16 February 2026  ·  articles

Technical deep dive: SD-WAN, ZTNA, and proxy technologies

Technical guide to SD-WAN, ZTNA, and proxy technologies. Learn how these three solutions integrate to create secure, scalable network architectures.

Knowledge Centre
16 February 2026

Author: Ben Rees, Senior Network Product Engineer | Estimated Read Time: 6 minutes

Enterprise networks face three challenges: connecting distributed sites efficiently, securing application access without exposing networks, and protecting users from web threats. SD-WAN, ZTNA (zero trust network access), and proxy technologies solve these problems by working as an integrated system.

What is SD-WAN and why do organisations use it?

SD-WAN (Software-Defined Wide Area Network) connects distributed sites and branch offices using intelligent software rather than expensive MPLS circuits. The technology routes traffic across any available transport including broadband, 4G/5G, and dedicated internet access.

How SD-WAN makes routing decisions

The system classifies traffic by application using deep packet inspection. Each data flow routes based on:

  • Application requirements (latency sensitivity, bandwidth needs)

  • Link quality metrics (jitter, packet loss, availability)

  • Security policies (encryption requirements, approved paths)

  • Real-time performance monitoring

If a link degrades or fails, traffic automatically shifts to alternative paths without disrupting active sessions.

Business benefits of SD-WAN deployment

Organisations choosing SD-WAN report several measurable improvements:

  • Sites go live in days using readily available internet circuits

  • WAN costs decrease 30-50% by replacing or supplementing MPLS

  • Application performance improves through intelligent path selection

  • Configuration happens centrally with changes deployed in minutes

  • Teams gain real-time visibility into performance across all locations

The technology also includes integrated security features such as IPsec encryption, firewall capabilities, and direct cloud access for SaaS applications like Microsoft 365. For a complete overview of how SD-WAN transforms network infrastructure, see our comprehensive SD-WAN guide.


How does ZTNA differ from traditional VPN?

Zero trust network access provides secure application access without exposing your network. Traditional VPNs grant broad network access once authenticated. ZTNA grants access to specific applications only, making the network infrastructure invisible.

The ZTNA authentication and access process

When users attempt to access an application, this sequence occurs:

  1. User authenticates against your identity provider (Azure AD, Okta)

  2. ZTNA controller evaluates user role, device compliance, location, time

  3. System checks all conditions against defined security policies

  4. If approved, a micro-tunnel connects user directly to that specific application

  5. Network remains hidden; users cannot discover other applications without permission

Key differences between ZTNA and VPN

Modern ZTNA platforms integrate with existing identity systems, evaluate device posture continuously, and provide detailed audit logs of all access attempts. To understand how zero trust principles extend beyond ZTNA into complete architectural frameworks, read our zero trust architecture guide.


What do proxy technologies do in network security?

Proxy technologies sit between users and the internet, inspecting traffic to enforce security policies and block threats. Web proxies act as intermediaries for HTTP and HTTPS traffic, evaluating every request against security rules before forwarding approved traffic.

Security functions enabled by proxy inspection

Proxies provide critical security capabilities:

  • Enhanced URL filtering against threat intelligence feeds and malicious sites

  • Content scanning for malware before reaching user devices

  • Data loss prevention by inspecting outbound traffic for sensitive information

  • Acceptable use policy enforcement for inappropriate content

  • Complete activity logging for compliance and forensic investigation

Secure Web Gateway vs traditional proxy

Secure Web Gateways (SWG) operate from distributed cloud locations rather than on-premises appliances. Users connect to the nearest cloud point of presence, which enforces security policies before allowing internet access. This cloud-delivered model ensures consistent protection regardless of user location.

Typical enterprise traffic flow

Consider a branch office user accessing different resources:

  • Internal application access: SD-WAN routes traffic to cloud security stack → ZTNA verifies identity and device compliance → secure connection established to specific application

  • Internet browsing: SD-WAN recognises web traffic → routes through proxy services → content inspected and policies enforced → approved traffic forwarded

  • SaaS applications: SD-WAN provides direct internet breakout → proxy inspects traffic → optimised path to cloud service

All coordination happens automatically in milliseconds.

Integration benefits across the stack

The unified approach delivers several operational advantages:

  • Security policies remain consistent regardless of user location or connection method

  • ZTNA gains context from device posture tags and policy

  • Proxy inspection can trigger additional authentication if suspicious patterns detected

  • Integrated control plane and centralised management planes

  • New sites and users added through centralised management without complexity


What are the deployment considerations for hybrid environments?

Moving from planning to implementation requires decisions around network topology, cloud integration, and policy design.

