security

SASE Is Greater than the Sum of its Parts | – Spiceworks News and Insights


SASE has become one of the most popular terms amongst the enterprise, but technology vendors are creating confusion in the marketplace by selling solutions that don’t fulfill the true SASE promise, explains Renuka Nadkarni, chief product officer at Aryaka.

When Gartner first coined the term SASE in a 2019 report, the definition was very clear and straightforward:

Secure access service edge (SASE) delivers converged capabilities of network and security as a service, including SD-WAN, SWG, CASB, NGFW and zero trust network access (ZTNA). SASE supports branch offices, remote workers, and on-premises secure access use cases. SASE is primarily delivered as a service and enables zero trust access based on the identity of the device or entity, combined with real-time context and security and compliance policies.

More than three years later, the term has become almost unrecognizable, as myriad tech vendors are misusing it as a buzzword to attract more customers and get them to purchase products and services that sound like SASE but are anything but. Instead of delivering the fully baked cake that SASE promises, these vendors are providing the equivalent of eggs, flour, water, and sugar and telling customers to figure out the rest. This practice is extremely misleading and has the potential to lead to negative perceptions about SASE and its capabilities.

How to Succeed with SASE Deployment

The success of a SASE deployment is dependent on several individual building blocks, including SD-WAN, firewall-as-a-service (FWaaS), cloud access security broker (CASB), data loss prevention (DLP), zero trust network access (ZTNA) and secure web gateway (SWG). SD-WAN sets up an integrated cloud infrastructure to optimize connectivity so organizations can access data from multiple endpoints. FWaaS delivers firewall protection to an organization as part of its cloud infrastructure. CASB enforces organization security policies from the cloud, while DLP keeps data secure and prevents unauthorized users from accessing sensitive information. ZTNA provides continuous identity verification to ensure data is protected within the network infrastructure. SWG uses the cloud to filter internet traffic, protecting the organization from online security threats. 

Readers Also Like:  Orca Security suing Wiz for patent infringement in cloud security ... - CTech

While all of these individual elements are necessary for a complete SASE solution, when deployed on their own in isolation, they don’t adequately address the growing, sophisticated cybersecurity threats that enterprises face today. 

Furthermore, deploying these different elements from various vendors without a managed security service provider (MSSP) to oversee everything can create the same issue. When these building blocks aren’t properly integrated in a unified manner, and they can’t “talk” to each other, an organization is not going to receive the full benefits of the true SASE experience. At best, they’ll be getting the entry-level version of SASE, which may as well be called something completely different.

So, what are a few steps all organizations can take to ensure they are on the right track for a successful, full SASE deployment? Let’s walk through a few of them here.

Operational Efficiency

Above all, the most important step in the SASE equation is to combine all the separate elements into a single unified platform so that each one is working to combine security with a robust cloud infrastructure. Doing this provides users at distributed access points with a consistent and secure user experience while also harnessing the powers of the individual elements to deliver a true SASE solution. 

Though keeping security and network separate from each other was once an acceptable way of operating, this is no longer the case, as this approach creates a set of problems that make it difficult for an organization to scale effectively. Digital transformation is an ongoing, continuous process, so it’s critical that leaders make the commitment to seeing the complete process through, as opposed to deploying a single element individually and leaving it at that.

Readers Also Like:  Live news: The week ahead - Financial Times

See More: The Dilemma: How to Balance Network Security and Performance with Testing

Performance

The second step is ensuring that the deployed solution is an authentic SASE solution. Compared to disaggregated solutions, a true SASE solution will significantly impact the end-user experience and network performance. This is ultimately what matters and why implementing a SASE solution is so valuable. 

As mentioned, there are many tech vendors that continue to misuse the SASE term for personal gain (selling more products and services). Most frequently, we’ve found that these vendors apply the SASE term to their SSE offerings. More often than not, these are security vendors. While SSE serves its own purpose, it’s not an adequate substitute, as it lacks SASE’s critical connectivity component. So, organizations that are exploring potential SASE solutions need to make sure that both network and security are converged before pulling the trigger. It’s particularly important to conduct due diligence when dealing with a security vendor, as the network component is more challenging to get right if the vendor doesn’t have a background in it.

Business Value

Thirdly, organizations should evaluate their business goals to verify that a SASE deployment is the right approach to help them achieve their objectives. Once aligned, they should set measurable KPIs to track their progress. If the service they are receiving is indeed reliable, that should translate into cost savings, business agility, and growth. With managed SASE, businesses can focus on themselves instead of tripping over infrastructure investments. 

A clear set of business goals with an effective method for measurement will ensure businesses are maximizing their investment and aren’t just paying for something because everyone else is. Organizations need to remember that each business is unique, and there are no one-size-fits-all solutions, so if they’re not seeing tangible business value from their investment, it’s time to look elsewhere for a solution that better fits their needs.

Readers Also Like:  Interregional Workshops on Technology Development and ... - International Atomic Energy Agency

Simplicity Is the Key to SASE Success

Converging each SASE element into a single unified platform provides organizations with the security, flexibility, and connectivity they need to defend against the increased risk of vulnerabilities and attacks that comprise today’s chaotic digital landscape. 

The simplicity afforded by a single, all-encompassing solution – or a fully baked cake – means that it is easier to manage and monitor the deployment. This also makes SASE more accessible, so additional organizations can deploy it successfully and effectively. As a result, more organizations will be able to access secure networking across the entire infrastructure, better supporting their increasingly distributed workforces.

What are the roadblocks you’re facing in deploying SASE efficiently? Share with us on FacebookOpens a new window