Securing the Modern Manufacturing Network: From Basic LAN to Zero Trust SD-LAN 

Erik Witkop
By Erik Witkop
Senior Solution Architect
April 9, 2026
in
Share
Follow

Manufacturing organizations have traditionally prioritized uptime and operational continuity over security. For years, this approach worked. However, as networks expanded, IT and OT environments converged, and threat landscapes evolved, legacy architectures began to expose significant risk. This case study highlights how a global manufacturing organization transformed its network following a ransomware incident by adopting a Secure SD-LAN approach. 

The Challenge: A Network Built for Uptime, Not Security 

A Global Manufacturing expanded steadily over 25 years to more than 12 global manufacturing sites. Its network evolved organically, resulting in a flat Layer 2 architecture built on a mix of “big box” and commodity switching platforms. While this approach supported operational uptime, it lacked the structure and controls required for modern security. 

The network relied heavily on perimeter firewalls, with little to no enforcement inside the LAN. Internal segmentation was limited to traditional VLANs, and there was no consistent method to identify devices or monitor traffic patterns across the environment. 

Several critical challenges emerged: 

  • Inadequate segmentation allowed unrestricted lateral movement within the network 
  • Limited visibility into devices, users, and traffic flows 
  • Inconsistent switch configurations across vendors 
  • Complex Spanning Tree Protocol (STP) environments causing inefficiencies 
  • Difficulty managing IT and OT convergence securely 
  • Failed attempts at implementing 802.1X due to complexity and compatibility issues 

The Breaking Point: A Ransomware Attack 

The organization’s vulnerabilities were exposed during a ransomware attack. While perimeter defenses remained intact, the threat propagated internally due to the absence of segmentation and visibility. 

During incident response, the IT team discovered they lacked visibility into traffic flows and could not accurately identify all connected devices. The inability to detect, isolate, and contain the threat highlighted a fundamental gap in the network architecture. 

This event reinforced a critical realization: perimeter-based security alone is insufficient. Security must be embedded within the network itself. 

The Shift: Moving to Secure SD-LAN 

To address these challenges, XYZ Global adopted Versa Secure SD-LAN, extending software-defined networking principles, and integrated security controls into the LAN. 

The transformation introduced several key capabilities: 

  1. Centralized and Standardized Management: Network configurations were standardized using templates, enabling consistent deployment across all sites. Administrators could configure ports, VLANs, and policies centrally, eliminating manual CLI-based inconsistencies. 
  1. Identity-Based Access Control: Using 802.1X, every device connecting to the network is authenticated and associated with a user or system identity. This provided visibility into who and what is on the network and enabled policy enforcement at the point of access. 
  1. Integrated Security at the LAN: Firewall capabilities were extended directly into the LAN, enabling enforcement of policies close to endpoints. This ensured that threats could be contained before spreading across the network. 
  1. Device Profiling and Visibility: The network gained the ability to identify and profile devices, including IT endpoints and OT systems. This improved visibility allowed administrators to understand device behavior and enforce appropriate policies. 
  1. Encrypted Control and Management: All management and control plane communication was secured, reducing exposure to interception or manipulation. 

Modern Network Architecture   

The organization transitioned to a leaf-spine architecture, eliminating reliance on STP and enabling more efficient use of network paths, faster convergence, and improved performance. The Outcome is a secure, resilient network with the implementation of Secure SD-LAN delivered significant improvements across multiple dimensions. 

  1. Segmentation: The organization moved beyond basic VLAN-based segmentation to implement both macro-segmentation and micro-segmentation. This allowed enforcement of policies not only between network segments but also between devices within the same subnet, significantly reducing the risk of lateral movement. 
  1. Standardization: Template-based configurations ensured consistency across all devices, reducing operational overhead and minimizing configuration errors. Unused ports were disabled, strengthening physical security. 
  1. Performance and Architecture: The adoption of a leaf-spine topology improved network performance, reduced latency, and eliminated the limitations of STP-based designs. The network could now support modern workloads more effectively. 
  1. Visibility: Comprehensive visibility into users, devices, and traffic flows enabled proactive monitoring and faster incident response. Administrators could now detect anomalies and respond before they escalated into major incidents. 
  1. Access Control: With identity-based access enforcement, only authorized users and devices could connect to the network. This ensured compliance with security policies and reduced the risk of unauthorized access. 

Conclusion 

The ransomware attack served as a turning point for a Global Manufacturing. It exposed the limitations of legacy network design and highlighted the need for a modern, security-first approach. 

By adopting Secure SD-LAN, the organization transformed its network from a flat, reactive environment into a segmented, visible, and controlled infrastructure. Security is now enforced at the edge, visibility is comprehensive, and operations are simplified through centralized management. 

Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.