Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity NewsRetail/Restaurants/Convenience

Building the future-proof retail store with SASE

By Michael Wood
retail store online
March 22, 2022

Digital transformation and changing user demands are driving the retail industry into one of the largest overhauls it has ever seen.

An average consumer today expects seamless services across multiple platforms. They walk into a store and expect a secure in-store Wi-Fi connection to social media or mobile payment gateways, quick checkouts and interaction with rich media. Users have set high standards for instant gratification and a rapid, yet personalized, shopping experience.

Modernizing retail environments comes at a security cost

For the retailer, it means the need for integration between online and offline services has never been more important. Retail security teams now need to ensure that their business-critical applications perform reliably, 24/7, all across different sets of channels, devices and platforms. Cloud-based applications for businesses and users, big data analytics, Internet of Things (IoT) devices (RFID, sensors and CCTV cameras), mobility and social media have all added new dimensions to the way retailers approach the shopping experience.

The network can make or break retail transformation. Users demand more digital and media-rich services, as well as increased cybersecurity and data privacy. However, legacy retail wide area networks (WAN) and branch offices are often ill-equipped to effectively provide and manage these new user requirements.

Retail companies are also under immense pressure to deliver unparalleled user experience through multiple channels — from physical stores to websites, mobile applications and social media. However, they need to do all this while keeping costs and operating complexities low, all while increasing their global footprints and reducing go-to-market times.

Network connectivity risks

Traditional connectivity is proving to be too expensive and rigid for today’s dynamic retail demands. The increased use of cloud-based applications, rich media, Voice over Internet Protocol (VoIP) and cloud-based productivity and collaboration tools is rapidly increasing bandwidth demands, and solely relying on multiprotocol label switching (MPLS) can become expensive. The public internet, on the other hand, provides flexibility and easy access to the cloud, is easily available at remote locations, and is cost effective. But the public internet is plagued with inherent challenges, such as latency and packet loss (especially over long distances and overseas connectivity), not to mention issues around security, network stability and performance.

Most retailers today have multiple sites, applications and platforms for businesses and users, each of which is a potential point of vulnerability for malicious attacks. Increased use of public internet or broadband to connect to the cloud or interconnect devices exposes the retail network to malicious activity and threat actors. Point-of-sale (PoS), IoT and mobile devices connecting over in-store Wi-Fi are also potential targets. Segmentation is critical to provide secure separation between guest and corporate network services. Tightly integrating security with networking is a necessity to ensure that retail cybersecurity teams can control, mitigate, protect and analyze network risks, while better enforcing policies across the corporate network.

Dealing with a retail data breach

Security has emerged as one of the biggest points of concern in retail. In 2021 alone, the list of significant retail security breaches included Bonobos and Guess (clothing retailers), Hobby Lobby, Carter’s (baby clothes), Wegmans (supermarket chain), Volkswagen and more. The average cost of a retail data breach in 2021 was $3.27 million, up from an average of $2.01 million in 2020, according to the 2021 Cost of a Data Breach Report. That represents a 62.7% increase, but it’s important to remember that the costs are much more than money stolen from the company or its users. Retail data breach costs also include compensating users with credit monitoring and identity monitoring services, litigation if a class-action suit occurs, and of course fixing the breach and preventing future attacks. Clearly, the reputation cost and lost consumer confidence of a breach affecting customer privacy can eclipse the lost revenue from business disruption.

Business-critical applications, such as PoS and inventory management, need to run without interruption throughout a business day. Even more challenging, the entire infrastructure needs to be built and provisioned to handle seasonal peak workloads. When retail locations increasingly rely on real-time applications, such as VoIP and unified communications, jitter, lag and downtime are issues that can pose a threat to the business. Whether it is applications that enable day-to-day business activities or user-facing mobile and web applications hosted on-premises or in the cloud, it is essential that application delivery is unremitting without compromising on quality and user experience.

Modern networks that power the underlying infrastructure for digital, cloud-first retail organizations need to be intelligent and built to deliver uninterrupted, secure connectivity to cloud applications. Superior application performance, reduced deployment times, and minimized cost and complexity of running the networks are some of the features that retailers should incorporate when building a future-proof network structure.

Retail cybersecurity with SASE and SD-WAN

Whether the retail organization decides to expand to new geographical locations by opening new branch offices or through acquisitions/mergers, cybersecurity leaders’ roles are critical in quickly onboarding new locations. SD-WAN’s centralized administration and console make it easy to integrate new services and locations while adjusting policies remotely for immediate results, without having to worry about the cost, resources and logistics associated with setting up a new cybersecurity infrastructure at a new location.

A new approach to integrating security and networking in one solution called secure access service edge (SASE) can allow retail cybersecurity teams to proactively set up application transport policies and network routes to cope with traffic spikes instead of having to upgrade circuits and bandwidth. SD-WAN, a capability of SASE, leverages broadband to help retailers address user demand.

Retail is arguably one of the world’s most cybersecurity-dependent sectors, and the opportunities to integrate technology to improve service quality, realize affordability and enhance the user experience are wide open. The impact of network downtime or service disruption can result in significant financial and business losses. With so much at stake, the retail industry has no tolerance for network failure.

SASE and SD-WAN enable retail cybersecurity leaders to create a more robust, reliable and trusted network infrastructure to operate efficiently and safely. By creating the perfect balance between security, manageability, network operational efficiency and performance, cybersecurity leaders can help their organizations maintain business resilience. SASE enables faster service delivery, improved application performance and easier branch and compliance management.

KEYWORDS: business continuity planning cyber security initiatives data breach network monitoring retail cyber security secure access service edge (SASE)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike wood pic

Michael Wood is CMO at Versa Networks. Wood is an entrepreneurial, creative, results-oriented and hands-on CMO, VP Product, Board Member, Advisor, and Investor with repeated success scaling incubation businesses and startups.

Wood has extensive expertise scaling products, businesses and processes to take a business from limited revenue to hundreds of millions of dollars in revenue. In addition, Wood has deep expertise in networking as a service, virtualization, cloud, mobile, video and security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • power lines

    Evolving cybersecurity to protect today’s energy network architecture

    See More
  • New Study Reveals How Consumers React to ‘The Store of the Future’

    See More
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing