Professional Documents
Culture Documents
Remote teams.
Hybrid working.
Cloud-based Gartner predicts that by 2025, at least 60%
of enterprises will have explicit strategies and
systems. timelines for Secure Access Service Edge
(SASE) adoption encompassing user, branch,
and edge access, up from 10% in 20201.
The shift toward a more distributed workforce is not new but has recently
accelerated. While the principles of SASE were in place well before 2020,
recent global events brought SASE to the forefront as remote access to
applications and ‘work from anywhere’ became a top organisational priority.
S A S E : W H AT ’ S A L L T H E H Y P E ? 4
Now most people are working anywhere – at home, on the go, at the branch
or campus offices – on any device. With this shift, the datacenter is no longer
the hub – the user is. And to give them secure access to work resources and
applications, users must now be treated as a ‘branch of one’.
Why?
one that evolves with requirements of your business - wherever you are in your
digital transformation.
your needs. Which is why
it’s best to think about There are three core changes which are driving the
1
a destination. The shift in workloads and applications from data
centres to multi-cloud environments
2
Highly distributed hybrid workforces, rather than
centrally-based teams
3
Increasingly siloed vendor technologies, which often
come with complex integrations.
S A S E : W H AT ’ S A L L T H E H Y P E ? 7
USE CASE #1
M E ET PETE R
WITH TH E SA S E F R A M E WO R K , PETE R I S A B LE TO :
Securely access the critical monitoring systems held in the public cloud
Establish a secure connection from the remote plant to the public cloud via a cloud-based security
capability
Be assured that the sensitive data is protected whilst in transit and the location of the source of the
data is also obfuscated through the cloud-based proxy functions
Utilising the SASE framework, any inbound threats to the remote wind turbines are mitigated through
packet analysis and security enforcement within the cloud-based security capability.
S A S E : W H AT ’ S A L L T H E H Y P E ? 11
USE CASE #2
M E ET D E E PA K
Deepak works for a large enterprise of 5000+ employees and requires access
to the company’s SAP Hana instance and other critical applications (CRM/
Inventory Management/etc) whilst on the road travelling to various customers.
• Deepak can only access certain Company applications based on his role
WITH TH E SA S E F R A M E WO R K , D E E PA K I S A B LE TO :
Keep all bi-directional communication encrypted ensuring the confidentiality and integrity of the
sensitive data.
From a company perspective, executives can rest assured that their critical information/data can not be
compromised through enforcing corporate security policies within the cloud, for example, SSL Inspection,
Data Loss Prevention (DLP), Malware protection, IPS/IDS and CASB.
Another critical component of the SASE framework is secure WAN access, be it over an uncontrolled
Internet ISP link or a corporate MPLS WAN. It is vital all communication is encrypted; this is achieved through
the Secure SD-WAN component of the SASE framework. Not only does Secure SD-WAN maintain data
confidentiality and integrity, it also ensures the end-user experience is optimised by consistently monitoring
the application performance and adjusting the communications path based on real-time feedback.
S A S E : W H AT ’ S A L L T H E H Y P E ? 14
USE CASE #3
Security, everywhere
SASE means reconsidering the traditional approach to security. Rather than security
being an add-on function, it becomes embedded at every point of the process, and
built into systems.
While traditional security solutions served a purpose, they were all about protecting
the perimeter. It’s no longer relevant in a world where we’re working with hybrid
workforces, cloud-based applications, and a far reaching network.
And security is especially important for small business - 60% of cyber security
victims go out of business within 6 months of an attack2. The risk is too great
to be leaving network security to chance with dispersed workforces and hybrid
work models.
2. Maddie Shepherd, 30 Surprising Small Business Cyber Security Statistics, Fundera, 2021
S A S E : W H AT ’ S A L L T H E H Y P E ? 15
M E ET J E N N I F E R
Jennifer is a brand new employee who is about to start her first day of
work for a SMB organisation and requires access to a web-enabled app,
which is hosted in the public cloud, from her unmanaged device.
• Record and retain detailed audit trails to meet the company’s PCI
compliance commitments.
S A S E : W H AT ’ S A L L T H E H Y P E ? 16
WITH TH E SA S E F R A M E WO R K , J E N N I F E R ’ S CO M PA N Y I S A B LE TO :
Onboard new employees like Jennifer more rapidly, proving them with immediate access to business
critical applications whilst maintaining their corporate security policies.
An integral component of the SASE framework is Zero Touch Network Access (ZTNA); this capability
facilitates granular access to applications and services, taking into consideration the identity of the
end-user, the type of end-device they are using and where they are located. Based on this information,
specific security policies can be enforced; for example, in Jennifer’s case, she is using her own personal
device - in this case, a security policy would be applied to ensure that no files or company data can be
downloaded to that device.
This granularity provides companies the flexibility and agility they require to compete in today’s business
world, whilst ensuring they maintain their security posture across all facets of their business.
S A S E : W H AT ’ S A L L T H E H Y P E ? 17
“Cisco Umbrella
secured the whole
company network An umbrella for
in 10 minutes.
Impressive.” the cloud
Marc Tournier, Information Security and As cloud-based computing is widely adopted, 54% of IT
Compliance Manager (CISO) at Avril leaders are prioritising improvements on visibility and security
for home workers and cloud infrastructure3.
KEYNOTE SPEAKER
Simon Piff, Vice President of Security
Practice at IDC
WATCH NOW
TESTIMON IAL