Download - PROTECTING SD-WAN DATA IN MOTION · VCPE OR SD-WAN BY 20233 1SD-WAN Infrastructure Forecast, IDC ... Management: Visibility, monitoring and troubleshooting Avaliability Meeting cloud

Transcript
Page 1: PROTECTING SD-WAN DATA IN MOTION · VCPE OR SD-WAN BY 20233 1SD-WAN Infrastructure Forecast, IDC ... Management: Visibility, monitoring and troubleshooting Avaliability Meeting cloud

EXISTENTIAL

SD-WAN IN NUMBERS

SD-WAN, also known as software definednetworking, simplifies the deployment andmanagement of WAN infrastructure.While its benefits range from improved agilityand dynamic routing to cost efficiency andnetwork standardization, it poses an inherentsecurity risk if data is not encrypted end-to-end.

PREDICTED COMPOUND ANNUAL GROWTH RATE 2017-20221

PROTECTING SD-WAN DATA IN MOTION

40%$4.5BN

MARKET WORTH BY 20222

>90%WAN EDGE INFRASTRUCTURE REFRESH INITIATIVES BASED ON VCPE OR SD-WAN BY 20233

1SD-WAN Infrastructure Forecast, IDC2Ibid3Gartner Magic Quadrant for WAN Edge Infrastructure via SDxCentral

0% 10% 20% 30% 40% 50%

Increase availability

Increase performance/reliability

Agility

Reduce recurring WAN costs by using less-expensive transport

Access cloud services more directly/effectively

Easily add new applications to the network

Lower configuration change costs

To replace our existing routers

Service path selection based on business-controlled policies

To provide branch-level security/encryption

41%

41%

38%

36%

32%

24%

20%

20%

15%

15%EMEA (N=47) 23%NA (N=48) 10%

Percentage of Respondents

DRIVERS BEHIND SD-WAN ADOPTION4

TOP THREE WAN CONCERNS5

4Gartner Technology Insight for SD-WAN5Ibid

RISK FACTORS

Unencrypted network links Unsecure cloud computing platforms

Emerging trends such as quantum computing

Unprotected IoT devices & endpoints

THE THREAT LANDSCAPE

Global competitors

User error

Cyber attacks

Organized crime State-sponsored

attacks

Injection of rogue data

72%

58%

47%

34%

34%

31%

22%

0% 10% 20% 30% 40% 50% 60% 70% 80%

10% 10% 12%

10%

12% 12% 10%

12% 12%11%

9%4%

12% 15% 20%

16% 22% 19%

15%21%36%Security

Performance

Cost

Management: Visibility, monitoring and troubleshooting

Avaliability

Meeting cloud/digital-specific requirements

Lack of agility/flexibility

Percentage of Respondents

First Choice Second Third Sum of Top Three

62018 Cost of a Data Breach Study – Ponemon Institute

FINANCIALACCESS

DISCOVER MORE ABOUT THALES HIGH SPEEDENCRYPTION SOLUTIONS

CV1000 VIRTUAL ENCRYPTOR

CONSEQUENCES OF A BREACH

SOLUTION

Intellectual property

theft

Business disruption

Loss of customer

data

Privacy breaches

Financial loss

Loss of reputation

THALES CN SERIES NETWORK

ADAPTERS

Strong & effective WAN encryption

Rapid scalabilityacross '000s of links

Flexible pricing and licensing

Transport independentmulti-Layer encryption

Seamless integrationwith Thales Key Manager

CV SERIES

VIRTUALIZEDENCRYPTION

FOR VIRTUAL CPE & VIRTUALIZED WAN

Follow us on:

The people you rely on to protect your privacy rely on Thales to protect their data. When it comes to data security, organizations are faced with an increasing number of decisive moments. Whether the moment is building an encryption strategy, moving to the cloud, or meeting compliance mandates, you can rely on Thales to secure your digital transformation.

Decisive technology for decisive moments.

On average, it takes 197 days to identify a breach

and a further 69 days to contain it 7.