2nd Generation SD-WAN & Best of Breed Cloud Security - Better Together
Jason Wells
Experienced Senior Executive | Expert in Global Sales & Channel GTM Strategy | Driving Territory Creation, Execution & Leadership | Expert in IP, Cloud, SDN, SD-WAN & Security
CloudGenix AppFabric with netskope ensures a consistent security perimeter for every site in the enterprise in the midst of constantly changing WAN boundaries and evolving threats
Business Challenges
Adoption of SaaS and Internet as an access technology has forced the security perimeter to move from the data-centre to the branch. Traditional security approaches involving deployment of physical or virtual hardware at each perimeter location is no longer viable for a variety of reasons. Procurement, deployment, and management of such devices can significantly erode the ROI of Internet as a replacement for MPLS. The sheer complexity of managing policy across hundreds or even thousands of endpoints is cumbersome and time consuming. Finally, most businesses are concerned about the branch network becoming more complex rather than less.
Introducing CloudGenix AppFabric
CloudGenix AppFabric is a Software-defined WAN (SD-WAN) solution that allows businesses to overlay a secure application-centric fabric of connectivity amongst all of their sites and the cloud. AppFabric allows business policies to be defined for performance, security, and compliance, specifying in business language which applications are important for each site, how they should be prioritised, and which WAN links can be used for each application. This provides you with explicit control over how your WAN is utilised and specific links, enables confident integration of the cloud, and allows for deployment of broadband Internet seamlessly at each remote office for increased capacity and lower costs.
Cloud Evangelist | Solutions Engineering Leader | Customer Advocate
4 年Jason, this is a perfect example of how Gartners S.A.S.E model will be implemented. A SDWAN solution such as CloudGenix is how user traffic will be intelligently steered into the secure edge, maintaining the most efficient path. Great post!