SD-WAN security checklist
When evaluating network and security solutions and their providers, consider the strategy, architecture and components you have today—and what you might need going forward.
Use this SD-WAN security checklist to compare security functions by solution set to help make the most informed decision for your business.
|Security Solution||Windstream Enterprise SD-WAN Concierge™||SD-WAN Concierge + Windstream Enterprise Managed Network Security (MNS)||Windstream Enterprise Secure Access Service Edge (SASE)|
|Virtual Private Network (VPN)||X||X|
|Next-Gen Firewall with Unified Threat ManagementTM (UTM)||X||X|
|Security Information and Event Management (SIEM)||X||X|
|Firewall as a Service (FWaaS)||X|
|Secure Web Gateways (SWG)||X|
|Zero-Trust Network Access (ZTNA)||X|
|Cloud Access Security Broker (CASB)||X|
SD-WAN security and the SASE future
Enterprise business today demands effective management of both networking performance and security, regardless of where users connect from—and SD-WAN sets a strong foundation.
More than 4,000 enterprises trust Windstream Enterprise to enhance network resilience and optimize application performance, while accelerating cloud adoption at more than 32,000 of their critical locations. Windstream Enterprise has partnered with the leading SD-WAN architecture providers—Fortinet® and VMware—to offer you a choice in technology platforms. Check out this collection of SD-WAN case studies to see how we’ve helped clients transform their networks.
Windstream Enterprise is also the first and only North American managed service provider to converge cloud-native network and security into a fully integrated SASE solution in partnership with Cato Networks. This comprehensive architecture enables businesses to adapt to constantly shifting users, applications and work environments, while keeping all application and security policies synchronized with these changing endpoints—all from a single pane of glass.
With our experience in providing all the foundational elements of a robust SASE solution, you can count on Windstream Enterprise to continue developing our SASE expertise, capabilities and solution offerings.
Security solution definitions
Basic Firewall: Protects the network from threats at the edge via a geographically diverse and redundant firewall residing in the cloud or on premises.
IPSec deployment: Enables end-to-end encryption for secure data transmission over public networks.
Virtual Private Network: Extends a private network across a public network and enables users to send and receive data across shared or public networks.
Next-Generation Firewall (NGFW) with Unified Threat Management (UTM): Deploys industry-leading security software in the cloud, on-premises or on edge devices as a Virtual Network Function (VNF) for a fully managed, integrated solution and includes a suite of integrated security functions such as content filtering, application control and intrusion prevention.
Security Information and Event Management (SIEM): Analyzes logs from firewalls and customer-owned devices to identify and respond to threats while retaining data.
Firewall as a Service (FWaaS): Eliminates the appliance form factor, making network security capabilities such as URL filtering available everywhere.
Secure Web Gateways (SWG): Protects users against malware, phishing and other web-borne threats at all locations and eliminates the need to maintain policies across multiple point solutions.
Zero Trust Network Access (ZTNA): Embraces a zero-trust policy, where application access dynamically adjusts based on user identity, location, device type and more.
Cloud Access Security Broker (CASB): Applies security policies as users access cloud-based resources to protect against cloud security risks, comply with data privacy regulations and enforce corporate security policies.
Learn more about securing your network with Windstream Enterprise SD-WAN Concierge, Windstream Enterprise Managed Network Security and Windstream Enterprise Secure Access Service Edge.
Want to keep this checklist handy for vendor conversations? Download a PDF version