https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

From the Industry


Getty Images

Sponsor Content

how to securely enable digital transformation

How to Securely Enable Digital Transformation

  • Written by Comcast Guest Blogger
  • July 11, 2022
The security implications of the trends fueling digital transformation are profound.

Digital transformation goes well beyond reducing physical assets to bits. Digital transformation leverages software to re-invent the entire LBGUPS (Learn, Buy, Get, Use, Pay & Support) business value chain.

I suspect almost all reading this post are involved in digital transformations at work and see it in action throughout daily life. For example, over the past two days, I’ve:

  • Designed a customized pair of sneakers online and had them shipped to my house
  • Ordered lunch from a quick service restaurant and had it delivered in under an hour
  • Reviewed a proof-of-concept product design with colleagues and business partners simultaneously located on three separate continents—whom I have never met in person—using video conferencing Microsoft Teams and several SaaS design platforms
  • Been frustrated talking to a call center to unwind a purchase I made online

We all see the blending of the physical and digital worlds accelerating, and the rate of change in digital spheres of commerce is outpacing what is happening in the “real world.”

This digital transformation requires businesses to bring together data, applications and users in a secure way—across digital and hybrid environments that are distributed, complex and expanding.

What’s Fueling Accelerated Digital Transformation?

1. Cloud and edge computing

Computing itself has undergone a digital transformation, and it is now dramatically more efficient to consume processing as a service. The shift to the public cloud from private data centers has been swift and sweeping, and cloud-based applications are the new standard. In fact, 85% of enterprises will embrace a cloud-first principle by 2025 and 95% of new digital workloads will be deployed on cloud-native platforms.

Likewise, edge computing continues to mature, bolstered by ever-more-powerful, available, and diverse wireless networks. Bringing computing and analytics closer to data sources allows for faster processing and opens new possibilities for IoT applications. With a projected eight-fold increase in applications at the edge, edge computing is fundamentally transforming the ways businesses handle, process, and deliver data.

2. Abundant bandwidth

Gone are the days when enterprises were hampered when it comes to speed. Legacy-constrained telco connectivity should no longer constrain business solutions. With widely available broadband, dedicated Ethernet options, plus access to private wireless networks, IT leaders have access to more modes of bandwidth than ever before. The task turns to orchestrating this diverse connectivity model for optimized cost and performance.

3. A hybrid approach to the modern workplace

Traditional networking and security structures were oriented around the once universally accepted practice of employees working inside an office building. Data and applications sat inside data centers. Employees accessed the internet within the confines of the on-premises network. It’s not as though remote work wasn’t a factor at all, but the norm was on-premises employees and data within a tightly guarded perimeter.

Fast forward to today, and the unexpected success of work-from-anywhere has spurred on new levels of digital innovation, with long-distance collaboration happening easily and seamlessly. With network access required well beyond a company location to a user (which increasingly could be a bot or software application, rather than a person), wherever it may be and on whatever device the call is from, the number of endpoints has grown exponentially.

Enter the Need for Integrated Networking and Security

The past few years have been a digital whirlwind, and as digital business expands, it becomes more and more clear just how inextricable security is from the equation. CIOs earned a bigger seat at the table during the pandemic, which put them front and center in boardroom-level conversations around cybersecurity.

The security implications of the three trends fueling digital transformation are profound: We need to protect data and applications that may be located anywhere, to which there are plentiful and multiple bandwidth paths, and from end users that are increasingly not even human.

CIOs are challenged with securing an ever-more cloud-reliant, distributed, data-driven and bandwidth-consuming enterprise with largely the same resources at their disposal. Addressing the security needs of this new reality comes in part through a unified networking and security approach that not only covers networking from edge to cloud and back again, but also better protects an ever-growing attack surface.

Secure access service edge (SASE), a term first coined by Gartner, is a framework that integrates networking and advanced security in a single, unified, cloud-delivered service.

Currently one of the fastest-growing network and security categories, SASE is SD-WAN-as-a-service and security-as-a-service. Let’s look at each:

Software-Defined Wide Area Networking

Offering more flexibility at low cost, software-defined networking, or SD-WAN, abstracts network control from the connectivity layer and enables real-time monitoring, reporting and analytics across network nodes.

SD-WAN architectures support modern, distributed, hybrid workforces, offering key benefits like network resiliency, application visibility and optimization, automated bandwidth management, and performance and availability of cloud-based workloads. Capabilities like application-aware routing help to reduce the threat surface by segmenting mission-critical systems from less-critical ones. Secure tunnel traffic encryption, meanwhile, helps securely connect sites across geographies. And, finally, single-pane-of-glass monitoring allows IT teams to monitor all traffic and ports from anywhere, identifying and mitigating risks and problems as they arise.

Next-Gen Security Architecture

An integrated security infrastructure that can meet the demands of a cloud-first, hybrid world needs to not only identify potential attacks, but also constantly monitor, prevent and mediate them. An effective integrated security architecture should include key functionality elements like:

  • Managed UTM: Managed unified threat management (UTM) rolls several security functions—like intrusion detection, Layer 7 firewall, application control and content monitoring—into a single managed solution, delivering one management and reporting point and eliminating the need for multiple systems. With on-premises and cloud-based solutions available, managed UTM provides enhanced monitoring and greater visibility for resource-strapped IT teams.
  • Firewall as a service: Many legacy firewalls are ineffective against modern threats on a distributed network. Managed firewall solutions allow for customized rules based on specific needs, helping protect against external threats to a LAN network.
  • Cloud access security broker: A cloud access security broker (CASB) sits between cloud users and cloud service providers to enforce enterprise security policies. CASBs leverage tools such as single sign-on, authentication and credential mapping.
  • Secure web gateway: Secure web gateways filter unwanted access, software and malware as employees access the internet.
  • Zero-trust network access: Zero-trust network access (ZTNA) enables safe and secure access to enterprise applications for remote users. Zero trust operates on the assumption that trust is never implicit, offering access only to specific applications or services, as opposed to an entire network.

