Issue link: https://insights.oneneck.com/i/1469039
Table of Contents iii Table of Contents INTRODUCTION ............................................................................................... 1 About This Book ................................................................................... 1 Foolish Assumptions ............................................................................ 2 Icons Used in This Book ....................................................................... 3 Beyond the Book .................................................................................. 3 CHAPTER 1: Networking and Security: Trends and Challenges ......................................................................................... 5 The Way We Work Has Changed ........................................................ 5 Cloud adoption ................................................................................ 6 Remote offices................................................................................. 7 Roaming users ................................................................................. 7 More network traffic ....................................................................... 8 Understanding Networking and Security Challenges ...................... 8 Rising costs of traditional networking architecture .................... 8 Inefficiencies in the centralized network model ......................... 9 Performance issues with "run-the-business" SaaS apps .......... 10 Too many siloed security tools and integration challenges .... 11 Security talent shortage and increasing personnel costs ........ 11 New cyberthreats taking advantage of security gaps .............. 12 CHAPTER 2: The Evolution of Networking and Security Solutions ........................................................................................... 13 Looking at Traditional WAN Technologies ...................................... 14 Exploring SD-WAN Solutions ............................................................. 15 Tackling Internet Security Threats .................................................... 17 Getting Sassy with SASE..................................................................... 18 CHAPTER 3: SASE: Combining Security and Networking Functionality ................................................................................. 19 Recognizing Security Challenges ...................................................... 19 Key Characteristics and Benefits of SASE ........................................ 20 Starting Your SASE Journey ............................................................... 23 Networking first step .................................................................... 23 Security first step .......................................................................... 24 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.