© 2019 Open Systems. All rights reserved. Confidential information.
Simplified & Managed SD-WAN
Dave Nuti
@DavidNuti
October 2019
Booth 22
Agenda
• About Open Systems
• Debunk some SD-WAN Myths & Agree on Benefits
• What is really driving SD-WAN Adoption
• What needs to be considered
• The 800lb Gorilla in the Room
• A model to consider
• Wrap up
Automated ISP
link failover
Hybrid networks
Internet + MPLS
Network Security Monitoring
Built into the platform
Services running
in 180 countries
EQT
partnership
Transition to Managed
Security Service Provider
From hardware-centric
to service-centric
19
90
Founded as
Security Integrator
20
18
Global Sales expansion to
ROW + Partner Strategy
19
99
20
17
20
16
Office in U.S.
Sales, Eng. and Client Success
20
09
Services running
in 100 countries
20
13
20
17
20
15
Application visibility and control
Fully featured
20
03
20
09
Open Systems history and evolution
20
11Global configuration deployment
Aka cloud-managed configurations
Local Internet break-out
Cloud proximity
CEO based in Silicon Valley
Swiss engineering paired
with US marketing
Intelligent. Managed. Secure. Mature.
Technology + Management + Monitoring
• Including
• NextGen Firewall
• Secure Web Proxy
• CyberSecurity
• CASB
• SIEM
• SOCaaS
• Remote Users
• Secure Email Gateway
• Much, much more
• Including
• SD-WAN
• App Acceleration
• Optimization
• ISP Monitoring
• Carrier Management
• Visibility
• Routing and Switching
24x7
AI Automated SOC
Monitoring &
Management
Security
Routing &
Performance
Open Systems Platform
SD-WAN – The Myths
• 100+ Companies directly/indirectly sell SD-WAN
• Acquisition, Partnership, Compatibility claims
• SD-WAN is an MPLS Killer
• Save 40…50…even 60%!
• Easy to deploy…no, really!
• 6% of Companies Surveyed have no plans to
deploy SD-WAN by 2023*
* ZK Research
Agreed Upon Benefits of SD-WAN
1. Business Agility
• Provision sites in days rather than months
• Internet availability vs. private networks
• Agnostic to connectivity type
2. Simplify the edge
• Technology Convergence
• Router/Firewall/Optimization
• Centralized management and monitoring tools
• Reduction in Capital Expenditure
3. Internet economies of scale
• Internet Bandwidth to reduce MPLS reliance
• Deliver a strong user experience to SaaS Applications
• O365, Salesforce, Workday, etc.
•Operational
•Technical
•Commercial
What is really driving SD-WAN Adoption?
APPLICATIONS
But there is severe reciprocal impact
SD-WAN Alone is not enough
SD-WAN Considerations
• Split tunneling
• Transport choices
• End-to-end visibility
• Security
Circumstances in the room…
the Macro-factors
• Application origins have diversified
• DC, Cloud, SaaS, IaaS
• End user destinations have diversified
• Corporate, Remote, 3rd Party
• Requirement for more Internet
• IT Talent Shortage
• 3M+ open job requisitions in IT Security
Macro-factors ushering in new responsibilities
• New network layer strategy
• New distributed security requirements
• New threat types
• New reliability and SLA requirements
• New app user experience requirements
• New IT skillsets needed
Synchronized Your Strategy – 3 Key Areas
1. Network / Physical Layer
• Augment and/or replace existing network
2. Unify Technology Groups
• Security
• NextGen Solutions and Services
• Centralized, universal policies for all application & user origins
• SD-WAN –
• Routing, Resiliency, Path Selection Intelligence
• Application Acceleration/Optimization
• Mitigate latency, improve responsiveness
3. Managed Services
• Self Management Tools – Empowering staff and improving efficiency
• Modern Managed Services
• Scaled core competency experience
• Intelligent platforms
Prevent
Tech Silos
Accelerated Growth to $66.5B by 2025
Modern Managed Services
• Winners – Execute on Thought Leadership
• Force multiplier on resources and expertise
• Capitalize on matured best practice immediately
• More responsive to changing requirements
• Outdated viewpoints & risky excuses
• Managed Services are for the incapable
• “I don’t want to give up control/direction.”
• “It’s more secure if we do it ourselves.”
A Complete Managed Platform
Do-it-Yourself vs. the holistic approach
Identity Management
Firewall Proxy
Traffic Flow Analysis
Client VPN Email/Spam
Intrusion Detection
Endpoint Security
Identity Management
Firewall Proxy
Endpoint Security
Network Security
Monitoring
Traffic Flow Analysis
Client VPN Email/Spam
Security
Performance
Control
Automated
Monitoring &
Management
Security
Routing &
Performance
A single platform
Open Systems holistic approach
Unified proven commercial and open source components
Distributed Firewall
Security Zone
Enterprise Firewall
WAN Encryption
Partner Site Connectivity
Intrusion Detection
Distributed Network Intrusion
Prevention
WiFi Security
Captive Portal
EAP Authentication
Web Proxy
SSL Scanning
URL Filtering
Malware Protection
Email Gateway
Spam- and Malware Protection
Enforced TLS-Encryption
Web Application Firewall
Identity Server
Directory Synchronization
Federated Identity
Management
CASB
Web Single Sign-on
Strong Authentication
OTP Token Authentication
Certificate Authentication
SMS Authentication
Client VPN &
Mobile Device Access
Managed threat Detection
and Response
Cloud Express
WAN Routing
OSPF, BGP, RIP
Inter-Domain BGP Router
Tactical Networks
Mobile Connectivity Unit
Satellite Link Management
Sourcing Services
Connectivity Evaluation
Connectivity Installation
Connectivity Management
Switching
Public DNS Server
Anycast DNS
24x7 Level 3 Support
Service Delivery Platform
Mission Control Cloud
Security Gateway
Security Operations Center
Managed SIEM
Mission Control Portal
Real-time Monitoring and
Reporting Tools
Delegated Administration
Ticketing
Capabilities portfolio
Application Performance
Management
Application Visibility
Application Control
(QoS / WAN Path Control)
Application Acceleration
Optomization
SD-WAN
Partner Connect
ROUTING & PERFORMANCESECURITY
Technology alone is half of the job
Technology
Security & Networking
“Technology isn’t the answer to the challenge. Technology is the reason we are where we are today.
Head of FBI San Francisco Cyber Security Branch
Gartner IAM Conference, December 2018
Security Operations Center (SOC)
Continuous Monitoring
+
What Is A
SOC? • Continuous monitoring
• Staffed by security experts
• Advanced AI-assisted threat detection
• Containment
• Incident response
Mission Control Portal | Orchestration
Empowering tools
ü 24x7 monitoring
ü Unlimited tickets (changes, incidents, etc.)
ü Real-time reporting
ü Automated incident and escalation
ü Audit trail
ü Proactive intervention
ü Sign-off enforcement
ü Capacity planning
ü Security engineer annotations
ü Multi-level escalations by SMS / email / phone
24x7
SOC/NOC
ZurichCA, USA
• Strategy is more important than technology
• Creating WAN Related Technology Silos is a
fragmented strategy and the enterprise is on to it
• Modern Managed Services are far more than
outsourced labor
• Security Managed Services is growing by 3x over
the next 5 Years - $18B to $66B
The takeaway

SD-WAN - comSpark 2019

  • 1.
    © 2019 OpenSystems. All rights reserved. Confidential information. Simplified & Managed SD-WAN Dave Nuti @DavidNuti October 2019 Booth 22
  • 2.
    Agenda • About OpenSystems • Debunk some SD-WAN Myths & Agree on Benefits • What is really driving SD-WAN Adoption • What needs to be considered • The 800lb Gorilla in the Room • A model to consider • Wrap up
  • 3.
    Automated ISP link failover Hybridnetworks Internet + MPLS Network Security Monitoring Built into the platform Services running in 180 countries EQT partnership Transition to Managed Security Service Provider From hardware-centric to service-centric 19 90 Founded as Security Integrator 20 18 Global Sales expansion to ROW + Partner Strategy 19 99 20 17 20 16 Office in U.S. Sales, Eng. and Client Success 20 09 Services running in 100 countries 20 13 20 17 20 15 Application visibility and control Fully featured 20 03 20 09 Open Systems history and evolution 20 11Global configuration deployment Aka cloud-managed configurations Local Internet break-out Cloud proximity CEO based in Silicon Valley Swiss engineering paired with US marketing
  • 4.
    Intelligent. Managed. Secure.Mature. Technology + Management + Monitoring • Including • NextGen Firewall • Secure Web Proxy • CyberSecurity • CASB • SIEM • SOCaaS • Remote Users • Secure Email Gateway • Much, much more • Including • SD-WAN • App Acceleration • Optimization • ISP Monitoring • Carrier Management • Visibility • Routing and Switching 24x7 AI Automated SOC Monitoring & Management Security Routing & Performance Open Systems Platform
  • 5.
    SD-WAN – TheMyths • 100+ Companies directly/indirectly sell SD-WAN • Acquisition, Partnership, Compatibility claims • SD-WAN is an MPLS Killer • Save 40…50…even 60%! • Easy to deploy…no, really! • 6% of Companies Surveyed have no plans to deploy SD-WAN by 2023* * ZK Research
  • 6.
    Agreed Upon Benefitsof SD-WAN 1. Business Agility • Provision sites in days rather than months • Internet availability vs. private networks • Agnostic to connectivity type 2. Simplify the edge • Technology Convergence • Router/Firewall/Optimization • Centralized management and monitoring tools • Reduction in Capital Expenditure 3. Internet economies of scale • Internet Bandwidth to reduce MPLS reliance • Deliver a strong user experience to SaaS Applications • O365, Salesforce, Workday, etc. •Operational •Technical •Commercial
  • 7.
