According to the latest CESIN barometer, only 30% of companies are committed to a Zero Trust approach and 13% understand the SASE concept. However, the days when the on-premise data center was the heart of the corporate IT world are over. As organizations continue to move to the cloud, use SaaS applications, and implement endpoint protection strategies to support highly distributed work models, Zero Trust is becoming indispensable.
Zero Trust’s principle of “don’t trust, always verify” coincides with another popular technology trend: the Secure Access Service Edge, or SASE. This model combines various networking and security technologies to move controls to the “edge” of the network. Then security is closer to individual users and their devices, wherever they are in the world.
What is SASE?
Originally introduced by Gartner, SASE combines software-defined wide area network (SD-WAN) elements with various network security features, such as firewalls, secure web gateways (SWG), Cloud Access Security Brokers (CASB) and Zero Trust Access Controls. All of these capabilities are delivered as managed cloud services.
By combining these different technologies, SASE moves connectivity and security out of the on-premise data center. Instead of just putting a firewall around the perimeter of a network, it imposes various controls around applications, servers and other resources -what constitutes the micro-segmentation stage.
In parallel, SASE enables network and cloud architects to build a secure bridge between access points and the service side.
Thus, while traditional networking approaches have created inherent security gaps in this model, SASE is committed to consistent coverage of global workforces, in a distributed context, protecting access more closely. to users, rather than in the middle of the network.
SASE at the Zero Trust center
In modern organizations, remote workers, vendors, and partners need secure, uninterrupted access to data, applications, and services anytime, anywhere. In fact, most professional activities now take place online; and workloads run as infrastructure as code (IaC). Additionally, the use of SaaS applications is evolving and user traffic is flowing from multiple locations and devices to multiple cloud services, beyond the corporate data center.
Therefore, organizations must ensure a secure connection between all of these identities – users, devices and applications -, systems and company data, while maintaining full visibility into these distributed connection points. . However, by managing various technological components, SASE offers a structured way of achieving these goals.
Valid, SASE showcases an integrated architecture that allows companies to streamline the management of technologies and infrastructure. So they have the possibility of make savingsng reduce complexity management as wellimprove flexibility and performance.
SASE therefore facilitates the implementation of the Zero Trust principle and the application of controls based on roles and identities. Also, this infrastructure provides the ability to implement granular policies that govern the movement of data across the network. That’s why a comprehensive, strategic cybersecurity approach brings together the foundations of SASE and Zero Trust, along with other innovative security solutions that put the identity-not the data center-at the heart of the security strategy. of the company. the company.
By Ketty Cassamajor, Pre-Sales Manager Southern Europe, CyberArk
How to secure developer access and code?
Combine zero trust and least privilege to protect identities in the cloud
Securing the company’s cloud infrastructure to protect against cyberattacks
SASE: a technology that naturally fits into the creation of the networks of the future.
The tight integration of SASE functions is essential to meet today’s security and networking needs.
Switching to the SASE model: where to start?
The road to SASE promises to be long …