• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Optimising SD-WAN to Secure Enterprise IoT Devices

by CXO Staff
December 12, 2021
in Opinions

Jacob Chacko at Aruba, a Hewlett Packard Enterprise company, explains how SD-WAN can secure enterprise IoT devices to mitigate network-wide cyber-attacks.

DNS

The proliferation of IoT devices across enterprises brings new ways to monitor, automate and optimise business processes – from intelligent manufacturing lines to automated lighting in smart offices for energy savings. However, while IoT makes businesses more efficient through automation, it also increases the attack surface by adding a new dimension of security complexity.

Jacob Chacko, HPE Aruba
Jacob Chacko, HPE Aruba

Examples of enterprise IoT devices can include point of sale (PoS) credit card processing terminals, heating, ventilation, air-conditioning (HVAC) control systems, surveillance cameras, flow sensors and more. These network-connected devices communicate over the internet either to a control centre running in a public cloud environment such as AWS, Azure, Google Cloud, or a corporate data centre where the large data sets are recorded and analysed. Because these enterprise IoT devices connect over the internet, they can introduce new threats and have become attractive targets for opportunistic cybercriminals. Why? Due to its connected nature, if a cyber-attack on an IoT device is successful, it provides a backdoor into an organisation’s entire network.

Zero Trust Network Access

The acceleration of digital transformation over the last 15+ months has only served to intensify the problem, which has prompted technology leaders to assess the full spectrum of devices across their organisations. One way IT teams are tackling the growing mobile device security challenge is to deploy a Zero Trust Network Access (ZTNA) solution based on the Zero Trust model. A ZTNA solution works by installing an endpoint agent on a user device such as a laptop, tablet or mobile phone, which ensures traffic from the device is directed to a cloud-delivered security service before being directed towards a SaaS application or IaaS provider.

So far so good, however, unlike mobile user devices, ZTNA solutions won’t work on the majority of IoT devices since they are agentless and therefore don’t support the installation of third-party software agents. Because of this, enterprises require a different security solution for IoT devices. Enter SD-WAN – a new approach to securing enterprise IoT devices.

Advanced, Business-Driven SD-WAN Edge Platform

With an advanced, business-driven SD-WAN edge platform, enterprises can mitigate the risk of exposure to breaches associated with IoT devices without the need to install ZTNA agents. Instead, the platform is able to identify and classify IoT device traffic on the first data packet, and segment it at the network edge to an appropriate zone where it can be isolated from all other network traffic. This end-to-end segmentation spans the enterprise and enforces consistent and automated security policies with granular visibility.

Segment and isolate

The ability to isolate segments of IoT device traffic is one of the key benefits of the end-to-end segmentation that is made possible through an advanced SD-WAN platform. An independent security policy can be configured and applied to each segment which instructs the network where to send the traffic and subsequently defines role-based access levels and security restrictions such that IoT devices can only communicate with IoT headend systems. It’s this level of zero trust dyamic segmentation that isolates threats and prevents cybercriminals from gaining access to the wider network; since traffic in one segment is isolated from traffic in other segments, it prevents unauthorised access and means that even if a threat were to appear, its impact is contained only to the segment in which it emerged. Moreover, with an integrated zone-based stateful firewall, enterprises can secure remote sites and IoT devices from any potential nefarious incoming threats by blocking them.

A good example of this in action can be seen in the difference between how you might secure PoS and HVAC systems at a remote site. In the case of the aforementioned PoS device, given the sensitive nature of customer information involved a business may wish to direct the data back through the corporate data center where it hosts the credit card transaction processing application, allowing the existing firewall security services to verify the traffic. However, the same business may not want or need to handle data from HVAC in the same manner. Instead, it could define a separate policy that intercepts and directs that traffic to a cloud-delivered security service, for additional inspection enroute to the IoT control centre hosted in the public cloud. Since the two traffic types are kept separate and adhere to different security policies, a breach in the HVAC segment would not compromise any credit card and personal data in the PoS segment.

Safeguarding cloud-first enterprises

As well as the clear advantages of segmentation and isolation, the other benefits of an advanced SD-WAN Edge platform in an IoT environment are its abilities to autonomously track and respond to threats. It continuously monitors the state of the enterprise network and IoT applications to detect changing conditions – including spotting a DDoS attack – and will then trigger immediate, automated real-time responses to mitigate the impact of any security threat events.

This is critical in a cloud-first environment where rapid change, increased data, and potential cyber threats are growing in equal measure. According to IDC, the cloud services market alone will exceed $1 trillion by 2024, so it’s safe to assume that cloud-first enterprises are set to be the new norm. However, this transformation cannot rely on legacy security infrastructure or manual policy changes. Cybercriminals will be quick to identify any unsecure IoT device and businesses must be ready to detect and respond to intrusion instantaneously. Technology leaders must ensure they are safeguarding their enterprises throughout their transformation journey to ensure they are ready and able to embrace IoT’s benefits without putting the corporate network at risk.

Final word

When applied correctly, IoT devices can help automate business operations, drive significant operational efficiencies, and deliver real-time intelligence that makes organisations more agile. But as enterprises continue to deploy more and more connected devices, it’s critical to manage the unique security challenges associated with them. An advanced SD-WAN edge platform unifies the advanced technologies required to identify, classify, segment and secure the network and ideally suited to maximise the return on enterprise IoT investments, while protecting the wider business network and operations.

Tags: Cybersecurityfeatured2HPE ArubaiotSD-WANSecurityZero TrustZTNA
ShareTweet

Related Posts

Empowering the UAE’s digital future through data sovereignty
Opinions

Empowering the UAE’s digital future through data sovereignty

As the UAE continues to lead the charge in technological innovation, the importance of data sovereignty has never been more...

May 26, 2025
AI agents are set to become an indispensable part of the GCC security apparatus
Opinions

AI agents are set to become an indispensable part of the GCC security apparatus

Middle Eastern countries continue to bet big on AI—and for good reason. National strategies like the UAE Artificial Intelligence Strategy...

May 23, 2025

Discussion about this post

Latest Issue

Help AG joins forces with F5

Help AG joins forces with F5

June 3, 2025
HPE enhances robust compute platforms for mission-critical operations

HPE enhances robust compute platforms for mission-critical operations

June 3, 2025
From QR code to compromise: the growing threat of “quishing”

Kaspersky uncovers malware targeting fintech platforms

June 3, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.