    What is reallydriving SD-WAN Adoption? APPLICATIONS But there is severe reciprocal impact SD-WAN Alone is not enough
  • 8.
    SD-WAN Considerations • Splittunneling • Transport choices • End-to-end visibility • Security
  • 9.
    Circumstances in theroom… the Macro-factors • Application origins have diversified • DC, Cloud, SaaS, IaaS • End user destinations have diversified • Corporate, Remote, 3rd Party • Requirement for more Internet • IT Talent Shortage • 3M+ open job requisitions in IT Security
  • 10.
    Macro-factors ushering innew responsibilities • New network layer strategy • New distributed security requirements • New threat types • New reliability and SLA requirements • New app user experience requirements • New IT skillsets needed
  • 11.
    Synchronized Your Strategy– 3 Key Areas 1. Network / Physical Layer • Augment and/or replace existing network 2. Unify Technology Groups • Security • NextGen Solutions and Services • Centralized, universal policies for all application & user origins • SD-WAN – • Routing, Resiliency, Path Selection Intelligence • Application Acceleration/Optimization • Mitigate latency, improve responsiveness 3. Managed Services • Self Management Tools – Empowering staff and improving efficiency • Modern Managed Services • Scaled core competency experience • Intelligent platforms Prevent Tech Silos
  • 12.
    Accelerated Growth to$66.5B by 2025 Modern Managed Services • Winners – Execute on Thought Leadership • Force multiplier on resources and expertise • Capitalize on matured best practice immediately • More responsive to changing requirements • Outdated viewpoints & risky excuses • Managed Services are for the incapable • “I don’t want to give up control/direction.” • “It’s more secure if we do it ourselves.”
  • 13.
    A Complete ManagedPlatform Do-it-Yourself vs. the holistic approach Identity Management Firewall Proxy Traffic Flow Analysis Client VPN Email/Spam Intrusion Detection Endpoint Security Identity Management Firewall Proxy Endpoint Security Network Security Monitoring Traffic Flow Analysis Client VPN Email/Spam Security Performance Control
  • 14.
    Automated Monitoring & Management Security Routing & Performance Asingle platform Open Systems holistic approach Unified proven commercial and open source components
  • 15.
    Distributed Firewall Security Zone EnterpriseFirewall WAN Encryption Partner Site Connectivity Intrusion Detection Distributed Network Intrusion Prevention WiFi Security Captive Portal EAP Authentication Web Proxy SSL Scanning URL Filtering Malware Protection Email Gateway Spam- and Malware Protection Enforced TLS-Encryption Web Application Firewall Identity Server Directory Synchronization Federated Identity Management CASB Web Single Sign-on Strong Authentication OTP Token Authentication Certificate Authentication SMS Authentication Client VPN & Mobile Device Access Managed threat Detection and Response Cloud Express WAN Routing OSPF, BGP, RIP Inter-Domain BGP Router Tactical Networks Mobile Connectivity Unit Satellite Link Management Sourcing Services Connectivity Evaluation Connectivity Installation Connectivity Management Switching Public DNS Server Anycast DNS 24x7 Level 3 Support Service Delivery Platform Mission Control Cloud Security Gateway Security Operations Center Managed SIEM Mission Control Portal Real-time Monitoring and Reporting Tools Delegated Administration Ticketing Capabilities portfolio Application Performance Management Application Visibility Application Control (QoS / WAN Path Control) Application Acceleration Optomization SD-WAN Partner Connect ROUTING & PERFORMANCESECURITY
  • 16.
    Technology alone ishalf of the job Technology Security & Networking “Technology isn’t the answer to the challenge. Technology is the reason we are where we are today. Head of FBI San Francisco Cyber Security Branch Gartner IAM Conference, December 2018 Security Operations Center (SOC) Continuous Monitoring +
  • 17.
    What Is A SOC?• Continuous monitoring • Staffed by security experts • Advanced AI-assisted threat detection • Containment • Incident response
  • 18.
    Mission Control Portal| Orchestration Empowering tools ü 24x7 monitoring ü Unlimited tickets (changes, incidents, etc.) ü Real-time reporting ü Automated incident and escalation ü Audit trail ü Proactive intervention ü Sign-off enforcement ü Capacity planning ü Security engineer annotations ü Multi-level escalations by SMS / email / phone 24x7 SOC/NOC ZurichCA, USA
  • 19.
    • Strategy ismore important than technology • Creating WAN Related Technology Silos is a fragmented strategy and the enterprise is on to it • Modern Managed Services are far more than outsourced labor • Security Managed Services is growing by 3x over the next 5 Years - $18B to $66B The takeaway