Intelligent CIO Europe Issue 49 - Page 22




nNetwork Security Update

There is universal consensus around the fact that network security is undergoing dramatic transformation . New security concepts such as SASE ( Secure Access Service Edge ) and ZTA ( Zero Trust Access ) promise to deliver on the architectural changes required to address the security requirements of the digital enterprise .
But the simple truth is that no single vendor in the market – despite their own claims to the contrary – addresses all capabilities required to deliver on those desired security target architectures . Nor will any single vendor be able to provide class-leading solutions in every required functional area in security . led , and best-of-breed approach allows enterprises to optimally tailor their security architecture to their needs .
Network Security History and Trends
The history of network security has largely seen network security vendors introducing new , functionspecific and increasingly complex security solution elements to implement a largely passive security posture : network security moved from first-generation stateless firewalls to stateful firewalls , then to nextgeneration firewalls that added increasing levels of application- and web-awareness .
We shall explore all these existing as well as emerging security elements in the following chapter .
Download whitepaper here
Enterprise security has never been and will never be a technology area where any monolithic , universal solution can cover every enterprise ’ s need . Different enterprises will always have specific security needs that need to be tailored to regulatory , compliance and overall enterprise architecture needs .
In this paper , we ’ ll examine the emerging challenges in network security and how Aryaka ’ s open , partner-
The key in understanding network security lies in also understanding the evolution of enterprise architecture over the last 20 years . Initially , as the internet started to transform enterprises world-wide , a medieval castle approach to security was enough .
Traditional enterprise network simply had to protect centralized enterprise assets that all were on-premise , such as servers , on-premise apps and data as well
22 INTELLIGENTCIO EUROPE www . intelligentcio . com