Like any innovative technology, SD-WAN evolves rapidly. For businesses utilizing SD-WAN or evaluating its implementation, there are a few considerations to keep in mind for the coming year.
Small and mid-sized businesses (SMBs) have traditionally not been keen on outsourcing for a few reasons, but a sea change is occurring for SMBs when it comes to security and technology. Businesses using managed services to handle security needs have to hand over mission-critical control of their network infrastructures to service providers. A rising number of SMBs are electing to do this and more.
In-House Security Losing Steam
While managed security was initially popular with enterprises hoping to simplify and coordinate security across multiple locations, it is looking more and more attractive to one- and two-location business owners who realize these threats are indiscriminate in who they target.
With new security threats churning out at a fever pitch, it is almost impossible to stay relevant with security in-house. Even with just one location, adequate security needs to consider firewall management, intrusion detection, malware detection, compliance requirements, email encryption, user authentication, and, most importantly, active monitoring.
According to a study cited in CIO, 40% of businesses are using part time employees to manage their security. That is alarming. This setup compromises effective monitoring and cuts down on time to detect attacks from 24/7 to someone not even on the clock 9-5. The level of scrutiny and speed of reaction need to be looked at if you want to take your network security seriously. Outsource to a provider that guarantees around-the-clock monitoring in the service level agreement. Employees do not come with SLAs.
The number and variety of security threats facing businesses today require true specialization to conquer. Although enterprise businesses led the charge for managed security, there is a multi-dimensional landscape of security concerns that affect businesses of all sizes. Skills and time are at a premium, and a greater number of business owners are finding security is not a piece of their business they want to gamble on.
What is your peace of mind worth? MicroCorp can connect you with a portfolio of managed security providers to find the right fit for your customer’s security vulnerabilities.
SD-WAN is a software-based approach to managing a WAN, and there are a number of reasons why your customers should consider its adoption. Once the decision to move forward with SD-WAN is made, however, it’s important to properly vet solutions and vendors. Continue reading
We are all learning the acronym SD-WAN, but to layer 2 and 3 OSI model aficionados, it can be hard to accept how an upstart layer 7 software application can potentially replace a stalwart layer 3 technology like multiprotocol label switching (MPLS). Which begs the question: Is SD-WAN a contender, or just a pretender in the future generation of networks?
MPLS: The Incumbent
When MPLS was introduced, medium and large businesses rapidly adopted the technology. Deploying an MPLS network to connect offices together provides users with the ability to have a predictable, secure, and high preforming environment. This is done by bringing all your data through a single provider and allowing them to prioritize your traffic at layer 2 or layer 3 using QoS.
Providers can provide QoS through specifically designed networks with logical separation using labels to identify traffic, VRFs, and VRF tags to separate the customer traffic. They then allow customers to apply QoS tags to traffic types to reach higher levels of availability.
Let’s look at how this works in more detail, as this is the meat of what customers care about.
When designing MPLS, it is important to determine how you want to provide this QoS. The first thing to do is identify traffic of similar kind and then a degree of excellence. In a typical deployment, 4 quality queues are seen as defined below:
- Real-time traffic – This is typically voice, video, and/or VDI.
- Business Critical – This includes applications required for a company to do business. Examples might be an EMR for a medical company or credit card transactions for a retail company.
- Business Important – This might be an intranet, active directory, email, or other application that is not sensitive to jitter, latency, or retransmits.
- General Traffic – This queue includes all other traffic.
Once customer traffic has been identified and tagged, the degree of excellence of those tagging/groupings must be defined. Most carriers offer a different service level for each queue and different bandwidth guaranteed to each traffic type across the entire MPLS network. As companies continued to converge, however, holes in this design were found. This brought forth the creation of SD-WAN.
SD-WAN: The Contender
Instead of using QoS (layer 2 or layer 3), SD-WAN uses software definitions. With MPLS, you must either use only a source or destination IP address or port. That would be the same as saying you can only relieve traffic congestion from where you started, where you are going, or based on the type of car you have. This would not be very helpful in a major situation where most traffic is destined for the same general area. But what if you could also consider important factors, like ensuring doctors and first responders were never caught in traffic? That one additional factor could change the landscape in most cities and potentially save lives. In terms of the company network, that would be the same as having a real-time queue.
This is what SD-WAN does to QoS. Video traffic can be prioritized to YouTube over Netflix, for example, or Office 365 email over personal Gmail accounts.
Not Beholden to a Single Carrier
With MPLS, the entire environment must be controlled by a single provider. This means that you cannot choose the most cost effective solutions for each location, which doesn’t work for customers with large geographical environments. SD-WAN allows the most cost effective solution per location be chosen.
Significant Resilience Improvements
With MPLS, providing redundancy is very difficult as MPLS routing uses private IP. For the secondary connection, most customers choose to use a VPN over an internet connection. They then need a device that is intelligent enough to build the VPN and handle routing between the two solutions. Even then, routing with just layer 3 protocols doesn’t allow different levels of resilience or performance increases. Typically, customers settle on having the VPN be active/inactive (or hot/cold), meaning that the other connection is ONLY used when there is a total failure of the MPLS.
