Protecting the Digital First Enterprise – Gigaom


Last year, the concept of the office environment and the way in which work, collaboration and communication occur have undergone tremendous changes. Now that users can work on the device and connect through a network beyond the control of the company’s IT, the security risks have greatly increased. Users, data, equipment, and workloads are mostly distributed outside the data center, usually not on the company network, so new security methods are needed.

GigaOm analyst David Linthicum said: “The increase in remote users and software-as-a-service (SaaS) applications, as well as the migration of more and more data to the cloud, has prompted the need for a new approach to cybersecurity.”

The Secure Access Service Edge (SASE) architecture is increasingly seen as a solution to the challenges posed by the new remote working model. The architecture combines multiple functions to reduce complexity and security-related risks, thereby helping organizations deal with the security challenges posed by the so-called “new normal” work.

Figure 1. The core and other functions of the SASE solution

In Linthicum’s new report “Delivering on the Promise of SASE”, he discussed the emergence of SASE, provided suggestions on how to deploy SASE, and studied the lessons that can be learned from using SASE to improve tool and process security. . .

He pointed out that SASE is not a “one size fits all” solution: each deployment is unique and needs to be considered in a way that can address the needs and practices of the relevant organization.

Linthicum said: “The identity of an entity can be associated with people, groups of people (branch offices), devices, applications, services, IoT systems, or edge computing locations.” “The number and types of solutions that can be deployed using SASE are customizable Yes, it can meet your specific needs. If this is not the case, it is useless.”

Linthicum advises IT leaders interested in SASE:

  • Focus on business needs and make sure you understand the problem to be solved and the impact on the business.
  • Don’t fall in love with this technology, it will change quickly.
  • Focus on a larger security strategy, then focus on how SASE is applied, and then focus on how to create useful and flexible entities.
  • Make sure to include future plans.

Companies that are studying SASE solutions should know that deployment is what Linthicum calls a “step-by-step approach.” He recommends starting with strategic management and then choosing a vendor who understands your needs so that it can work with you to develop the correct SASE deployment for your organization. As you grow and develop, the solution needs to meet the needs of key stakeholders and customers.

Related Articles

Back to top button