-WAN ADOPTION 4 TOP THREE WAN CONCERNS 5 4 Gartner Technology Insight for SD-WAN 5 Ibid RISK FACTORS Unencrypted network links Unsecure cloud computing platforms Emerging trends such as quantum computing Unprotected IoT devices & endpoints THE THREAT LANDSCAPE Global competitors User error Cyber attacks Organized crime State-sponsored attacks Injection of rogue data 72% 58% 47% 34% 34% 31% 22% 0% 10% 20% 30% 40% 50% 60% 70% 80% 10% 10% 12% 10% 12% 12% 10% 12% 12% 11% 9% 4% 12% 15% 20% 16% 22% 19% 15% 21% 36% Security Performance Cost Management: Visibility, monitoring and troubleshooting Avaliability Meeting cloud/ digital-specific requirements Lack of agility/flexibility Percentage of Respondents First Choice Second Third Sum of Top Three 6 2018 Cost of a Data Breach Study – Ponemon Institute FINANCIAL ACCESS DISCOVER MORE ABOUT THALES HIGH SPEED ENCRYPTION SOLUTIONS CV1000 VIRTUAL ENCRYPTOR CONSEQUENCES OF A BREACH SOLUTION Intellectual property theft Business disruption Loss of customer data Privacy breaches Financial loss Loss of reputation THALES CN SERIES NETWORK ADAPTERS Strong & effective WAN encryption Rapid scalability across '000s of links Flexible pricing and licensing Transport independent multi-Layer encryption Seamless integration with Thales Key Manager CV SERIES VIRTUALIZED ENCRYPTION FOR VIRTUAL CPE & VIRTUALIZED WAN Follow us on: The people you rely on to protect your privacy rely on Thales to protect their data. When it comes to data security, organizations are faced with an increasing number of decisive moments. Whether the moment is building an encryption strategy, moving to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation. Decisive technology for decisive moments. On average, it takes 197 days to identify a breach and a further 69 days to contain it 7 .

Transcript of PROTECTING SD-WAN DATA IN MOTION · VCPE OR SD-WAN BY 20233 1SD-WAN Infrastructure Forecast, IDC...

Page 1: PROTECTING SD-WAN DATA IN MOTION · VCPE OR SD-WAN BY 20233 1SD-WAN Infrastructure Forecast, IDC ... Management: Visibility, monitoring and troubleshooting Avaliability Meeting cloud

EXISTENTIAL

SD-WAN IN NUMBERS

SD-WAN, also known as software definednetworking, simplifies the deployment andmanagement of WAN infrastructure.While its benefits range from improved agilityand dynamic routing to cost efficiency andnetwork standardization, it poses an inherentsecurity risk if data is not encrypted end-to-end.

PREDICTED COMPOUND ANNUAL GROWTH RATE 2017-20221

PROTECTING SD-WAN DATA IN MOTION

40%$4.5BN

MARKET WORTH BY 20222

>90%WAN EDGE INFRASTRUCTURE REFRESH INITIATIVES BASED ON VCPE OR SD-WAN BY 20233

1SD-WAN Infrastructure Forecast, IDC2Ibid3Gartner Magic Quadrant for WAN Edge Infrastructure via SDxCentral

0% 10% 20% 30% 40% 50%

Increase availability

Increase performance/reliability

Agility

Reduce recurring WAN costs by using less-expensive transport

Access cloud services more directly/effectively

Easily add new applications to the network

Lower configuration change costs

To replace our existing routers

Service path selection based on business-controlled policies

To provide branch-level security/encryption

41%

41%

38%

36%

32%

24%

20%

20%

15%

15%EMEA (N=47) 23%NA (N=48) 10%

Percentage of Respondents

DRIVERS BEHIND SD-WAN ADOPTION4

TOP THREE WAN CONCERNS5

4Gartner Technology Insight for SD-WAN5Ibid

RISK FACTORS

Unencrypted network links Unsecure cloud computing platforms

Emerging trends such as quantum computing

Unprotected IoT devices & endpoints

THE THREAT LANDSCAPE

Global competitors

User error

Cyber attacks

Organized crime State-sponsored

attacks

Injection of rogue data

72%

58%

47%

34%

34%

31%

22%

0% 10% 20% 30% 40% 50% 60% 70% 80%

10% 10% 12%

10%

12% 12% 10%

12% 12%11%

9%4%

12% 15% 20%

16% 22% 19%

15%21%36%Security

Performance

Cost

Management: Visibility, monitoring and troubleshooting

Avaliability

Meeting cloud/digital-specific requirements

Lack of agility/flexibility

Percentage of Respondents

First Choice Second Third Sum of Top Three

62018 Cost of a Data Breach Study – Ponemon Institute

FINANCIALACCESS

DISCOVER MORE ABOUT THALES HIGH SPEEDENCRYPTION SOLUTIONS

CV1000 VIRTUAL ENCRYPTOR

CONSEQUENCES OF A BREACH

SOLUTION

Intellectual property

theft

Business disruption

Loss of customer

data

Privacy breaches

Financial loss

Loss of reputation

THALES CN SERIES NETWORK

ADAPTERS

Strong & effective WAN encryption

Rapid scalabilityacross '000s of links

Flexible pricing and licensing

Transport independentmulti-Layer encryption

Seamless integrationwith Thales Key Manager

CV SERIES

VIRTUALIZEDENCRYPTION

FOR VIRTUAL CPE & VIRTUALIZED WAN

Follow us on:

The people you rely on to protect your privacy rely on Thales to protect their data. When it comes to data security, organizations are faced with an increasing number of decisive moments. Whether the moment is building an encryption strategy, moving to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation.

Decisive technology for decisive moments.

On average, it takes 197 days to identify a breach

and a further 69 days to contain it 7.