ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

How new cloud architectures are changing the WAN landscape

By Heather Wright
Mon 16 Oct 2017
FYI, this story is more than a year old

With investment in cloud-based applications spawning a new set of networking needs, businesses are looking beyond legacy wide area network (WAN)-connectivity technologies, such as multi-protocol label switching (MPLS), to address their needs.

They are turning to software-defined WAN solutions to resolve many of the shortcomings found in traditional architectures by putting a secure, virtualised overlay on top of the WAN.

Currently about 80% of US companies are considering public or private cloud according to IDC, and many are actively building out hybrid cloud strategies. This growth in cloud usage is having a transformational impact on IT resource plans.

A recent IDC survey revealed a flip in how IT budgets would be allocated over time. At the time of the survey, respondents were spending 58% of their IT budget on non-cloud architecture and 42% on cloud. They anticipated that usage changing to 44% non-cloud and 56% cloud in the next 24 months.

New networking needs are arising. Traditional WAN architectures were designed for efficiency and performance when applications primarily resided in the data center. With the proliferation of cloud and software-as–a-service (SaaS) applications, traditional means of connecting branches and users to applications needs to change.

As enterprises embrace broadband connectivity in favour of, or to complement, MPLS they must also ensure that the WAN delivers consistent performance across all sources of connectivity (e.g., DSL, Cable, LTE and MPLS), visibility and control for legacy and cloud-based applications, and faster service provisioning.

Times are changing

It’s been nearly two decades since MPLS rose to prominence, replacingrelay as the preferred WAN solution. MPLS’ reliability combined with its ability to deliver on SLAs helped to drive its ascent. MPLS offered reliable access to data center-based applications — which were predominant, provided support for branch-to-branch communication for voice and video, and could easily handle the small amount of non-critical Internet traffic that passed through the network.

However, in the past five years things have changed dramatically and continue to do so.  Applications are moving to the cloud – the architecture, agility and flexibility that accompany such a transition no longer favour MPLS, which is more rigid, expensive and not optimised for cloud application environments.

For example, with MPLS, accessing a cloud-based application follows a very different path from accessing a data center-based application. While MPLS provides branch users with direct access to an application housed in the data center, it can create a circuitous and more expensive path for branch users accessing cloud-based applications.

In a cloud architecture with an MPLS-based WAN, the traffic must first travel over the MPLS network from the branch office to the data center before finally going out to the Internet, and then back the same route. This can impair application performance and user productivity, while also increasing costs. According to IDC, 90 per cent of new applications are being developed specifically for the cloud, and this gap will continue to grow and render MPLS increasingly ineffective for connecting users to cloud-based applications.

But cost isn’t the only issue. User experience has also become problematic. The challenges of using a traditional MPLS network to connect to cloud-based applications are often recognised when employees are frustrated by application performance at the office and find that accessing the same cloud-based applications from their home-based Internet connection is faster than at the office.

Looking beyond MPLS

The questions enterprise IT professionals are asking are: Is there a way to leverage broadband for their enterprise WAN to make accessing cloud-based applications more efficient and less expensive? Can they introduce and bond multiple sources of connectivity – MPLS, broadband, LTE and so on — without compromising the high level of reliability, security and performance they expect with their traditional WAN architecture?

Finding a solution that combines the flexibility, scalability and cost of broadband with the control and reliability of MPLS seemed impossible. Until now. Enterprises now have a solution called the software-defined WAN (SD-WAN).

An SD-WAN resolves many of the shortcomings found in traditional WAN architectures by putting a secure, virtualised overlay on top of the WAN to enable simple, centralised provisioning, application and user visibility, and the ability to bond multiple sources of connectivity simultaneously through dynamic multi-path control. High-performance SD-WAN solutions deliver superior performance regardless of the type(s) of connectivity deployed – all while driving down costs significantly, in some cases by up to 90 per cent.

Essentially, an SD-WAN turns the WAN into a geographically distributed LAN, providing the enterprise with a dynamic solution that bonds multiple sources of connectivity, is faster to deploy and can be centrally monitored and managed.

Gartner cites four key components of an SD-WAN solution. SD-WANs:

1. Provide a lightweight replacement for traditional WAN routers and are agnostic to WAN transport (e.g., support MPLS, Internet and LTE).

2. Allow for load sharing of traffic across multiple WAN connections in an efficient and dynamic fashion that can be based on business or application policies.

