Application Defined Network
   HOME

TheInfoList



OR:

Application Defined Network (ADN) is a style of enterprise
data network A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are ...
that uses virtual networks and
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
components to provide a dedicated logical network for applications. This allows customized
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
and network policies to be created to meet the requirements of that specific application. ADN technology allows for simple physical architecture with fewer devices, less device configuration and integration. ADN solutions simplify businesses' needs to securely deploy multiple applications across the enterprise footprint and partner networks, regardless of where the application resides. ADN platforms provide policy-based, application-specific delivery to corporate data centers,
cloud In meteorology, a cloud is an aerosol consisting of a visible mass of miniature liquid droplets, frozen crystals, or other particles suspended in the atmosphere of a planetary body or similar space. Water or various other chemicals may ...
services and third-party networks securely and cost-effectively. Some ADN solutions integrate 3G or 4G wireless backup services to enable a second internet connection when connectivity is lost on the primary access connection. The ADN design provides an application-to-application (A2A) based model that evolves enterprise networks beyond the site-to-site (S2S) private model.


ADN fundamentals

ADN solutions address the need to enable multiple different applications, such as guest
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wav ...
( Hotspot) while securing regulated applications such as payment on the same network. Traditionally, in S2S networks, having multiple applications introduces security policy conflicts. Technologies, such as guest Wi-Fi,
mobile payment A mobile payment, also referred to as mobile money, mobile money transfer and mobile wallet, is any of various payment processing services operated under financial regulations and performed from or via a mobile device, as the cardinal class of ...
and cloud services open the traditional private network to outside security threats and create complexity in security policies and network administration. ADNs can be customized with security features that address specific application needs. They can also be enhanced with performance and reliability features such as traffic management for application prioritization and fail-over for back-up connection services. Complexity breeds vulnerability. ADNs reduce complexity and the cost of multiple device investment, management, configuration, integration, problem isolation, and resolution. ADNs are typically enabled on a secure appliance at distributed enterprise locations. These locations integrate with a cloud network to connect applications to corporate data centers, cloud services, payment gateways and partner networks. ADNs eliminate the potential for route conflicts, security cascades across applications, and problem cascades caused by one application misbehaving and affecting other applications on the same network. * Route Conflicts – traditional S2S networks facilitate multiple applications over single connections (ex.
VPN A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
s,
MPLS Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on labels rather than network addresses. Whereas network addresses identify endpoints the labels identif ...
VPNs, and
Ethernet Ethernet () is a family of wired computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN). It was commercially introduced in 1980 and first standardized in 1 ...
) and require complex security rules to partition applications from one another. Simple errors in device configurations can create routing problems that can breach strict security and compliance-based applications such as PCI-DSS and
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1 ...
certifications. The ability to completely segment these applications into their own discrete ADN removes the complexity of managing multiple security partitions across many locations. * Security Cascade – traditional S2S networks are subject to security bleed when a network segment that is open to the Internet gets breached. Advanced Persistent Threats (APTs) are becoming more frequent, effective and damaging. The damage occurs when the threat roots inside the breached segment and stealthily probes entry points into other network segments. Several security breaches have been the result of this security cascade where vulnerability between network segments is exploited. ADNs eliminate the ability for a security breach to cascade between network segments and applications by compartmentalizing applications into secure and isolated networks.
Cascading failure A cascading failure is a failure in a system of interconnected parts in which the failure of one or few parts leads to the failure of other parts, growing progressively as a result of positive feedback. This can occur when a single part fails, in ...
* Problem Cascade – On a traditional S2S network, when a specific problem in an individual application's configuration results in abnormal behaviors, the problem ends up affecting all other applications on the network. Essentially, one application misbehaving results in all applications being affected and the entire network being compromised. Isolating the root of the problem becomes extremely difficult and time-consuming when a network is in chaos, or completely down. On an ADN, problems are isolated to the specific application's network, allowing for simpler fault isolation and resolution. ADNs are logically defined virtual networks that extend from application enabler to application gateways. ADN solutions combine the ability to define specific LAN segments with an actual ADN. This provides the ability to extend the ADN through the LAN to a specific interface on the application enabler ( POS system, server, etc.). An assigned zone will lock down a specific LAN port to a specific use. For example, serial port 1 could be assigned to the payment ADN/LAN segment only, and no other devices can use that specific LAN port, and if an unauthorized device is plugged into this zone, it will not work. This provides both physical and logical security protections against unauthorized use of ports. The ADN then facilitates the connection from the specific LAN port over the public broadband connection independently of any public
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
ing. The ADN is then authenticated inside the cloud and transported to the destination application gateway. This provides an end-to-end application enabler to an application gateway network that is independently defined, both physically and logically. The application gateway can reside within the corporate office or data centers,
cloud service provider Cloud computing is the on-demand availability of computer system resources, especially data storage ( cloud storage) and computing power, without direct active management by the user. Large clouds often have functions distributed over mul ...
s, partner networks or virtually anywhere.


A2A

Application-to-application (A2A) networks remove S2S limitations by defining the network architecture at the application level. A2A networks enable the enterprise network to securely connect to any application, no matter where it resides. A2A networks free the enterprise network from burdensome controls and restricted hub and spoke traffic patterns, by facilitating any-to-any traffic patterns based on the specific needs of the application itself. Companies no longer have to overspend by purchasing application licenses and building the application within their data centers, so do not have to incur all the associated capital, network and IT resource costs. A2A networking helps companies efficiently deploy multiple applications using cloud services that address needs, such as improved
customer value In management, business value is an informal term that includes all forms of value that determine the health and well-being of the firm in the long run. Business value expands concept of value of the firm beyond economic value (also known as economi ...
, operational efficiencies, and
product differentiation In economics and marketing, product differentiation (or simply differentiation) is the process of distinguishing a product or service from others to make it more attractive to a particular target market. This involves differentiating it from co ...
.


Security

ADNs simplify security by establishing discrete independent networks that do not require complex security rules to partition traffic types. ADNs reduce the risk of human error in maintaining complex Access Control Lists (ACLs) across many sites which can create security vulnerabilities. For example, if an ADN with public Internet access is breached by an outside party, the ability of the breach to bleed between ADNs, such as a payment ADN, is eliminated. ADN standard security features include
firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spr ...
,
intrusion detection An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
, logging, wireless scanning,
content filtering An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software dete ...
,
access control lists In computer security, an access-control list (ACL) is a list of File-system permissions, permissions associated with a system resource (object). An ACL specifies which User (computing), users or Process (computing), system processes are granted acc ...
,
multi-factor authentication Multi-factor authentication (MFA; encompassing two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting ...
, Advanced Encryption Standard (AES)
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can de ...
and compartmentalization. Additional custom security features can also be easily deployed such as
HTTPS Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It is used for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is enc ...
filtering, Security and Event Management (SIEM), or any best-of-breed security application hosted on virtual servers within the
cloud In meteorology, a cloud is an aerosol consisting of a visible mass of miniature liquid droplets, frozen crystals, or other particles suspended in the atmosphere of a planetary body or similar space. Water or various other chemicals may ...
.


References

{{reflist Networks