03 November 2017
Riverbed Technology and cloud security specialist Zscaler have teamed up to help organisations securely transform to the cloud.
The partnership sees the integration of Riverbed’s cloud networking and SD-WAN system SteelConnect with Zscaler’s cloud security platform.
The companies claim this will enable enterprises to accelerate cloud adoption and incorporate broadband-based transport in branch and remote office business locations without compromising network security.
Zscaler has been integrated into SteelConnect’s application-defined policy and orchestration engine. Riverbed says this streamlines the approach for identifying and steering traffic to the Zscaler Security Cloud.
According to the company, the solution dynamically chooses the optimal Zscaler data centre (of which there are more than 100 worldwide) to use for each site in the SteelConnect network.
This is said to provide enterprises with “simplicity and power” for expanding their use of cloud-based services and broadband across their hybrid WAN.
The companies say that the joint solution means businesses can now securely deploy SD-WAN capabilities in the cloud with a “few clicks”, and enable new sites to be brought online in minutes or hours. They reckon this eliminates the need to buy, deploy, and manage security appliances in all branch office locations.
They also claim that the integrated offering delivers fast connectivity to apps and data, regardless of network type or user location, by enabling local Internet breakouts.
Riverbed Technology chairman and CEO Jerry M. Kennelly says: “Enterprises are in the midst of a major transition from legacy, hardware-based approaches to software-defined networking in order to keep pace with changing business needs in today’s cloud-first world.”
Kennelly believes that as today’s hybrid IT landscape becomes more distributed, managing and securing enterprise networks have introduced new hurdles. Zscaler founder and CEO Jay Chaudhry adds: “The rise of cloud and mobile technologies has challenged enterprises to evolve perimeter-centric networking and security approaches that no longer serve them.”