With SD-WAN, the world of high-performing resilient networks comes with a lot of options. You can define and build it so that both connections are used, called active/active or hot/hot. You can prioritize based on application type; for example, real-time traffic can be forced down a high-quality connection with SLAs associated with it, and general web traffic can be sent down a more cost effective connection. Other business critical or important traffic can be bundled to go out both connections, maximizing total bandwidth.
The flexibility and design options increase exponentially with the introduction of SD-WAN. MPLS still has its place and will for years to come, but for many customers SD-WAN provides a great alternative that may help them meet their internal goals.
SD-WAN is getting a great deal of air play in the industry right now, promising to solve every network challenge that embattled network architects and operators are experiencing today from insatiable bandwidth requirements and costs through simple network resiliency and management. But what is marketing fluff, and what is real? What are the real drivers behind this latest “transformational” technology, and what problems does it really solve?
More Affordable Network Needed
With increasing workloads and performance requirements, especially with the proliferation of cloud-based applications, the need for predictable, high-speed, secure, and diversified networks is escalating. It simply isn’t always financially feasible to deploy diverse MPLS links to multiple distributed offices.
SD-WAN enables companies to take advantage of less expensive internet access rather than managed private networks while still getting the benefit of the types of capabilities provided by an MPLS network. In many areas, tier one direct internet access actually (and maybe surprisingly) provides lower latency, lower jitter, and lower packet loss than its expensive MPLS counterpart, so companies with a large number of distributed offices can expect to see real cost benefits with an SD-WAN network versus a traditional MPLS network.
Simpler and Faster Deployment
MPLS circuits can take months to provision and turn up. The underlying internet access types that SD-WAN can take advantage of can be faster and easier to deploy. However, don’t be misled by the myth that SD-WAN is simple to deploy. There is still a substantial amount of planning and configuration to be done. Beware of the “plug and play” misconception and investigate how each solution is deployed, as they are all different.
Not all SD-WAN solutions are as easy to manage as you might think, and not all management portals provide the same functionality. Whether you are looking at a service provider-managed solution, your own “book end” managed solution, or are using a dedicated SD-WAN network provider, look carefully at what priorities you can set and what monitoring you can do. Are these to device level (MAC address) or location level (essentially just network aggregation and optimization solutions)?
And, most importantly, don’t forget about how software updates are applied and managed and how template policies are set and administered — the very things you would think about when managing routers in your network.
There are claims made that MPLS is more secure than SD-WAN. In reality, an MPLS network is only as secure as the accuracy of the MPLS provider’s switching. The use of IPSec connectivity and additional service chaining in an SD-WAN environment should be more than sufficient to address most security concerns.
You can’t simply turn to Gartner’s magic quadrant and pick a leader. The industry is too young, with many new market entrants. Whatever deployment method you are going to use, be sure to check the underlying equipment vendor’s track record. Financial stability and investors are important. Ask for references and don’t forget to look under the hood at the vendor roadmap to understand future solution enhancements such as scalability.
MicroCorp was a pioneer when MPLS came along. We have over 30 years of experience delivering complex network solutions and helping businesses discover the right technology for their operations. Contact us to learn more about a partnership in adding SD-WAN and related technologies to your portfolio of solutions.
Enterprise tech experts believe that 2017 is going to be a big year for integrated network technologies, particularly with regard to appliances. Integrated networks are now far easier to deploy and manage than they were even a couple of years ago, and many pundits are predicting that the enterprise space will see a sharp rise in the number of network appliance deployments this year. Somewhat surprisingly, SD-WAN technology has proven to be a major driver of this shift.
When the integrated network trend first surfaced, it seemed as though NFV technologies were going to be the go-to option for network design and deployment. However, they require a significant investment of IT resources, and many enterprises don’t want to handle all their integration requirements in-house. SD-WAN solutions have stepped in to fill the void, in large part because they offer centralized control and configuration features that greatly reduce the amount of care and feeding the network needs for peak performance.
Major Factors Driving the SD-WAN Trend
In particular, there are five major reasons why SD-WAN has become the solution of choice for integrated networking:
- An application-oriented focus. Because SD-WAN is so centralized, it supports superior network adaptability and application-level reporting. By contrast, branch networks powered by multi-vendor solutions do not achieve nearly the same level of consistency.
- Flexibility and responsiveness to change. This adaptability carries over to the service, integration, and policy spheres. Generally speaking, SD-WAN networks are the least rigid and most suited to change and flexibility, making them a better fit in a constantly shifting technology landscape.
- Better processor technologies. Today’s processors have made it possible to assign a wider range of functions to hardware than ever before, without any loss of performance. SD-WAN networks exploit this to their advantage.
- The rise of cloud computing. Because the cloud has shifted a great deal of Internet traffic to links, SD-WAN has emerged as a prime solution because it vastly reduces the workload placed on other network resources.
- An “easier is better” mentality. Today, enterprises expect technologies to be easy to use without requiring a great deal of setup. SD-WAN fits the bill, and because it is so much easier to create and deploy, it is supplanting older networking techniques that are comparatively complicated and thus seen as outdated.
