eBooks/eGuides

SASE for Dummies

Issue link: https://insights.oneneck.com/i/1469039

Contents of this Issue

Navigation

Page 25 of 50

CHAPTER 3 SASE: Combining Security and Networking Functionality 21 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Here are four key characteristics of digitally transformed organi- zations that are laying the groundwork for this new concept: » Identity-centric: Gartner suggests that "digital business transformation inverts network and security service design patterns, shifting the focal point to the identity of the user and/or device — not the data center." Moreover, the "identity of the user/device/service is one of the most significant pieces of context that can be factored into the policy that is applied." » Cloud-native: Gartner describes modern digital enterprises as having "[m]ore sensitive data located outside of the enterprise data center in cloud services than inside" and "[m]ore user traffic destined for public cloud services than to the enterprise data center." » Edge computing: To support the SASE concept, Gartner describes a "worldwide fabric/mesh of network and network security capabilities that can be applied when and where needed to connect entities to the networked capabilities they need access to." » Globally distributed: Gartner describes the need for an "intelligent switchboard" where "identities are connected to networked capabilities via the SASE vendor's worldwide fabric of secure access capabilities." The SASE concept consolidates numerous networking and security capabilities and functions — traditionally delivered in multiple, siloed point solutions — in a single, fully-integrated cloud-native platform. Potential business benefits of the SASE concept include the following: » Reduce cost and complexity » Enable secure remote and mobile access » Provide latency-optimized, policy-based routing » Improve secure seamless access for users » Improve security with consistent policy » Update threat protection and policies without hardware and software upgrades

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - SASE for Dummies