article thumbnail

Bridging the LAN and the WAN: Our WAN Bridge IoT Hack

PubNub

At last week's Hackendo, we bridged the LAN and the WAN, connecting devices on the Wide Area Network securely and reliably with a WAN bridge

LAN 96
article thumbnail

MPLS, SD-WAN and Network Security

CATO Networks

TechTarget has recently published an interesting article on the security implications of deploying SD-WAN using 2 customer case studies. In both cases, the customers wanted to extend an MPLS-only WAN into a hybrid WAN based on a combined MPLS and Internet connectivity. Does SD-WAN improve on MPLS security?

MPLS 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Network Security and Direct Internet Access: The Foundation of MPLS WAN Transformation

CATO Networks

In a recent webinar we conducted at Cato , we asked the audience a poll question: What is the primary driver for your SD-WAN project? We were a bit surprised to find out that secure, direct Internet access was the top driver. Why is security such a big deal with SD-WAN? But, is the cure worse than the disease?

MPLS 52
article thumbnail

WAN Optimization in the SD-WAN Era

CATO Networks

WAN optimization has been with us for a long time. Born alongside the expensive MPLS data service, WAN optimization appliances allowed organizations to squeeze more bandwidth out of thin pipes through compression and deduplication, as well as prioritizing traffic of loss-sensitive applications such as remote desktops.

WAN 52
article thumbnail

Where is Network Security headed in 2020?

CATO Networks

Almost 15 years later, the comparison applies perfectly to the state of network security. So, after all the running weve done in the 2010s, where is network security headed in 2020? What WAN security solutions do enterprises need to protect their networks as we kick off the decade?

article thumbnail

Advanced Network Security Technologies

CATO Networks

Since the release of Gartners Market Guide for Zero Trust Network Access (ZTNA) last April, ZTNA has been one of the biggest buzzwords in network security, and for good reason. A policy of zero trust helps enterprises limit exposure to the myriad of threats facing the modern network. Lets find out.

article thumbnail

SD-WAN: Designed for Completeness?

CATO Networks

Lets analyze SD-WANs completeness according to this definition. SD-WAN delivers various benefits compared to legacy WANs, mainly offering enterprises cost optimization, agility, and simplicity. Dynamic load sharing of traffic across multiple WAN connections, based on corporate defined policies. So, Whats Missing?

WAN 52