Software-Defined Security Poised to Disrupt Security Appliance Market

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
Next Software-Defined Security Poised to Disrupt Security Appliance Market-9 Next

Centralize, Automated Operations

Software-defined security also provides a way to deliver services from a single point of control, avoiding the challenging requirement for skilled personnel to be available to go onsite whenever needed. Instead, services can be deployed, increased in capacity and enhanced with additional functions, all without requiring any onsite presence, hardware refreshes or manual provisioning.

Branch office networks are proving to be one of the weakest links in many enterprise organizations. In the 2013 Gartner report "Bring Branch Office Network Security Up to the Enterprise Standard," analyst Jeremy D'Hoinne wrote that "30 percent of advanced targeted threats — up from less than 5 percent today — will specifically target branch offices as an entry point."

The attack landscape and threat vectors have evolved since that report was published — branch security architectures for the most part have not. While point security appliances, such as next-generation firewalls (NGFWs), unified threat management (UTM) devices and software overlays in branch routers still rule the day when it comes to protecting branch perimeter security, recent advancements in network function virtualization (NFV) are allowing the exact same security features found in NGFWs and UTMs to be served via software as virtualized network functions (VNFs). In this slideshow, Versa Networks looks at eight reasons why this new world of software-defined security is poised to disrupt proprietary security appliance makers.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.