In addition to the above security elements, two others exist outside the strict SASE framework and are also necessary, including:

  • DDoS mitigation: Distributed denial of service (DDoS) attacks flood traffic to a server, website or network resource, overloading systems, slowing down services and making networks more vulnerable to future malicious attacks. Effective DDoS mitigation detects suspicious and malicious traffic, drops and rate-limits traffic as a first line of defense, diverts traffic to scrubbing centers, and allows clean, legitimate traffic to continue to access the network, minimizing dips in experience or access.
  • Managed detection and response: Through managed detection and response, organizations work with their internal cybersecurity team or third-party partners to quickly detect, analyze, investigate, and actively respond to threats via mitigation and containment, and then remediate any harm.

As digital transformation continues to evolve, taking on seemingly new definitions with each passing year, the imperative to digitally innovate and create a secure networking environment capable of supporting that innovation compounds in lockstep. The need for a new approach to networking and security—and a trusted managed service partner that can deliver flexibility and security—is now more apparent than ever before. To learn more visit https://business.comcast.com/enterprise/products-services/secure-network-solutions.

 

Bob Victor is SVP, customer solutions, Comcast Business.

 

This guest blog is part of a Channel Futures sponsorship.

Tags: Cloud Service Providers MSPs VARs/SIs Best Practices Cloud From the Industry Intelligence Security Comcast Sponsor Content

Most Recent


  • Break-Up Cookie
    CompTIA Research: Partner-Vendor Relationships Can Make or Break
    Relationships seem to be strong and growing, amid a changing landscape and increasing expectations.
  • future
    Partners ‘Not Wholly Optimistic’ About Avaya’s Future
    One analyst said the business still has value.
  • stack
    Cisco Quarterly Results Tease Light at End of Supply Chain Tunnel
    Cisco recorded a record high for product orders and backlog in fiscal year Q4.
  • Security Sales
    Google Cloud Taps Nutanix CRO to Lead Global Cybersecurity Sales
    Google Cloud is close to completing its acquisition of Mandiant.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • defining digital sovereignty in the cloud
    Digital Sovereignty in the Cloud
  • How MSPs Can Benefit from a Unified Security Platform Approach
    How MSPs Can Benefit from a Unified Security Platform Approach
  • attacker evasion techniques you should know about
    4 Sneaky Attacker Evasion Techniques You Should Know About
  • the role of mentors and sponsors in advancing your tech career
    The Role of Mentors and Sponsors in Advancing Your Tech Career

Upcoming Events

View all

MSP Summit

September 13, 2022 - September 16, 2022

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Galleries

View all

New Products, Services: AWS, Windstream, Microsoft, TD Synnex, More

August 17, 2022

New Okta Channel Leader: Partners Crucial to Go-to-Market, Expansion

August 16, 2022

Lumen Channel Leaders Talk Program Evolution, C-Suite Sponsorship, TSD Consolidation

August 15, 2022

Industry Perspectives

View all

How to Take Shared Responsibility for Securing Cloud

August 11, 2022

Seize the Application Modernization Opportunity

August 2, 2022

A Growth Mindset: Your Organization’s Strategic Differentiator

August 1, 2022

Webinars

View all

Outsmarting RaaS: Implementation Strategies To Help Your Clients Before, During, and After a Ransomware Attack

August 23, 2022

Why it is Important to Upgrade Aging Servers and How to use Live Optics to Upgrade Efficiently

August 25, 2022

Executives at Home are Not Alright: An Intro to Digital Executive Protection

September 8, 2022

White Papers

View all

Work Goes Remote – (and Other Top ITOps Trends)

May 25, 2022

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

Channel Futures TV

View all

ThreatLocker Preaches Zero Trust, Addresses Industry Competition

Microsoft Targeting Partners to Sell Teams, Windows 365 to SMBs, More

August 15, 2022

ScienceLogic Debuts New Partner Portal

August 9, 2022

Vonage a ‘Single Communications Stack Provider’ for Partners, Customers

June 27, 2022

Twitter

ChannelFutures

Good partnerships can make or break a relationship. New @CompTIAConnect research dives into vendor/partner fits.… twitter.com/i/web/status/1…

August 17, 2022
ChannelFutures

.@googlecloud hires former @nutanix CRO to lead global #cybersecurity sales. dlvr.it/SWpL9s https://t.co/XqbhNGgjI7

August 17, 2022
ChannelFutures

Our new services roundup features @ConcentricSF, @WIN_Partners, @CatoNetworks, @Nextiva, @dandh and other vendors a… twitter.com/i/web/status/1…

August 17, 2022
ChannelFutures

MSP Summit, Channel Partners Leadership Summit, and Women's Leadership Summit will cover four key areas of content… twitter.com/i/web/status/1…

August 17, 2022
ChannelFutures

Navigating the #cloudmarketplace world isn’t so easy. @IngramCloud has a new program to help VARs, #MSPs solidify t… twitter.com/i/web/status/1…

August 17, 2022
ChannelFutures

.@Veracode rolls out enhanced #partnerprogram. #cybersecurity dlvr.it/SWlCV5 https://t.co/oKywsXCfKb

August 16, 2022
ChannelFutures

.@GoTo has launched an IT helpdesk functionality within its GoTo Connect UCaaS product without passing on the cost… twitter.com/i/web/status/1…

August 16, 2022
ChannelFutures

Q&A with @okta's new channel chief @baynotebBill. #cybersecurity dlvr.it/SWl9Gn https://t.co/rnUWw7pY82

August 16, 2022

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X