Lessons from Smart Switching: Rethinking Security and Performance

Clint author image

Dec 03, 2025

Clint Huffaker

Clint author image

Written by

Clint Huffaker

Clint Huffaker started his career on the customer side, managing enterprise networking and security before moving into presales and architecture. Those early lessons gave him a deep appreciation for what customers do every day — balance innovation, risk, and business pressure. Today, as Director of Product Marketing for Security at Akamai, Clint leads initiatives around Akamai Guardicore Segmentation and Zero Trust. 

Share

In the first part of this three-part series, we are going to rethink the relationship between security and performance. 

For years, enterprise leaders have felt locked into a trade-off: stronger network security equals slower systems. More firewalls, more controls, and more complexity often come at the cost of agility. But in today’s AI-driven world, where workloads, APIs, and cloud environments move at real-time speed, this compromise is no longer acceptable.

The digital shift: Why old models fail

Modern data centers are dominated by east-west traffic. In recent years, sources have stated that at least 76% of communication flows between applications, microservices, and virtual machines. 

Yet, many still rely on traditional network designs that “trombone” network traffic through centralized firewalls or overloaded host agents. This legacy security model not only adds latency but also exposes vulnerabilities, expands the attack surface, and slows down innovation.

For high-throughput use cases like artificial intelligence/machine learning (AI/ML) clusters, on-premises high-performance computing (HPC), or sensitive data analytics, even small delays can cripple performance. Worse, gaps in access control and poor policy management create visibility gaps that allow lateral movement, malware, and other cyberattacks to thrive.

Smart switching and embedded security

The alternative is microsegmentation that is built directly into the network infrastructure. With solutions like Akamai Guardicore Segmentation and Aruba CX switches, every port becomes an enforcement point. 

This type of microsegmentation delivers granular control and segmentation policies at line rate, reducing reliance on chokepoint firewalls and ensuring secure zones for individual workloads, endpoints, and subnets.

This is not just network segmentation. It’s microsegmentation that works at scale. Zero Trust architecture principles like least-privilege access, continuous authentication, and adaptive security controls are built directly into the data path. 

Whether in cloud security, Internet of Things (IoT), Internet of Medical Things (IoMT), cyber-physical systems (CPS), or hybrid on-premises deployments, this approach provides a consistent security posture across north-south and east-west traffic flows.

Automation and orchestration for resilience

By combining automation, orchestration, and software-defined networking (SDN), organizations can streamline incident response, reduce misconfigurations, and enforce security policies dynamically. This strengthens cybersecurity resilience, simplifies audits, and improves functions and overall security strategy.

What leaders should be asking

Enterprise leaders should be asking their teams the following questions:

  • Are our current firewalls and network-based controls slowing down critical workloads?
  • Do our segmentation policies truly prevent lateral movement, or are we still vulnerable to hidden attack surfaces?

Are we embedding Zero Trust security into our network-level infrastructure instead of bolting it on after the fact?

The future Is Zero Trust switching

The integration of microsegmentation solutions, VLANs, access control lists, and load balancing with embedded security controls signals a fundamental shift. Security becomes distributed, real time, and aligned to the Zero Trust network model.

This integration is not just faster. It’s smarter. Granular enforcement, network access visibility, and resilient segmentation policies are no longer optional. They’re the foundation for protecting individual workloads, sensitive data, and modern cloud environments against advanced cyberattacks.

Let’s talk

If you’re building an AI-ready, Zero Trust-aligned data center or what some call a next-gen data center — or if you simply want to balance protection with performance — now is the time to explore. Contact an Akamai expert so we can talk. 

Smarter, automation-driven microsegmentation and embedded network security can transform your security posture and accelerate innovation without compromise.

Clint author image

Dec 03, 2025

Clint Huffaker

Clint author image

Written by

Clint Huffaker

Clint Huffaker started his career on the customer side, managing enterprise networking and security before moving into presales and architecture. Those early lessons gave him a deep appreciation for what customers do every day — balance innovation, risk, and business pressure. Today, as Director of Product Marketing for Security at Akamai, Clint leads initiatives around Akamai Guardicore Segmentation and Zero Trust. 

Tags

Share

Related Blog Posts

The Industrialization of Exploitation: Why Defensive AI Must Outpace Offensive AI
April 24, 2026
Today, vulnerabilities can be discovered, connected, and operationalized at a speed that traditional security processes were never designed to match. Learn more.
Advancing Federal Cybersecurity With Zero Trust Principles
October 02, 2024
Increasingly sophisticated cyberthreats need advanced security measures. Here’s how federal agencies are improving cybersecurity with Zero Trust architectures.
VLAN Network Segmentation – What are The Hidden Costs?
July 29, 2018