Intelligent CIO North America Issue 20 | Page 21

LATEST INTELLIGENCE application- and web-awareness . We shall explore all these existing as well as emerging security elements in the following chapter .
The key in understanding network security lies in also understanding the evolution of enterprise architecture over the last 20 years . Initially , as the internet started to transform enterprises world-wide , a medieval castle approach to security was enough .
The traditional enterprise network simply had to protect centralized enterprise assets that all were onpremise , such as servers , on-premise apps and data as well as users and their endpoints .
And even as cloud-adoption started to take off , for a long time the enterprise network security posture held on to the centralized model : traffic from remote offices and remote users was backhauled in its entirety to HQ or the main DC ( see Figure 1 ), to then be broken out into the Internet if necessary .
While this provided a convenient centralized model to security decisions , this model was not enough to combat ever more elaborate threats and furthermore started to incur severe performance problems as cloud resource usage ( SaaS , IaaS , PaaS , UCaaS etc .) invariably grew , especially for remote offices and users . The resulting penalty in latency , jitter , and packet loss especially impacted remote offices and users .
In addition , the model often resulted in the need for ever increasing and costly MPLS bandwidth , particularly for real-time collaboration applications .
Enterprises started to look at a more effective model to optimize application performance . p
Download whitepapers free from www . intelligentcio . com / north-america / whitepapers
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 21