Network topology options

Three primary architectures suit different requirements:

  • Hub-and-spoke: All traffic routes through central data centres providing strong security controls but potential bottlenecks

  • Full mesh: Direct site-to-site connectivity improves performance but increases management complexity

  • Hybrid design: Security-sensitive traffic flows through centralised inspection while direct connectivity optimises routine application access

Cloud-first infrastructure requirements

Cloud-first environments need specific architectural choices:

  • Direct internet breakout from branches for SaaS applications requires cloud-delivered security services

  • Private connectivity to AWS and Azure for workloads requiring consistent latency or compliance

  • Cloud-delivered security with points of presence near users for optimal performance

  • Integration between SD-WAN edge devices and cloud security inspection services

Policy design in layers

Effective policies separate concerns for clarity and maintainability:

  1. Network policies: Define which sites can reach which resources

  2. Security policies: Specify inspection and controls for different traffic types

  3. ZTNA policies: Determine who can use applications under what conditions

  4. Telemetry and logging: Enforced regulatory and compliance requirements for logging and data handling.

This separation makes policies easier to modify and troubleshoot.

Financial services security and compliance

Banks and financial institutions require stringent security with regulatory compliance. A regional bank replaced MPLS circuits with SD-WAN, reducing WAN costs 40% while maintaining quality of service. ZTNA provided secure access to customer account systems for mobile bankers, eliminating VPN performance issues. Proxy technologies inspect all web traffic with SSL inspection configured to meet monitoring requirements without compromising customer privacy.

Manufacturing operational technology protection

Manufacturers with distributed facilities need secure connectivity for production systems. A European manufacturer deployed SD-WAN connecting production sites, warehouses, and logistics centres. ZTNA allows suppliers and logistics partners to access specific systems without VPN access to the entire network. Proxy services protect industrial control systems from internet threats while allowing necessary updates and remote monitoring.

Professional services client data security

Consulting firms require secure access to client systems from any location. A firm implemented ZTNA providing consultants with access to client project systems based on specific engagement assignments. SD-WAN ensures consistent connectivity between offices and cloud-based practice management tools. Proxy technologies enforce acceptable use policies with detailed logging supporting client confidentiality requirements.

Retail point of sale reliability

Retail chains need reliable connectivity supporting transactions and inventory management. A retailer used SD-WAN to connect hundreds of stores with broadband and 4G connections, eliminating MPLS dependency. ZTNA provides regional managers with secure access to store systems. Proxy technologies protect store networks from malware and enforce content filtering on shared devices. The solution handles peak transaction volumes during busy periods while maintaining security.


How do you migrate from legacy infrastructure?

Successful migration from traditional VPN and MPLS infrastructure requires phased implementation that minimises risk while building team capability.

Recommended migration phases

  1. Pilot programme: Validate technology choices with 2-3 non-critical sites

  2. Operational validation: Test monitoring, troubleshooting, and change management procedures

  3. Gradual rollout: Deploy to additional sites in waves based on complexity and criticality

  4. Parallel operation: Run old and new systems simultaneously during transition

  5. Legacy decommission: Remove old infrastructure once new platform proves stable

Performance expectations to set

Realistic expectations prevent dissatisfaction:

  • TLS inspection adds 5-20 milliseconds of latency depending on implementation

  • ZTNA authentication occurs per session but requires identity system availability

  • SD-WAN path selection responds to conditions but cannot overcome circuit limitations

  • Initial device provisioning takes minutes but policy changes deploy instantly

Team readiness requirements

Operational capability determines long-term success:

  • Training on new platforms and integrated architecture thinking

  • Runbooks documenting common scenarios and troubleshooting steps

  • Monitoring spanning all layers to catch issues before user impact

  • Change management accounting for interdependencies between components


What does unified secure access architecture deliver?

Networking and security converge into integrated platforms. SD-WAN transforms WAN from a constraint into an enabler through intelligent routing. ZTNA replaces perimeter security with application-specific access control. Proxy technologies provide the inspection layer for detecting threats.

This convergence defines the SASE (Secure Access Service Edge) model, where networking and security capabilities combine into a single cloud-delivered service. Platform thinking beats point solutions. Your SD-WAN, ZTNA, and proxy technologies should work as a coordinated system, sharing context and enforcing consistent policies. The control plane provides unified visibility. Deployment happens in days through automation.

For organisations navigating hybrid cloud, supporting distributed workforces, or modernising legacy infrastructure, these technologies provide the foundation. Separate tools converge into integrated SASE platforms that simplify operations while improving security. Network and security teams work from a shared view. Users get seamless access without navigating multiple steps or accepting performance compromises.

The goal is connecting users and applications securely, efficiently, and at scale. SD-WAN, ZTNA, and proxy technologies, integrated within a SASE framework, deliver that outcome.

Explore how a unified SASE as a Service approach can simplify your network, strengthen security, and future-proof your infrastructure.

Share


Learn more about Cloud Gateway

Cloud Gateway is reimagining the enterprise network, challenging outdated models and setting a new standard for how technology should operate. We believe connectivity and security should be agile, visible, and under your control.