The Silicon Review - Best Business Review Magazine 10 Best Security Companies 2019 | Page 39

so that the MPLS backhaul could be reduced. Moreover, there are a significant number of cases, where the traffic under inspection lacks critically important firewall and endpoint protection capabilities like intrusion prevention, SSL decryption and malware detection and response. Consequently, malware and other attack vendors will find it easy to compromise the security in remote sites thus infiltrating avenues for threats to reach and propagate inside an organisation. Lack of Proper Scrutiny at Endpoint Threats Presently, hackers prefer to conduct lateral attacks that spread from infected endpoints across the network. This has come to become a widely preferred technique by most hackers. As soon as they infiltrate the network, they use their malware in order to find other vulnerable devices and exfiltrate data. However, lateral threats can be contained and stopped from spreading further if systems possess the capability to detect and quarantine compromised devices. Inadequate Network Segmentation It’s a tough job to secure traffic between workstations or other endpoints. Whenever, a threat or malware compromises a workstation, it’s not long before the problem affects other endpoints throughout the organisationas well. Network modernisation implementations need to have the visibility that offers them a look into the traffic and segmentation aspects in order to contain threats as soon as they enter the network. Expanding the Area of Security Surface As many SD-WAN products and services are devoid of better security capabilities, firms need to add multi-factor authentication along with next-generation firewalls and endpoint protection. They also need to take care of their branch offices and mobile workers by adoptingcloud-based firewalls, strong VPN, and authentication protocols. With SD-WAN, firms can avoid backhauling traffic to headquarters and route them to the internet instead of branch offices thus ensuring reduced security risks and encrypted network connections. SR APRIL 2019 39