Friday, 04 September 2020 12:55

WAN and security transformation for digital business success

By Dean Vaughan, vice president for Asia Pacific and Japan, Silver Peak
WAN and security transformation for digital business success Image by Gerd Altmann from Pixabay

GUEST OPINION COVID-19 has accelerated the digital transformation plans and cloud computing investments for many organisations in Australia, to ease the burdens placed on the traditional business model by the shift to remote working. The net result is an increase in overall business productivity, putting them in a good position to recover from the pandemic and create a new future for their business.

Despite the positive impact this shift has had on organisations, there are limitations to simply moving more applications to the cloud, rather than hosting them within traditional corporate data centres. Multi-cloud strategies alone don’t guarantee that the underlying network will consistently deliver the highest quality of experience to employees and customers.

The rapidly evolving cybersecurity landscape is also challenging organisations during this time, which was easily overlooked by many in the frantic rush to get everything set up to support a work-from-anywhere model. More employees working from home means that more devices are connecting outside of the secured corporate network, substantially expanding the attack surface.

This exposes enterprises to potential security breaches that compromise data and result in network downtime, which defeats the very purpose of shifting to the cloud. Traditional perimeter security approaches were never designed for the cloud and fall short on delivering the agility and security required to address the requirements of digital transformation.

Modernising wide area network (WAN) or security approaches is a good starting point for organisations. But they must address both to realise the true value of cloud investments.

This is possible by combining comprehensive WAN edge and network security functions to support the secure access needs of organisations, a model that Gartner defines as secure access service edge (SASE). WAN transformation should ideally lead security transformation initiatives, underscoring the freedom of choice to select leading security vendors and technologies.

Applications are delivered in the cloud, so should security

For enterprises that have been plagued by delivering a sub-optimal user experience despite migrating to the cloud, now’s the time to embark upon a WAN transformation initiative. It’s also wise to consider adopting modern cloud-delivered security services.

The traditional use of the hub-and-spoke security architectures first backhauls cloud-destined traffic to the data centre and through the corporate firewall before reaching its destination. This is an inefficient approach that adds latency and impairs application performance.

On the other hand, chances are that early adopters of cloud-delivered security services may have failed to implement a software-defined wide area network (SD-WAN) previously. Therefore, it’s unlikely they’re able to apply local Internet breakout from branch sites and steer traffic directly to the cloud.

Without the SD-WAN component, traffic continues to be backhauled to the data centre, negatively impacting application performance.

Time is now for network transformation

WAN transformation allows a more efficient path and better experience between users and the cloud. In doing so, many organisations embrace SD-WAN to adopt local Internet breakout to cloud applications directly from branch locations over broadband.

SD-WAN provides application driven intelligent path selection across any combination of WAN links based on centrally defined policies that optimise available bandwidth and reduce latency. This ensures the network always delivers the highest quality of experience to application users.

Maximising returns on cloud investments

As enterprises face the constantly evolving threat landscape, they must retain the agility necessary to adopt new security solutions that complement their existing technologies. The requirements for both WAN and security transformation must be considered.

Most importantly, an advanced SD-WAN platform allows an organisation the flexibility to deploy cloud-delivered security services. It supports integrated application programmable interfaces (APIs) to bring new levels to automation and provides the ability to connect to a variety of cloud services, including security.

This ultimately gives enterprises the added advantage to transition to modern, cloud-first WAN architecture at their own pace, and offers a smooth migration to a cloud-delivered security model. All without compromising their user experience, while future-proofing their networks as they move towards a post-COVID-19 world, whatever that may be.


About the author

Dean Vaughan is vice president for Asia Pacific and Japan for Silver Peak. He is responsible for enterprise and service provider sales, including go-to-market and channel strategies to drive partner engagement and customer acquisition across the region. For more information, visit:

Subscribe to ITWIRE UPDATE Newsletter here

Active Vs. Passive DWDM Solutions

An active approach to your growing optical transport network & connectivity needs.

Building dark fibre network infrastructure using WDM technology used to be considered a complex challenge that only carriers have the means to implement.

This has led many enterprises to build passive networks, which are inferior in quality and ultimately limit their future growth.

Why are passive solutions considered inferior? And what makes active solutions great?

Read more about these two solutions, and how PacketLight fits into all this.


WEBINAR INVITE 8th & 10th September: 5G Performing At The Edge

Don't miss the only 5G and edge performance-focused event in the industry!

Edge computing will play a critical part within digital transformation initiatives across every industry sector. It promises operational speed and efficiency, improved customer service, and reduced operational costs.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

But these technologies will only reach their full potential with assured delivery and performance – with a trust model in place.

With this in mind, we are pleased to announce a two-part digital event, sponsored by Accedian, on the 8th & 10th of September titled 5G: Performing at the Edge.


Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News