What is Secure Access Service Edge (SASE)

Secure Access Service Edge (SASE) – defined by Gartner – is an emerging framework for the convergence of networking and network security services within a global cloud-based platform.

The traditional network perimeter is dissolving

Conventional security measures presumed that applications and users would be inside the network perimeter, which is no longer true. Corporate data is moving to the cloud, employees are increasingly working remote, and digital transformation initiatives require IT organizations to be nimble to capitalize on new business opportunities.

As a result, the traditional network perimeter is dissolving, and new models for access controls, data protection and threat protection are necessary. In light of these changes, organizations are finding that their existing collection of standalone point products such as firewalls, secure web gateway, dlp and casb, are no longer applicable in a cloud-first world.

What does a SASE architecture look like?

Secure Access Service Edge, or SASE, unifies networking and security services in a cloud-delivered architecture to protect users, applications and data everywhere. Given that users and applications are no longer on a corporate network, security measures can’t depend on conventional hardware appliances at the network edge. Instead, SASE promises to deliver the necessary networking and security as cloud-delivered services. Done properly, a SASE model eliminates perimeter-based appliances and legacy solutions. Instead of delivering the traffic to an appliance for security, users connect to the SASE cloud service to safely use applications and data with the consistent enforcement of security policy.

What does a SASE architecture look like?

SASE incorpora las siguientes tecnologías

Una arquitectura SASE es capaz de identificar a los usuarios y los dispositivos, aplicando controles de seguridad basados en políticas y ofreciendo un acceso seguro a las aplicaciones y los datos correctos. SASE permite proporcionar un acceso seguro con independencia de la ubicación de los usuarios, los datos, las aplicaciones o los dispositivos.

  • Microservicios nativos de la nube en una arquitectura de plataforma única
  • Capacidad para inspeccionar tráfico con cifrado SSL/TLS a escala cloud
  • Compatibilidad con proxies en línea para decodificar tráfico web y en la nube (NG SWG)
  • Firewall y protección frente a intrusiones para todos los puertos y protocolos (FWaaS)
  • Integración con API de servicios gestionados en la nube para datos en reposo (CASB)
  • Evaluación de seguridad continua de IaaS para nube pública (CSPM)
  • Protección avanzada de datos para datos en tránsito y en reposo (DLP)
  • Protección avanzada frente a amenazas, entre otros, IA/aprendizaje automático, UEBA, entornos aislados, etc. (ATP)
  • Uso compartido de inteligencia frente a amenazas e integración con EPP/EDR, SIEM y SOAR
  • Software defined perimeter with zero trust network access, replacing legacy VPNs (SDP, ZTNA)
  • Protection for the branch, including support for branch networking initiatives such as SD-WAN
  • Carrier-grade, hyper scale network infrastructure with a global POP footprint

Gartner SASE predictions

El 20 %

de las empresas adoptarán SWG, CASB, ZTNA y FWaaS para sus sucursales de aquí a 2023

Source: Gartner report: The Future of Network Security is
in the Cloud

El 40 %

de las empresas desarrollarán estrategias para adoptar SASE de aquí a 2024

Source: Gartner report: The Future of Network Security is
in the Cloud

SASE Benefits

01

Flexibilidad

Permite un acceso directo a la red o directo a la nube desde cualquier parte, en comparación con el sistema tradicional de hairpinning de vuelta al centro de datos.

02

Ahorro de costes

Elimina inversiones en activos fijos (CapEx) para infraestructura local y ofrece unos gastos de explotación (OpEx) inferiores y predecibles gracias a su modelo de seguridad como servicio.

03

Complejidad reducida

Enables organizations to shift security staff from managing appliances to focusing on delivering policy-based security services; and unified policy enforcement simplifies SecOps

04

Mayor rendimiento

Mejora y acelera el acceso a los recursos de Internet a través de una infraestructura de red global optimizada para baja latencia, alta capacidad y alta disponibilidad.

05

Zero Trust Network Access

Provides secure, contextual access to private apps in public/private clouds

06

Protección contra Amenazas

Stops cloud and web attacks such as cloud phishing, malware, ransomware, and malicious insiders

07

Protección de datos

Protects data everywhere it goes, inside and outside of the organization, including within public clouds as well as between company and person instances of cloud apps

How to get started with SASE

At the core of SASE is an integrated, extensible architecture that redefines security defenses in the cloud as a service. To get started, consider the following questions.

Do you currently have a single inline proxy solution capable of decoding thousands of cloud apps and web traffic using APIs and JSON?

Consider consolidating your secure web gateway (SWG) and cloud access security broker (CASB). This will provide critical visibility and control for data loss protection (DLP) and advanced threat protection (ATP) defenses that are also cloud-hosted in the same platform. Along with retiring your legacy SWG appliances, migrate to zero trust network access (ZTNA) to replace your legacy VPN appliances to modernize your overall secure access posture.

Can your current security stack provide cloud-scale SSL/TLS decryption and inspection?

The majority of cloud traffic is encrypted, and a growing number of attackers are leveraging the cloud to evade traditional network controls. Using cloud-scale SSL/TLS inspection helps you stay on top of the threat landscape.

Does your current MPLS / private network support high performance and availability?

Your users expect high performance with low latency, because if the SASE is slow, users will be unhappy. In order to deliver great user experience, make sure that your SASE solution is engineered for high performance and located in the places that your users are.

How many consoles and policies do you currently have to use to manage your existing security stack?

Many vendors are adapting or virtualizing their software and calling it a cloud-based solution. If it isn’t designed to be a SASE, you may end up with multiple administrative consoles, complex policies that are hard to manage, and time-wasting tools for conducting investigations. Choose a solution that has a single management console, single client, and a single policy to make sure that your SecOps teams can stay on top of security in your organization.

Recursos

Reimagine su perímetro.