Lessons from Smart Switching: Rethinking Security and Performance

Dec 03, 2025

Clint Huffaker

Written by

Clint Huffaker

Clint Huffaker started his career on the customer side, managing enterprise networking and security before moving into presales and architecture. Those early lessons gave him a deep appreciation for what customers do every day — balance innovation, risk, and business pressure. Today, as Director of Product Marketing for Security at Akamai, Clint leads initiatives around Akamai Guardicore Segmentation and Zero Trust. 

Share

In the first part of this three-part series, we are going to rethink the relationship between security and performance. 

For years, enterprise leaders have felt locked into a trade-off: stronger network security equals slower systems. More firewalls, more controls, and more complexity often come at the cost of agility. But in today’s AI-driven world, where workloads, APIs, and cloud environments move at real-time speed, this compromise is no longer acceptable.

The digital shift: Why old models fail

Modern data centers are dominated by east-west traffic. In recent years, sources have stated that at least 76% of communication flows between applications, microservices, and virtual machines. 

Yet, many still rely on traditional network designs that “trombone” network traffic through centralized firewalls or overloaded host agents. This legacy security model not only adds latency but also exposes vulnerabilities, expands the attack surface, and slows down innovation.

For high-throughput use cases like artificial intelligence/machine learning (AI/ML) clusters, on-premises high-performance computing (HPC), or sensitive data analytics, even small delays can cripple performance. Worse, gaps in access control and poor policy management create visibility gaps that allow lateral movement, malware, and other cyberattacks to thrive.

Smart switching and embedded security

The alternative is microsegmentation that is built directly into the network infrastructure. With solutions like Akamai Guardicore Segmentation and Aruba CX switches, every port becomes an enforcement point. 

This type of microsegmentation delivers granular control and segmentation policies at line rate, reducing reliance on chokepoint firewalls and ensuring secure zones for individual workloads, endpoints, and subnets.

This is not just network segmentation. It’s microsegmentation that works at scale. Zero Trust architecture principles like least-privilege access, continuous authentication, and adaptive security controls are built directly into the data path. 

Whether in cloud security, Internet of Things (IoT), Internet of Medical Things (IoMT), cyber-physical systems (CPS), or hybrid on-premises deployments, this approach provides a consistent security posture across north-south and east-west traffic flows.

Automation and orchestration for resilience

By combining automation, orchestration, and software-defined networking (SDN), organizations can streamline incident response, reduce misconfigurations, and enforce security policies dynamically. This strengthens cybersecurity resilience, simplifies audits, and improves functions and overall security strategy.

What leaders should be asking

Enterprise leaders should be asking their teams the following questions:

  • Are our current firewalls and network-based controls slowing down critical workloads?
  • Do our segmentation policies truly prevent lateral movement, or are we still vulnerable to hidden attack surfaces?

Are we embedding Zero Trust security into our network-level infrastructure instead of bolting it on after the fact?

The future Is Zero Trust switching

The integration of microsegmentation solutions, VLANs, access control lists, and load balancing with embedded security controls signals a fundamental shift. Security becomes distributed, real time, and aligned to the Zero Trust network model.

This integration is not just faster. It’s smarter. Granular enforcement, network access visibility, and resilient segmentation policies are no longer optional. They’re the foundation for protecting individual workloads, sensitive data, and modern cloud environments against advanced cyberattacks.

Let’s talk

If you’re building an AI-ready, Zero Trust-aligned data center or what some call a next-gen data center — or if you simply want to balance protection with performance — now is the time to explore. Contact an Akamai expert so we can talk. 

Smarter, automation-driven microsegmentation and embedded network security can transform your security posture and accelerate innovation without compromise.

Dec 03, 2025

Clint Huffaker

Written by

Clint Huffaker

Clint Huffaker started his career on the customer side, managing enterprise networking and security before moving into presales and architecture. Those early lessons gave him a deep appreciation for what customers do every day — balance innovation, risk, and business pressure. Today, as Director of Product Marketing for Security at Akamai, Clint leads initiatives around Akamai Guardicore Segmentation and Zero Trust. 

Tags

Share

Related Blog Posts

Post-Quantum Cryptography Implementation Considerations in TLS
August 06, 2025
Prepare your organization for a quantum-secure future by learning how to verify and validate post-quantum cryptography.
6 Key Insights from Akamai India Leadership Industry Summits
September 26, 2022
What does the future look like for consumer-to-internet and OTT media services in India? Here are six thought-provoking insights from CXOs.
The “PhoneHome” DDoS Attack — Everything You Need to Know
March 17, 2022
A vulnerability in enterprise collaboration suite MiCollab by telecommunications company Mitel has been abused for distributed denial-of-service (DDoS) attacks with record-breaking amplification potential.