The connectivity and communication professionals at MicroCorp offer industry-leading expertise and a comprehensive suite of business-oriented, SD-WAN-powered integrated networking solutions. Please contact a MicroCorp client services representative to learn more.
The IT space has been abuzz with whispers that security and networking could soon be headed for a convergence, with networking taking over security needs (or vice-versa). Some pundits are predicting this shift could take place as early as this year, with SD-WAN technologies drawing particular attention due to two main factors: their popularity, and their perceived vulnerability.
As a result, IT experts are predicting SD-WAN will have a strong influence on both networking and security trends in 2017. Here are five specific ways in which this could influence the near future of enterprise IT:
SD-WAN Networks Have Heightened Security Needs
SD-WAN technologies, by their very nature, require a great deal of direct Internet access (DIA) expansion. This, in turn, brings about a major increase in the amount of digital assets that are exposed to security vulnerabilities.
Most businesses still aren’t paying enough attention to their security needs, with a recent survey sponsored by Versa Networks through Dimension Data finding that 40 percent of enterprise branch networks don’t even deploy basic firewall technologies, and that as many as half of these networks don’t use more advanced firewall security solutions.
When SD-WAN is used to power DIA, businesses open themselves up to two types of threats. SD-WAN increases the amount of attackable surface elements, while DIA means enterprises have a larger number of potential threat entry points to secure.
Vendors Are Taking Several Different Approaches to SD-WAN Security
Fortunately, experts in the SD-WAN space are fully cognizant of the security risks, and several solutions have emerged. Network segmentation and stateful firewalls are leading the charge, but there are still significant challenges at the application level. Vendors are working to meet these challenges by putting together customized mix-and-match solutions that combine as many as four security technologies.
Security Through Service Chaining
When paired with deep packet inspection (DPI), service chaining provides an effective means of securing SD-WAN networks. DPI works by collecting traffic from the edges of the network, and service chaining supports it by merging multiple security functions into a single, centralized hub that analyzes that traffic and identifies threats.
While this strategy is generally effective, it is still developing. One of its shortcomings is that security and the analytics specific to networking are separate. This can result in slower IT responses to security threats when they happen.
Because enterprises are trending towards reducing the amount of on-premises resources they maintain, a growing number of vendors are integrating SD-WAN networks with security solutions prior to implementation.
While this does offer key advantages, including improved analytics and reduced costs, it also comes with some drawbacks. One of the biggest downsides relates to industry-leading security providers, many of which aren’t fully integrated with SD-WAN networking solutions as of yet.
Security and Networking Will Converge
Even though the industry isn’t quite there yet, experts expect that security and networking will converge as the aforementioned technologies continue to mature. SD-WAN is noted for its ability to support collaboration, which bodes well for
IT teams working to secure these networks.
MicroCorp is a leading agency and distributor of advanced enterprise telecommunications solutions. Prospective partners interested in adding SD-WAN and related security technologies to their service suites are invited to contact MicroCorp to learn more.
If you’ve been avoiding the topic of security — in general, or with your customers — you aren’t alone. Most agents avoid the subject entirely if they don’t feel 100% comfortable discussing the latest trends in cyber protection and network management. (And, let’s be honest, few do.)
But it’s 2017, and 60% of small companies go out of business within six months of a cyber attack. That figure alone should indicate that the time has come to do what no one wants to do and contemplate how to stay up-to-snuff on security. (It’s like going to the dentist.) What are the risks involved of falling behind, and what can you do to feel confident in talking to your customers about security?
First, know that the issue of cybersecurity poses more risks to your business than just actual hacking. If you aren’t educating yourself on how to talk to your customers on the topic, someone else is. Usually, if partners feel uneasy to broach a subject that is outside their areas of expertise, they’ll avoid it altogether with customers. But that tactic leaves room for another company — perhaps one that has done more research — to home in on those customers.
So, short of spending precious hours training to become a security expert, how can you approach the issue?
Look to the experts. Seek out partners who have already established themselves as security experts. A Fortune 500 customer hired one of our partners who is a security expert, and that relationship enabled the partner to gain a ton of buying power from the customer. The customer’s trust in that partner translated into giving the partner a blanket of sorts to recommend any provider they deemed fit. The power involved in being the expert in your field is real.
Try to educate yourself. Ideally, partners are taking the initiative to educate themselves each week on a broad view of topics — not just security — to stay relevant. But, of course that is easier said than done, especially when sales and customer service are at the forefront of business priorities.
Training! If both of those points sound daunting it’s because they can be. MicroCorp established the Ultimate Partner Training program to enable partners to learn about security, SD-WAN, cloud, and other topics that they might not be experts in — or even familiar with — so they can get high-level views of those subjects and stay relevant. Sticking your fingers in your ears and pretending nothing is changing makes you irrelevant. We want to help our partners be as well-rounded as possible.
The nature of the security world mirrors the nature of technology: it’s dynamic, ever-changing, constantly surprising, and difficult to keep up with. Our Ultimate Partner Training program aims to make the fluid world of technology easier for partners to navigate so that both partner and customer stay successful. Security expertise is a part of that equation now, more than ever.