Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

FEATURE

debate is the first step in establishing the Whatever a solution looks like, open Internet service providers and was formerly
voluntary IoT security standards that discourse will be a key component. For chair of the RIPE IPv6 Working Group.
could see the network thrive. this dynamic to be achieved, it is crucial
that businesses operating in the IoT, References
“It is crucial that businesses either now or in the future, put market 1. ‘Secure by Design’. Department for
operating in the IoT, either pressures to one side when thinking Digital, Culture, Media & Sport, UK
now or in the future, put about, and working to solve, the chal- Government, 7 Mar 2018. Accessed
lenges they face in making the IoT safer Oct 2018. www.gov.uk/government/
market pressures to one
for end users. Any standards need not be publications/secure-by-design.
side when thinking about, enforced (in fact, as outlined throughout 2. ‘Mirai (malware)’. Wikipedia.
and working to solve, the this piece, such enforcement would likely Accessed Oct 2018. https://
challenges they face in making prove counterproductive), but nonethe- en.wikipedia.org/wiki/Mirai_
the IoT safer for end users” less remain essential. Trust and open (malware).
discussion will prove to be the crucial 3. DeNisco Rayome, Alison. ‘Mirai
However, a genuine change in mindset ingredients in making the IoT ecosystem variant botnet launches IoT
is also required. Commercial pressures safe for all. DDoS attacks on financial sec-
and objectives are clearly important to tor’. TechRepublic, 5 Apr 2018.
manufacturers and every organisation About the author Accessed Oct 2018. www.
in the IoT space, but these must be Marco Hogewoning is a senior external techrepublic.com/article/mirai-
considered even-handedly with keeping relations officer at the RIPE NCC. As part variant-botnet-launches-iot-ddos-
the network secure. This is an objective of the External Relations team, he helps attacks-on-financial-sector/.
that every interested party needs to work lead the RIPE NCC’s engagement with 4. Whittaker, Jack. ‘Fear the Reaper?
towards. The IoT offers huge benefits its membership, the RIPE community, Experts reassess the botnet’s size and
to businesses and society as a whole, but government, law enforcement and other firepower’. ZDNet, 30 Oct 2017.
in order for this huge opportunity to Internet stakeholders. He joined the RIPE Accessed Oct 2018. www.zdnet.com/
be grasped it requires a unique and all- NCC in 2011. Prior to that, he worked article/reaper-botnet-experts-reassess-
encompassing security framework. as a network engineer for various Dutch size-and-firepower/.

Love and marriage:


why security and SD-WAN
need to go together Marc Sollars

Marc Sollars, Teneo

Thanks to the relentless rise of cloud computing and remote working, the
demand for high-bandwidth wide area network (WAN) links over the past few
years has never been so high. Analyst firm Forrester predicts that the public of successful breaches originate on the
cloud market will grow to $236bn by 2020, increasing by 23% in six years.1 A endpoint.2 The need for ensuring safer
growth in the use of cloud applications to suit the needs of a mobile workforce WAN connections has never been greater,
has meant that WAN pipes have filled up enormously. Not only that, with given this explosion of endpoints. But
companies seeking greater agility and local office autonomy, there is far greater instead of simply investing in a new fire-
demand to connect work apps to the WAN. All of these factors are putting a wall to keep data protected, organisations
strain on organisations and their WANs, and sparking security concerns. should think bigger when protecting their
ever-growing WAN.
The strain on connectivity to the WAN, move almost hourly between different
whether it’s through Multiprotocol Label workplace devices. The sheer number of Centralised control
Switching (MPLS), Internet or 4G, network endpoints now available gives
can increase organisations’ vulnerability hackers a far greater choice of potential Software-defined WAN (SD-WAN) is a
to a cyber-attack, particularly as senior attack-points on corporate networks, evi- technology that allows organisations to
staff members and network users may denced by IDC, which found that 70% centralise control or intelligently direct

10
Network Security October 2018
FEATURE

their WAN traffic. Often deployed as Some data-transmission options other rooming network endpoints.
a virtual overlay on top of an existing than SD-WAN may not provide the A trusted SD-WAN provider will have
network, SD-WAN abstracts traffic from same security benefits. For example, a professional services and business consul-
underlying private or public WAN infra- MPLS doesn’t encrypt data, whereas all tancy team that can ask appropriate ques-
structures, such as MPLS and Internet traffic travelling across particular types of tions of the customer to establish what a
broadband, to enable central IT teams to SD-WAN deployment can be encrypted. successful security solution means to them.
use multiple ‘tunnels’ for more effective Given that this approach is automatic It’s important for the corporate CIO and
data transfer and application perfor- and end-to-end in scope, traffic going CISO to communicate their priorities.
mance options. through the WAN can be partially For example, perhaps a corporate IT team
This rise of smart software-defined con- protected against cybercrime with little prioritises establishing encryption of traf-
trol techniques, from datacentres and net- intervention from network administra- fic across its WAN in order to protect
works, and now in WANs has changed tors. It removes the need to make man- it against data loss or manipulation. In
the game, with analyst IDC predicting ual configurations to every router every this case an enterprise WAN edge could
an $8bn global market for SD-WAN by time a change is made to the network. be ideal, as this provides users at disperse
2021.3 Given the company agility and remote sites with access to the same net-
productivity benefits that SD-WAN tech- “Traffic going through work services as users at the main site by
nologies provide, it’s perhaps no surprise. the WAN can be partially giving them VPN access.
Organisations can boost their branch- protected against cybercrime
level application performance by allowing
with little intervention from Potential risks
traffic to be shifted with a bandwidth link
sufficient enough to accommodate each
network administrators. It Despite the growing collaborations
application’s requirements. removes the need to make with security vendors, implementing
But SD-WAN’s benefits are about manual configurations to SD-WAN per se is not without poten-
control as much as they are about appli- every router” tial risks with regard to cyber-attacks.
cation or local office performance. It Its greatest vulnerability comes from
allows CIOs to have greater central con- Thanks to various SD-WAN pro- the tendency for organisations using
trol of the WAN from a single interface. viders’ ever-closer collaboration with SD-WAN to give office users direct
This breakthrough means that IT teams cloud-based firewall vendors, SD-WAN Internet access, given the enhanced
can automatically configure and provi- has evolved as a technology that can be speeds they’re accustomed to from home
sion new locations as the organisation deployed hand-in-hand with dedicated broadband. But Internet circuits present
grows and sets up new offices across the security offerings. A number of vendors a greater attack surface on an SD-WAN
world. CIOs can have end-to-end vis- are integrating their SD-WAN technolo- compared to MPLS, where the latter
ibility of the global network, including gy with such solutions. In a recent exam- funnels all traffic back to a central site,
individual office and application perfor- ple, an SD-WAN offering uses the secu- such as a corporate datacentre, where
mance. Using this interface, organisa- rity provider’s cloud-based firewall to it can apply security policies and safe-
tions can set policies with regards to the give CIOs greater security management guards, and then forward the traffic to
WAN traffic, including policies that capabilities by firewalling the traffic at different branch offices. But broadband
help manage security. branch offices without having to travel sends traffic directly to branch offices
to the individual locations to ‘manually’ and other locations, meaning that appro-
Security asset implement this strategy. Organisations priate security procedures need to be in
can determine security policies and for- place at every location covered by the
SD-WAN’s ability to route data across ward them to each branch, and activate SD-WAN solution. That’s why deploy-
specific paths means you can make it security solutions there. ing a cloud firewall, which can protect
a valuable security asset for your net- Collaborating with other vendors and each branch office, is key so that enter-
work. Organisations can use private lines making use of their security offerings is prises can lock down every access point.
to route sensitive traffic through, and key to SD-WAN specialists addressing an Implementing SD-WAN while taking
cheaper public Internet connections for organisation’s individual security priorities; into account the security factors that best
non-sensitive traffic. It can help secure no provider can go it alone without a secu- suit your organisation might seem like
the WAN and reduce the chances of rity vendor’s support. And every enterprise a daunting prospect, particularly given
traffic being accessed for malign reasons, or fast-growing organisation has a unique the financial commitment and personnel
with greater emphasis on the most appro- business model and related security pos- hiring that it often requires. But organisa-
priate lines. If the organisation does suffer ture, which means that they will need to tions should consider the different types
a cyber-attack on its WAN, this can get work closely with their SD-WAN supplier of SD-WAN services now available and
flagged to the CIO through the interface, to help them understand their business whether their delivery model can help lift
which shows the potential activity and outcomes and determine a solution that the burden on the implementation and
damage that has occurred. best fits their need to lock down mush- the ongoing management. Many enter-

11
October 2018 Network Security
FEATURE

prises see the business case for SD-WAN many organisations will benefit from con- collaboration between SD-WAN provid-
but cannot commit to it because they lack sultative guidance and 24x7 resourcing to ers and security vendors. A network of this
either the skilled personnel or recruitment fill those in-house network maintenance type can in fact work in your favour from
budget to bring them in to maintain such and information security skills gaps. a security perspective provided it’s high on
enhanced WAN operations. Technologies and solutions such as your agenda when looking for a supplier.
cloud computing, IoT and mobile work-
About the author
As a service ing mean that organisations are some-
times up against it when ensuring that Marc Sollars is chief evangelist and a com-
Addressing these complex needs, their WANs are secure. The vast number pany director at Teneo (www.teneo.net).
SD-WAN is offered through an ‘as a of corporate WAN endpoints being In his role as CTO, Sollars is responsible
service’ model where expert technical sup- added these days means that organisations for identifying next-generation technologies
port becomes part of the OPEX budget are potentially more vulnerable as well as that are early to market and can be inte-
and provides the customer with a more being more agile than ever before. But grated into Teneo’s services portfolio.
predictable monthly cost for its WAN instead of addressing security concerns
development. Using such models, there’s with quick fixes, organisations should References
no need for large-scale, up-front equip- consider appropriate SD-WAN and secu- 1. ‘Public cloud market will grow to
ment costs, nor a need to hire additional rity strategies, which together can take a $236 billion in 2020’. Forrester, 1
global network team members as the more strategic approach to security man- Sep 2016. Accessed Oct 2018. www.
SD-WAN can be deployed and managed agement including allowing traffic to be forrester.com/Public+Cloud+Mar
by the provider’s expert team in line with segmented depending on its sensitivity. ket+Will+Grow+To+236+Billion+
the customer’s specific business outcomes. An SD-WAN solution doesn’t just pro- In+2020/-/E-PRE9446.
Since some SD-WAN providers offer vide greater agility and reliability; a secu- 2. ‘IDC says 70% of successful breaches
expert services such as 24x7 network moni- rity solution that ties into it means that originate on the endpoint’. Rapid 7,
toring, emerging network security and per- organisations can protect their data and 31 Mar 2016. Accessed Oct 2018.
formance issues can be addressed and fixed ensure that a new approach to network- https://blog.rapid7.com/2016/03/31/
at any time of day or night. The greater ing doesn’t mean greater risk. Given that idc-says-70-of-successful-breaches-
network and performance visibility means SD-WAN providers don’t take a ‘one size originate-on-the-endpoint/.
that security breaches can be flagged to fits all’ approach to WANs, organisations 3. Millman, Rene. ‘Cloud culture calls
the organisation instantly and their causes can have their individual security needs for flexible networks’. Computer
understood more quickly. Implementing met as long as they work closely with both Weekly, Jan 2018. Accessed Oct
SD-WAN doesn’t have to be about ‘going an SD-WAN and security provider. While 2018. www.computerweekly.com/
it alone’ on enhancing network security, SD-WAN can raise risks over endpoint feature/Cloud-culture-calls-for-
and given that it is still a new technology, security, there is an increasing amount of flexible-networks.

Measuring cyber-risk
Benedict McKenna, FM Global

Resilience is the capacity for a business to quickly recover from disruption. Under
pressure, a resilient organisation is able to quickly adapt to challenges and main-
tain continuous business operations that safeguard people, assets and reputation.
Benedict McKenna
However, due to risk factors that vary across countries, it is difficult to predict
the specific challenges that businesses may face.

The FM Global Resilience Index casts ability of supply chains and degree of risk One of the challenges that cyber poses for
a light on the resilience of the business will become increasingly useful. businesses is that the lack of geographi-
environments of nearly 130 countries The index was developed in 2014 and is cal borders has allowed cyber-attacks to
and regions. This information allows updated annually. This regular update allows spread quickly if unchecked. To help
businesses to make more informed risk users to compare the resilience of each coun- businesses understand this global threat,
management decisions and allows them try’s business environment on a year-to-year the FM Global Resilience Index ranks the
to take steps to combat future challenges. basis, enabling users to identify broad trends inherent cyber-risk of indexed countries
Furthermore, as more businesses seek to across the world and within nations. and regions, while simultaneously provid-
operate in emerging markets, information The most recent data highlights the ing five years of historical data analysing
about economic stability, the depend- real and growing threat of cyber-attacks. this potential threat.

12
Network Security October 2018

You might also like