IT Vortex - Managed IT Services

SD-WAN for Teleworkers: Scalability and Application Performance

As organizations implement remote work at scale, a lot of organizations that sized their firewall based on how many branches they have, and not on how many users might need to log in remotely, are facing severe issues related to scalability. Fortunately, FortiGate customers have been able to leverage its inherent scalability due to its use of custom security processors to provide more VPN connections – both connections per second and concurrent connections – than any comparable solution.

Connecting Remote Workers to the Network is Only Half the Challenge

Connectivity alone, however, isn’t enough. Even for those organizations that have managed to scale out SSL or IPSec VPN connections from remote workers to the core network, getting business-critical applications to run the way they need to be is still a challenge.

Application traffic that used to run over the high-performance internal LAN is now having to utilize the scarce bandwidth resources of WAN connectivity. For example, the use of video conferencing is so high right now that remote user experience is often severely degraded. This means that all of those connections between remote workers and the core network through a free VPN connection also need to be balanced and managed. And critical applications – whether on the local network or in the cloud – need to be prioritized, which is precisely the sort of challenge that SD-WAN was designed to address.

The problem starts with the limitations of many home networks. Most of those networks need to support a variety of devices and technologies, often because there is more than one adult who needs to work at home. At the same time, there may be children participating in distance learning, interacting with their peers through social media or gaming systems, or want to stream entertainment. 

Under most circumstances, a home network can support having a user participate in a video conference. But when multiple people need to use the same video application at the same time – especially if one or more of them needs to, for example, also have screen sharing on – performance can degrade rapidly. Working with an ISP to upgrade available bandwidth is a possible workaround. But even then, application prioritization remains critical.

The Value of SD-WAN for Super Users

This challenge is especially difficult for remote super users in an organization. They may be systems administrators remotely managing segments of the network, help desk personnel who need to troubleshoot the devices of remote workers or executives who need real-time access to large volumes of data. Their ability to do their jobs – responsibilities that other workers rely on – can be especially impacted by poor application performance due to limited bandwidth.

In these circumstances, a small desktop FortiGate appliance can be a powerful solution for managing limited bandwidth while optimizing and prioritizing application use. A desktop FortiGate solution includes SD-WAN and built-in LTE by default, so when a video conferencing app starts to experience packet loss and jitter because another device on the home network is consuming bandwidth, it can detect that the connection is degrading and automatically switch to the built-in LTE connection to ensure application integrity. The same functionality is available for thousands of SaaS applications, from Office 365, to Salesforce, to cloud-based storage.

These powerful desktop devices can also provide reliable, high-performance WiFi connectivity for wireless devices, enabling them to be isolated from the open home network. And they also support and secure voice traffic, enabling super users to have full access to all of the phone services they rely on for their jobs through a softphone application – all supported by an extra path of LTE connectivity to ensure application continuity. And their centralized management function allows administrators to fine-tune security, connectivity, and application performance so changes can be made on-the-fly based on a variety of parameters.

Remote Work is Part of the New Normal – SD-WAN Can Help

Once we emerge from this crisis, things may not ever return to the way they were. Some users may insist on the option of working from home, at least on occasion. Many organizations will appreciate the flexibility of a workforce that can respond to business demands, whether on-premise or at home. And the teams tasked with BCDR will need to consider that providing remote workers with sufficient remote access technology needs to be part of their business continuity and disaster recovery plans. And for many of those workers, VPN access alone will not be enough. There is a known business impact in not having the right level of performance or application availability, especially for specific users.

The critical advantage of extending SD-WAN functionality to individual teleworkers, especially super users, is not only that they can enjoy on-demand remote access, but dynamically scalable performance regardless of their local network availability. And when others in the organization rely on these individuals to do their jobs quickly and efficiently, SD-WAN functionality can make all the difference.

Written by Nirav Shah Powered by Fortitnet, Delivered by IT Vortex.

Share this post

Share on facebook
Share on twitter
Share on linkedin
Share on reddit
Share on tumblr
Share on whatsapp
Share on email

questions about our services?

Request a free consultation. Fill out the form and we will call you to answer all your questions

Tech Tips, Cyber Threat Mitigation, Cutting Edge Technology, Cost Savings and More!

 

IT Vortex, LLC is committed to protecting and respecting your privacy, and we’ll only use your personal information to administer your account and to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. You will consent to us contacting you for this purpose, by submitting the form.

Fortinet logo

Fortinet is offered in our Cloud Hosting Platform? We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

microsoft logo

Name of the partner

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Ut enim ad minim veniam, quis nostrud exercitation ullamco

questions about our services?

Request a free consultation. Fill out the form and we will call you to answer all your questions

ACTI Logo

Technology Reseller and Distributor, Certified Implementation Expertise with all ACTi products and services. IT Vortex has worked with ACTi for over a decade implementing security camera solutions for a multitude of industries with AI, Facial Recognition, License Plate Recognition, Loitering Detection, Cloud storage, and more.

Amazon_Web_Services_Logo

IT Vortex partners with AWS via VMware for the VMware on AWS offering that allows for cloud services fulfillment via AWS utilizing the same VMware products many companies already enjoy the benefits from.

Barracuda Logo

Barracuda Technology is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Cisco logo

Cisco Technology is offered in our Cloud Hosting Platform via DUO for MFA. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Condusiv Technologies logo

Condusiv Technology is offered in our Cloud Hosting Platform? We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Dell logo

Dell servers are a key component offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Dropbox logo

We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

DTEN logo

We use DTEN extensively in our offices. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

ingram micro cloud logo

Our distribution preferred partner for our technology offerings.

Apply for this position

Fill out the form below and our hiring team will reach out to you as soon as possible

microsoft logo

Various Microsoft technologies are offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation. 

mitel logo

Our telephone platform of choice. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

NEAT Logo

We use NEAT extensively in our offices. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

observe IT Logo

ObserveIT/Fortinet is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Proofpoint essentials Logo

Fortinet is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Solarwinds Logo

Solarwinds is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Trend Micro Logo
veeam green logo

Veeam is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

vmware logo

Our Datacenter is built on a VMWare architecture. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation. 

wasabi logo

Wasabi is offered in our Cloud Hosting Platform. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

zoom-logo

We use Zoom extensively to meet internally and externally. We are Certified Reseller, we have Certified Implementation Experts on staff, we provide architecture advisory services for a robust implementation.

Security as a Service (SECaaS) by IT Vortex

Pricing Calculator

Choose a service, answer a few simple questions, and receive an individual quote for our services

User count by type

Fill out the form and we will call you to answer all your questions