3. Simplify the complexity associated with management, configuration and orchestration of WANs

4.  Must provide secure VPNs and have the ability to integrate additional network services.

SD-WAN advantage

Not all SD-WANs are created equal. Enterprises should seek a solution that can replace or augment MPLS with broadband Internet to satisfy application performance challenges and couple it with best-in-class optimisation so that users have the same experience no matter where they reside.

Security should be enhanced by allowing for micro-segmentation on the WAN. Administrators must be able to determine who should utilise specific connections and what applications are destined to travel across identified routes.

Business intent policies can determine what traffic travels across a specific connection, improving security and helping to achieve compliance requirements through segmentation. Where none exist, the solution should constantly re-evaluate and choose the most efficient path.

A prime solution can:

  • Remove the pain of building and provisioning an MPLS network that can take weeks, or sometimes months, to connect users at multiple branches to mission-critical applications.
  • With zero-touch deployment, effectively leverage 4G LTE initially so that a new branch office is up and running in minutes. Wired Internet or MPLS can then be addressed at a later stage when contracts are finalised and IT time allocated.
  • Polices and provisions can be independent of the carrier, making it easy and non-disruptive to switch providers.

Getting started with such a solution should be simple. With no rip and replace needed, enterprises can start small, deploying SD-WAN in a few branch offices and the data center. Once organisations have familiarised themselves with the technology, the deployment can be scaled out to support thousands of branch offices, all managed from single, centralised orchestration tool.

