Akamai to acquire LayerX to enforce AI usage control on any browser. Get details

Lessons from Smart Switching: Rethinking Security and Performance

Clint author image

Dec 03, 2025

Clint Huffaker

Clint author image

Written by

Clint Huffaker

Clint Huffaker started his career on the customer side, managing enterprise networking and security before moving into presales and architecture. Those early lessons gave him a deep appreciation for what customers do every day — balance innovation, risk, and business pressure. Today, as Director of Product Marketing for Security at Akamai, Clint leads initiatives around Akamai Guardicore Segmentation and Zero Trust. 

Share

In the first part of this three-part series, we are going to rethink the relationship between security and performance. 

For years, enterprise leaders have felt locked into a trade-off: stronger network security equals slower systems. More firewalls, more controls, and more complexity often come at the cost of agility. But in today’s AI-driven world, where workloads, APIs, and cloud environments move at real-time speed, this compromise is no longer acceptable.

The digital shift: Why old models fail

Modern data centers are dominated by east-west traffic. In recent years, sources have stated that at least 76% of communication flows between applications, microservices, and virtual machines. 

Yet, many still rely on traditional network designs that “trombone” network traffic through centralized firewalls or overloaded host agents. This legacy security model not only adds latency but also exposes vulnerabilities, expands the attack surface, and slows down innovation.

For high-throughput use cases like artificial intelligence/machine learning (AI/ML) clusters, on-premises high-performance computing (HPC), or sensitive data analytics, even small delays can cripple performance. Worse, gaps in access control and poor policy management create visibility gaps that allow lateral movement, malware, and other cyberattacks to thrive.

Smart switching and embedded security

The alternative is microsegmentation that is built directly into the network infrastructure. With solutions like Akamai Guardicore Segmentation and Aruba CX switches, every port becomes an enforcement point. 

This type of microsegmentation delivers granular control and segmentation policies at line rate, reducing reliance on chokepoint firewalls and ensuring secure zones for individual workloads, endpoints, and subnets.

This is not just network segmentation. It’s microsegmentation that works at scale. Zero Trust architecture principles like least-privilege access, continuous authentication, and adaptive security controls are built directly into the data path. 

Whether in cloud security, Internet of Things (IoT), Internet of Medical Things (IoMT), cyber-physical systems (CPS), or hybrid on-premises deployments, this approach provides a consistent security posture across north-south and east-west traffic flows.

Automation and orchestration for resilience

By combining automation, orchestration, and software-defined networking (SDN), organizations can streamline incident response, reduce misconfigurations, and enforce security policies dynamically. This strengthens cybersecurity resilience, simplifies audits, and improves functions and overall security strategy.

What leaders should be asking

Enterprise leaders should be asking their teams the following questions:

  • Are our current firewalls and network-based controls slowing down critical workloads?
  • Do our segmentation policies truly prevent lateral movement, or are we still vulnerable to hidden attack surfaces?

Are we embedding Zero Trust security into our network-level infrastructure instead of bolting it on after the fact?

The future Is Zero Trust switching

The integration of microsegmentation solutions, VLANs, access control lists, and load balancing with embedded security controls signals a fundamental shift. Security becomes distributed, real time, and aligned to the Zero Trust network model.

This integration is not just faster. It’s smarter. Granular enforcement, network access visibility, and resilient segmentation policies are no longer optional. They’re the foundation for protecting individual workloads, sensitive data, and modern cloud environments against advanced cyberattacks.

Let’s talk

If you’re building an AI-ready, Zero Trust-aligned data center or what some call a next-gen data center — or if you simply want to balance protection with performance — now is the time to explore. Contact an Akamai expert so we can talk. 

Smarter, automation-driven microsegmentation and embedded network security can transform your security posture and accelerate innovation without compromise.

Clint author image

Dec 03, 2025

Clint Huffaker

Clint author image

Written by

Clint Huffaker

Clint Huffaker started his career on the customer side, managing enterprise networking and security before moving into presales and architecture. Those early lessons gave him a deep appreciation for what customers do every day — balance innovation, risk, and business pressure. Today, as Director of Product Marketing for Security at Akamai, Clint leads initiatives around Akamai Guardicore Segmentation and Zero Trust. 

Tags

Share

Related Blog Posts

Gain Deeper Visibility into Risks to Meet Security Compliance Demands
May 09, 2025
Learn how real-time visibility into assets, infrastructure, and threats can reduce risk, strengthen security, and regulatory compliance.
The Secret to Reducing Compliance Risk in Financial Services: Visibility
November 22, 2024
Enhanced visibility is key to managing compliance risk in financial services. Discover how a unified view can improve resilience, protect data, and build trust.
Secure Identity at the Edge: Akamai Partners with Auth0
May 21, 2026
The Akamai and Auth0 partnership secures identity at the edge by combining edge intelligence and adaptive authentication to stop fraud and enhance user trust.