Intelligent CIO Europe Issue 49 | Page 23

LATEST INTELLIGENCE as users and their endpoints . And even as cloudadoption started to take off , for a long time the enterprise network security posture held on to the centralized model : traffic from remote offices and remote users was backhauled in its entirety to HQ or the main DC ( see Figure 1 ), to then be broken out into the Internet if necessary .
While this provided a convenient centralized model to security decisions , this model was not enough to combat ever more elaborate threats and furthermore started to incur severe performance problems as cloud resource usage ( SaaS , IaaS , PaaS , UCaaS etc .) invariably grew , especially for remote offices and users .
The resulting penalty in latency , jitter , and packet loss especially impacted remote offices and users .
In addition , the model often resulted in the need for ever increasing and costly MPLS bandwidth , particularly for real-time collaboration applications . p
Download whitepapers free from www . intelligentcio . com / eu / whitepapers /
www . intelligentcio . com INTELLIGENTCIO EUROPE 23