By Graham Schultz, Sales Director Australia and New Zealand, Silver Peak

Related stories
Top stories
Story image
Tech job moves
Tech job moves - Adatree, Brother, Databricks, Nutanix & Rubrik
We round up all job appointments from May 20-26, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Cybersecurity
Could New Zealanders initiate a cyber attack from within?
The threat landscape is significantly increasing worldwide, and the opportunities it presents are a growing concern in Aotearoa.
Story image
PIJF
The path to bolstering supply chain security in New Zealand
A significant amount of today's business and leisure activity relies on IT supply chains. From complex international freight trades to local small business distribution channels, any supply chain that involves IT infrastructure serves as a crucial tool in our daily lives. 
Story image
Ingram Micro
Ingram Micro NZ bolsters MSI product range with new offerings
The inclusion of MSI Mobile Workstation and Business & Productivity laptops rounds out the MSI product portfolio.
Story image
Cybersecurity
Asia Pacific plagued by sophisticated bad bots - report
The three most common bot attacks were account takeover, content or price scraping, and scalping to obtain limited-availability items.
Story image
Microsoft
Microsoft previews Power Platform website design offering
Microsoft has announced the preview of Power Pages, the fifth product in its Power Platform family, designed for low-code makers and professional developers.
Story image
Malware
'Alarming' rise in ransomware threats - Verizon report
As criminals look to leverage increasingly sophisticated forms of malware, it is ransomware that continues to prove particularly successful.
Story image
Training
Delinea enhances partner experience with new training initiatives
Delinea has announced a range of training and certification initiatives to help scale the capacity of VARs, System Integrators, MSPs and MSSPs to meet the demand for PAM solutions.
Story image
Microsoft
Elevation of Privilege the top 2021 Microsoft vulnerability
BeyondTrust has released its 2022 Microsoft Vulnerabilities Report, finding that Elevation of Privilege is the top vulnerability category for the second consecutive year.
Story image
Ransomware
CERT NZ releases first Cyber Security Insights for 2022
CERT NZ has released Quarter One: Cyber Security Insights 2022, which offers an overview of reports about cybersecurity incidents affecting New Zealanders.
Story image
Training
Infosec unveils role-guided cybersecurity training roadmaps
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Story image
Identity and Access Management
The post-pandemic workforce requires secure IAM capabilities
HID Global discusses what identity and access management means for organisations in today's convoluted digital world.
Story image
Phishing
Vishing attacks reach all time high - Agari and PhishLabs
"Hybrid vishing campaigns continue to generate stunning numbers, representing 26.1% of total share in volume so far in 2022."
Story image
Microsoft
Global cybersecurity insurance market worth $11.5b this year
Future Market Insights finds the cybersecurity insurance market is expected to reach USD$11.5 billion in 2022, growing to $61.2 billion in 10 years.
Story image
Vectra AI
Vectra’s inaugural Partner of the Year Awards revealed
APAC companies Baidam, Firmus, ShellSoft and Macnica have been recognised in Vectra AI's inaugural Partner of the Year Awards.
Story image
Ransomware
APAC ranks third-highest region targeted by ransomware
Asia Pacific has ranked the third-highest region globally to be targeted by ransomware, according to cybersecurity firm Group-IB.
Story image
Transport
Third-party automotive apps bear significant privacy risks
Mobile applications for connected cars provide various features to make life easier for motorists, but they can also be a source of risk.
Story image
Surveillance
i-PRO releases smallest AI-based surveillance camera on the market
The new i-PRO mini network camera is now available, with a pocket-sized form factor and full AI analytics functionality.
Story image
Symbio
Symbio consolidates TNZI business to support APAC expansion
Symbio has recently announced the consolidation of its international business (TNZI) under the Symbio brand to support its Asia Pacific expansion strategy.
Story image
Sony
Sony launches LinkBuds S - the latest model in the series
Sony says the LinkBuds S will give users a unique sound experience through sensor and spatial sound technology, even in AR games.
Story image
Cybersecurity
Cybersecurity prompts upgrade for 1.3 billion electricity meters
ABI Research finds Advanced Metering Infrastructure (AMI) and cybersecurity concerns are prompting the upgrade of 1.3 billion electricity meters by 2027.
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.
Story image
Microsoft
Microsoft NZ announces initiative for local SaaS businesses
Microsoft has announced a new initiative, bringing together all of its tools to help local SaaS businesses build, sell and grow their companies at scale.
Story image
Getac
Getac and Optalert expand partnership to promote industrial safety
Getac’s ZX70 Android tablets will be used to support Optalert’s Eagle Industrial early-warning drowsiness detection system for use in mining and transportation.
Story image
Wireless
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Omnichannel
Lexmark launches A/NZ first with retail publishing solution
Lexmark, a global imaging and IoT solutions leader, launched its Publishing Platform for Retail (PPR) in Australia and New Zealand.
Story image
Digital Transformation
SAP partners with New Zealand Rugby for digital transformation
The multi-year partnership will see SAP advance NZR with its organisational operations, team performance, fan experience and sustainability goals.
Story image
Microsoft
Microsoft NZ and TupuToa to boost diversity in cybersecurity sector
Microsoft NZ has teamed up with TupuToa to co-develop a cyber security employment programme specifically aimed at creating more diversity in Aotearoa's cybersecurity sector.
Story image
Cybercrime
The ups and downs and runarounds of catching cybercriminals in NZ
We're becoming more and more aware of cybercrimes but how many criminals actually get caught? The New Zealand police explain why the answer is complicated.
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Manhattan Associates
Shortening the click-to-customer cycle through smart technologies
Speed of delivery without accuracy is a dealbreaker for consumers. How can retailers operating in an omnichannel environment overcome the challenge of click-to-customer cycle times.
Story image
Cybersecurity
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
Story image
Malware
Fortinet introduces self-learning AI in latest offering
Fortinet is introducing self-learning AI capabilities in its new network detection and response offering, FortiNDR.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
Dynabook
Dynabook refreshes Portégé X30L series with the Portégé X30L-K
The new model contains hybrid-architecture Intel 12th Gen Core P-Series 28W processor options, Wi-Fi 6E, along with Intel Iris Xe graphics.
Story image
Digital Marketing
Similarweb acquires SEO and rank tracking company Rank Ranger
Digital intelligence company Similarweb, which specialises in analysing web traffic, has acquired Rank Ranger, a market leader in SEO and rank tracking.
Story image
Chorus
Chorus and Nokia launches first trial of 25G PON broadband
Chorus and Nokia have announced the successful demonstration of 25 gigabit per second fibre (Gbps) broadband technology at the Chorus Fibre Lab in Auckland. 
Story image
Phishing
WhatsApp and QR codes the next scam threat - report
KnowBe4 has warned it expects to see an increase in QR Codes and the WhatsApp chat platform being used for phishing and other scams. 
Story image
Informatica
Informatica, Oracle enter strategic global cloud partnership
Oracle named Informatica as a preferred partner for enterprise cloud data integration and data governance for data warehouse and lakehouse solutions on OCI. 
Story image
Wireless
Hands-on review: HyperX Pulsefire Haste wireless mouse and HyperX Pulsefire XL Mat
With its lightweight Pulsefire Haste wireless mouse and RGB lit Pulsefire XL Mat, HyperX sets out to up your game and add a little colour to your desktop.
Story image
Artificial Intelligence
Frost & Sullivan recognises Genesys as leader in new reports
Frost & Sullivan has recognised Genesys as a leader in the cloud contact centre market for its robust cloud and digital capabilities.
Story image
Ransomware
Employees on the frontline of cyber defense - report
In the first quarter of 2022, employees found themselves more than ever at the frontline of cyber defense, according to a new report from Kroll. 
Story image
GapMaps
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.