Successfully deploying SD-WAN means moving from rigid, static policies to dynamic enforcement of your intentions.
Static rules should be a thing of the past and alternative equivalent controls should be evaluated for any lingering static requirements.
Few technologies make me sit up and say, “I want that!” when I see them, and SD-WAN is a game changing technology for organizations that have more than a handful of remote offices and want a better, more efficient way of interconnecting branches and a better, more efficient way to manage them. Regardless of the product you choose, and I discuss them in “SD-WAN H1 2016 Market Update: Vendor Snapshots Show a Crowded, Competitive Field Attempting to Diversify,” the benefits of SD-WAN will seem remarkable, fantastical even, until you see it in action. Implementing the routing, firewall, VPN, link load balancing, application performance, failover, failback, and cost management with traditional branch office equipment is very complex and even more complex to change, including adding new sites. Continue reading “Intentionally Making the Most of SD-WAN”→
For all the emphasis on industry security standards and regulatory compliance, businesses too often miss the mark
For those that do not achieve compliance, security breaches are all too common
Nothing drives enterprise security spending quite like compliance. Angst over meeting or missing a mandate strikes fear in the hearts of CIOs and IT security directors everywhere. As a result, it is not at all unusual for a company to map its security priorities to government standards such as those laid out in the Federal Information Security Management Act (FISMA) or industry specifications such as the healthcare-focused Health Insurance Portability and Accountability Act (HIPAA) specification and the Health Information Trust Alliance (HITRUST) framework. Continue reading “Compliance and (In)Security”→