SD-WAN Secure

Broad SD-WAN Options

Reliability and security across the network as well as the cloud are critical to thriving in today’s economy, and Comcast Business offers hyper-flexible SD-WAN that meets the demands of transforming enterprises. Select the network you want, mixing and matching access types and directly connecting to top cloud services and applications. Then, layer on firewalls and three tiers of security services. Best of all, you can manage your network all from one portal with the choice between a fully managed service or a co-managed solution.


Key features:



  • Fortinet® SD-WAN edge devices
  • A global software-defined edge network
  • Service level agreements
  • Built-in firewalls on-premise or in the cloud
  • SASE-based security with managed services
  • Controls to reconfigure services on the fly

A software-defined edge network

  • Global network solution
  • Built using uniform SD standards
  • Network & security services in one platform

One portal with AI-powered analytics

  • AIOps for automated network analysis
  • Real-time and identity-based analytics
  • On-demand control and shadow IT discovery

Flexible service options

  • Use public and private connectivity from Comcast Business or a third party
  • Scalable work from anywhere solutions with security features
  • Co-managed solutions or fully managed services

Multi-cloud connectivity

  • Direct connections to top cloud services and SaaS apps
  • 100% availability SLA for cloud connections
  • Active-active network configurations for the cloud

Competitive SLAs

  • 100% availability SLA for SD-WAN sites and cloud connections
  • 100% in-sequence packet delivery and <1 ms of jitter
  • 5-minute outage notification

Security built in

  • Fortinet edge devices, integrated firewalls, and firewall as a service
  • Analytics, cloud security, and more
  • Three tiers of security services include a SASE-based approach

SASE Architecture Matters… And Ours Stands Out

Comcast Business SASE provides all core SASE features from a single provider, helping us to deliver a true end-to-end solution. It is differentiated by our standardized architecture versus solution sets from some other vendors. Our SD-WAN capabilities share a common infrastructure.



  • Standardized SD-architecture: Our private network is software-defined and built on a ubiquitous SD-architecture across the globe
  • Common infrastructure: Every newly added SD-WAN feature and application interoperates on the same operating system
  • Transparent interoperability: One transparent ecosystem combines our network, direct cloud connections, and Fortinet hardware to deliver great performance

Solution Options

Fully managed or co-managed solutions

Help alleviate your IT team's administrative burden by offloading the 24/7 monitoring and management provided by Comcast Business NOCs and SOCs on three continents. You can also empower your in-house IT to self-manage certain aspects of their Comcast Business-installed solution with the SD-WAN Orchestrator tools integrated into our customer portal.

Over the top

Using an Internet-only approach is known as SD-WAN "over the top" (OTT), and we can create an overlay on top of public or private networks, sending encrypted application traffic via IPsec tunnels for security purposes.

Cloud resources

Secure Network Edge enables high performance Site-to-Cloud and Site-to-SaaS connectivity for businesses with a single location or multiple standalone locations. Customers experience reliable Internet with dual circuits for redundancy as well as application capabilities.

One portal with AI-powered analytics built for security, speed, and precision

Control every aspect of your network from a single interface with our client portal. A customizable dashboard displays your global network, SD-WAN devices, and cloud environments along with important security alerts and analytics.

AIOps

AIOps is embedded into SD-WAN solutions to automate your network analysis, predict bandwidth needs, and troubleshoot issues quickly.

Shadow IT Discovery

With our built-in Shadow IT Discovery and Identity-Based WAN Analytics solutions, you can help reduce the risks to your multi-cloud network environment by isolating potential cybersecurity threats down to the specific user and application on your network.

SD-WAN Orchestrator

SD-WAN Orchestrator provides transparency and self-service control over your WAN edge devices with application-based routing rules, firewall and network policies, and tools to make changes in real-time.

Unified Threat Management (UTM)

This service includes:

  • NextGen Firewall with UTM security active across all remote sites
  • Anti-virus / Anti-malware
  • Intrusion Detection/Prevention System (IDS/IPS)
  • Web filtering
  • Data Loss Prevention (DLP)
  • Application Control (e.g. IM & P2P)

SD-WAN + Threat Monitoring & Response

This service includes all UTM features listed to the left plus:

  • 24/7 global monitoring of UTM security events by certified security experts
  • Real-time incident response on suspicious events detected by the UTP
  • Real-time firewall integration for threat blocking at all SD-WAN sites
  • Web filtering and template-driven granular control for thousands of apps
  • Traffic monitoring including site-to-site connectivity between sites with real-time analytics in the client dashboard
  • Ability to configure consistent security policies across SD-WAN devices

SD-WAN + Managed Security Services

Get all of our security services in this managed detection and response solution:

  • Detection and Response platform:Vulnerability scanning
  • Advanced IDS, anomaly detection, raw packet capture
  • Threat intelligence and threat hunting
  • Network visibility (flow data)
  • Security Analytics: Patented machine learning and behavior analytics
  • Cloud Security: Cloud Workload Protection for IaaS/PaaS and 3rd party integration for other security tools
  • SOC Services: trained analysts working 24/7, providing both monitoring and incident response
Man typing at desk with desktop computer in a bright office room
May 12, 2026
Defend against attacks to help keep your data and network secure
Smiling man in blue shirt working at a laptop in a server room with glowing network racks
May 12, 2026
How to compare technologies and services