Maximize WAN Optimization Security and Compliance

By Cisco Systems
Published June 2007; Posted November 2007


Abstract:


Although WAN optimization solutions accelerates data backup and maintain regulatory compliance over the WAN, most of these solutions pay little attention to protection of data locally stored in branch offices or data in transit over the WAN. This lack introduces security risks because organizations now need to manage two sets of data streams with unequal protection: new, accelerated data flows with little or no protection, and regular flows that are well protected with encryption, stateful firewall protection, and intrusion prevention systems (IPS).

Security administrators struggle to secure data consistently across multiple branch offices worldwide, whether it is data accessed through the LAN or accelerated data sent across the WAN. Many organizations question why they should compromise regulatory compliance certification and face the risks of steep fines to accommodate WAN optimization and whether they can trust WAN optimization over large-scale deployments.

Should optimized data carry higher risks and potentially accelerate the delivery of malicious data across the network? Should organizations face higher risks of not meeting regulatory compliance because of WAN optimization? Should optimized traffic be given equal protection?

This document helps to answer these questions. It describes the security benefits and capabilities offered by Cisco Wide Area Application Services (WAAS) and discusses several important criteria you should consider before investing in a WAN optimization solution and why these criteria can be important to your business.
 

bullet

Download paper
bullet

Approx. 425 kB

bullet

For help with .pdf file downloads, please check out the help topic at http://www.webtorials.com/pdfhint.htm

bullet

Return to Cisco Gold Sponsor Briefing

bullet

Return to Managing Corporate Networks Webtorials menu

bullet Return to Security Webtorials menu

 

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.