Protecting the outer perimeter with cloud services

1 November 2019 Information Security

Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services to protect the outer perimeter security in branch offices.

Troye technical director Kurt Goodall says Citrix offers various choices, from the long-established multi-site to the advanced multi-layered approach, both of which can protect users and data at the branches, data centre, and clouds from multi-vector cyber threats.

"Citrix SD-WAN Integrated Firewall complements your firewall investment and strengthens overall security infrastructure. Citrix provides an integrated perimeter firewall that masks users and infrastructure from cyber surveillance," he explains.

This integrated firewall has global policy control, and supports zone-based policies so that you can implement granular micro-segmentation of traffic and enforce uniform policy consistently. Citrix SD-WAN can also intelligently track the fast-changing open ports from SaaS and IaaS apps as trusted traffic and directly breakout the traffic to the Internet, enhancing application performance.

It marks all other traffic, such as Web browsing, as untrusted and forwards it to the full security stack, typically located at the HQ or a private data centre. Citrix SD-WAN also takes extra precautions by encrypting all branch-to-branch egress traffic, even when it is transported over a private MPLS line.

Goodall says Citrix SD-WAN automates connectivity to cloud security. "With most enterprises embarking on some form of cloud transformation, Citrix recommends extending perimeter security to the cloud, where apps and workloads reside."

Citrix has partnered with industry leaders like Palo Alto Networks, Zscaler, and Symantec to deliver joint solutions that enable the SD-WAN to be a transparent gateway for Secure Web Gateway (SWG) service. Cloud-based SWG is a popular option for branch offices due to its simple and yet effective multi-layer protection.

Citrix SD-WAN management platform is the key component in this joint solution, providing on-boarding automation and a direct subscription link to Palo Alto Global Protect (aka Prisma) and Zscaler Secure Internet Gateway services. Through API automation, Citrix SD-WAN also secures the connectivity (via IPsec) from the branch to the Palo Alto, Zscaler and Symantec clouds.

The benefits of automation become more significant as more branch sites are involved, directly translating into time savings and reduction in configuration errors. Last but not least, Citrix provides this automated on-boarding capability free of charge.

In addition, cloud-based security also enables a new service-consumption model. It provides an option to shift to opex spending, which can be easily aligned with your business growth. There is no need to deploy security appliances at every branch. It also removes the need to build an in-house resource to manage the security infrastructure.

Troye is a leading 51% black women-owned Level 1 BEE information technology solutions specialist and professional managed IT services provider. Find out more at www.troye.co.za.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Kaspersky’s predictions for 2025 APT landscape
Information Security
The 2025 advanced persistent threat (APT) includes the rise of hacktivist alliances, increased use of AI-powered tools by state-affiliated actors – often with embedded backdoor – more supply chain attacks on open-source projects.

Read more...
SecurityHQ certified B-BBEE Level 1: Delivering global services from a local entity
SecurityHQ Information Security
SecurityHQ, a global managed security services provider (MSSP) with an office in South Africa, has announced it can now offer local companies a complete managed cybersecurity service from a Level-1 B-BBEE accredited and 51% black-owned service provider.

Read more...
2024, the year of Fraud-as-a-Service
Information Security
A report from AU10TIX outlines how ‘the industry’s dark engine’ offers user-friendly fraud kits that enable amateurs to execute complex attacks against thousands of accounts in minutes.

Read more...
The future of endpoint security
Information Security
Endpoint security is a critical pillar of cybersecurity, especially for South African businesses, which are becoming prime targets for cybercriminals. Endpoint security involves safeguarding devices connected to a network from a range of cyberthreats.

Read more...
Not enough businesses take cybercrime seriously
Information Security
Interpol recently revealed that cybercrime, specifically ransomware incidents, cost the South African economy up to 1% of the country’s GDP, while the Council for Scientific and Industrial Research estimated the loss at R2,2 billion a year.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...