Most SD-WAN solutions address WAN connectivity needs as if they exist in isolation. Deploying separate security solutions in different parts of the network isolates resources and makes it impossible to see, correlate, and respond to systemic threats. Traditional hub-and-spoke WAN connection models enable all traffic to be scanned and secured by centrally deployed security. Traditional WAN connections require end-to-end security that goes beyond simply encrypting data. Communications between a branch office and a cloud-based application require data inspection at both ends of the connection.”]

