Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

The hidden environmental costs of VPN gateways

By John Spiegel
sustainability-security-fp1170x658.jpg

Image via Freepik

September 23, 2022

In networking, we often discuss routing, packets, protocols and latency. It’s always been our lifeblood and our passion. Another area we are passionate about is hardware. A new router, firewall, switch, or network appliance will elicit numerous debates and send us into a world of what if? What if I deployed this box to my network? How would it impact it? Would it make the network faster? Would it make my job easier? Now, one topic we don’t discuss is the “green” impact of this new box. 

Our networks are complex and costly; truth be told, they impact the world around us. Let’s take a look at the journey of an employee, Amy, who is part of the hybrid workforce. Her day begins in her home office, which is located at the kitchen table of her house. Every day, Amy must use the corporate VPN to access the applications she requires to complete her job. Her journey looks like this. 

AxisSecurity1.png

Amy must run a virtual gauntlet of IT network and security hardware appliances. Typically, this may include a series of seven systems, each with a redundant twin for high availability.  


So, what is the impact of these 14 boxes on our planet? Let’s break it down. 


Amy’s point of entry is the data center firewall. Typically the firewall is the second most power-consuming device. For our scenario, we will select Palo Alto Networks PA-5430 firewall. The power ratings for this device come in at 630 watts. Since our design is redundant, we will need two of them. Therefore, the total for the two is 1260 watts. 


Next up is the Denial of Service appliance. This time we will go with a product from Cisco Systems. The selection will be a Cisco the Defense Pro 20. Its power requirements are rated at 320 watts. Again, we will need two for high availability, so the number is 640 watts. 


NAC and ADC are next on the path. While there are appliances in this area, we will leverage Cisco ISE. While we could build this out a number of ways, let’s keep it simple and call it two servers running a dedicated application. Power requirements will come in around 850 watts per server. Again, we need two, so 1700 watts is our total for NAC and ADC. 


On to the SSL. For the SSL decryption, we will go back to Cisco. The Cisco Firepower 5555 is our most efficient solution at 134 watts at peak. We need two, so 268 watts is our number.


Now comes the IPS system. Again, we will go with a Cisco Firepower product, the 9300 appliance. Unlike the Firepower 5555, the 9300 is power-hungry at 1000 watts for both. 


And we are almost done. One more firewall to go! Again, we’ll go back to Palo Alto Networks. Add a pair of PA-5430 at 1260 watts.  


Now that we’ve completed Amy’s journey from a network and security appliance point of view, let’s add up our power budget and determine the power costs and, most importantly, the impact on the planet. 


The power budget comes to 6,128 watts at peak. Based on a cost of power at .32 per kWh, at 24 hours a day, creating 146 kW/h per day (aka 53,681.28 kW/h per year), our total per datacenter cost comes to $17,178 each year —  just in electricity costs. This doesn’t include Manufacturing costs either.


But what is the total carbon impact? We used the free Greenhouse Gas Equivalent calculator provided by the EPA and found that 53,681.28 kW/h per year is equivalent to 25.6 tons of Co2 per datacenter! That is equivalent to what 27 acres of U.S. forests sequesters per year. Check out some other interesting equivalencies below.

 AxisSecurity2.png

A report commissioned by Statistica found that 73% of companies have 3 to 5 data centers in use. 40% of companies have six or more.

AxisSecurity3.png


So if we assume 5 data centers for each Fortune 2,000 company (most will likely have more), the electricity costs alone for the VPN gateway would be $85,890 per year (again, only for electricity). The environmental impact would be 128 tons of CO2 emissions. Times that by 2,000 Fortune companies, and that’s 253,475 tons of CO2 emissions. The equivalent to the carbon sequestered by 272,129 acres of U.S. forests. 

That’s a lot of green, for too much green. It’s time to say bye to hardware-based VPN and move to new cloud security technology. A move from VPN to the cloud is beneficial not only from an operational, security, and digital experience perspective but from an environmental impact perspective.

 AxisSecurity4.png


*Images courtesy of Axis Security

KEYWORDS: cloud security cyber security risk management security operations sustainable security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Spiegel is Director of Strategy at Axis Security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • alarm-security-fp1170x658v4.jpg

    The hidden costs of alarm systems (and how to avoid them)

    See More
  • Tax and budget documents

    Recognizing the hidden costs of a security program

    See More
  • White conference table surrounded with plastic chairs

    The hidden costs of outdated security

    See More

Related Products

See More Products
  • Physical Security and Environmental Protection

  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing