article thumbnail

NPM, encryption, and the challenges ahead: Part 1 of 2

Kentik

It’s interesting to observe how encryption and network performance monitoring (NPM) have evolved over time. Encrypted passwords came along as did token authentication. But, this goal gets harder and harder as more and more encryption gets introduced and more services move to the cloud. It’s encrypted HTTPS.

article thumbnail

MPLS, SD-WAN and Network Security

CATO Networks

TechTarget has recently published an interesting article on the security implications of deploying SD-WAN using 2 customer case studies. In both cases, the customers wanted to extend an MPLS-only WAN into a hybrid WAN based on a combined MPLS and Internet connectivity. Does SD-WAN improve on MPLS security?

MPLS 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

WAN Optimization vs. SD-WAN, or Why You Need Both

CATO Networks

The widespread adoption of Software-Defined Wide-Area-Network ( SD-WAN ) in recent years has caused many to wonder whether WAN optimization is still necessary. More specifically, t he rise of WAN optimization began around 2004 and addressed the limitations of the limited capacity of costly MPLS and leased line connections.

WAN 52
article thumbnail

BiB 081: 128 Technology Rethinks The WAN Router

Packet Pushers

128 Technology takes an interesting approach to WAN routing. In this Brief Briefing Ethan Banks and Drew Conry-Murray skim the surface of 128 Technology's approach, which includes stateful sessions, NAT, and encryption--but no tunneling. We also touch on use cases including SD-WAN and security.

WAN 52
article thumbnail

WAN Optimization in the SD-WAN Era

CATO Networks

WAN optimization has been with us for a long time. Born alongside the expensive MPLS data service, WAN optimization appliances allowed organizations to squeeze more bandwidth out of thin pipes through compression and deduplication, as well as prioritizing traffic of loss-sensitive applications such as remote desktops.

WAN 52
article thumbnail

How Secure is Your SD-WAN?

CATO Networks

The market for SD-WAN has been driven in part by its ability to reduce bandwidth costs and improve the performance of cloud access. Traditionally, Wide Area Networks (WANs) and network security were loosely coupled entities. This amicable live-and-let-live separation falls apart with todays SD-WAN.

WAN 52
article thumbnail

Traditional Firewalls Can’t Keep Up with the Growth of Encrypted Traffic

CATO Networks

A growing percentage of Internet traffic is protected by encryption. According to Google , approximately 95% of web browsing uses the encrypted HTTPS protocol. This trend toward traffic encryption has been driven by a few different factors. The move toward data encryption is a mixed blessing for cybersecurity.