Why does Solutel recommend implementing the SASE model in cloud security?

Why does Solutel recommend implementing the SASE model in cloud security?

Why does Solutel recommend implementing the SASE model in cloud security?

We all know that the pandemic has forced millions of people to work from home. Thanks to broadband Internet access at home, corporate VPNs and collaboration tools, we have been able to keep many of our businesses going. Users have been able to work effectively from home. This situation has not been easy for many IT departments. IT has had to deploy and support users to enable remote working and the level of difficulty has depended on the network and service architecture model that organizations had defined at the time. This is where the SASE concept in cloud security benefits enterprises.

SASE Concept

First, we define “Secure Access Service Edge”(SASE). It is a concept described by Gartner in a 2019 report that promises to be the pillars of cybersecurity . It is basically, a combination of security services that are delivered through the cloud.

  width=

SASE consists of taking the security perimeter built around our company to the cloud. What do we achieve with this? Bringing security to everything and everyone. To give security to all users, to give security to all applications and to manage them from anywhere.

This approach enables enterprises to enforce secure access policies no matter where their users, applications or devices are located.

The SASE architecture is a cloud-native platform that provides the enterprise with security processing that was previously done on-premises. With this architecture each location runs an SD-WAN appliance that carries traffic to the SASE cloud. This traffic is then sent to a local point of presence (POP), where it is analyzed and processed until it is so secure that it can be forwarded to its final destination. The SASE architecture thus blocks potential malware attacks and lateral attacks, making life more difficult for cybercriminals looking to insert malicious code into corporate networks.

The benefits of this model are many, chief among them is end-to-end security. From the server to the end user, the entire infrastructure is protected against threats that are becoming increasingly plural and diversified. This also facilitates the identification and remediation of eventual infrastructure-specific breaches, something that cannot be done in a service without this degree of flexibility.

CISCO SASE Products

  data-lazy-srcset=

Umbrella’ s secure Internet gateway (SIG) where all security services are integrated into a single cloud-native software stack. These services include:

1) Cisco SD-WAN for routing and other network functions using Umbrella. As noted above the POPs in this case are the nodes at the edge of the network where SASE services are processed. Cisco has scaled the POPs configured for Umbrella to more effectively manage traffic to the GIS and firewalls.

2) Domain Name System (DNS) Security: Umbrella’s DNS security element provides enterprises with all the necessary visibility into cloud applications and employee usage.

3) A full proxy secure web gateway (SWG): Scans and neutralizes malware on all files uploaded and downloaded to and from the cloud.

4) A firewall running in the cloud: Allows visibility of traffic passing over both the corporate network and the Internet through all ports and protocols at Layer 3 and Layer 4.

5) DUO and Zero Trust access: Zero Trust is a security approach that considers all traffic and all traffic sources as suspicious by default. Cisco Umbrella is integrated with Duo Security’s Zero Trust technology.

How does CISCO’s SASE security model help companies?

  • Reducing costs and complexity by using a single platform reduces IT costs and resources and minimizes the number of security products.
  • Providing centralized orchestration and real-time application optimization. Increasing the efficiency of security and network personnel.
  • Helping to ensure seamless access for users.
  • Enabling more secure mobile and remote access.
  • Restricting access based on user identity, device and application.
  • Improving security by applying a consistent policy.

Other advantages offered by the SASE model:

  • Flexibility: You can offer security services such as threat prevention, web filtering, DNS security, credential theft prevention, data loss prevention, next-generation firewall policies and more.
  • Increased performance: easily connect to any location where resources are located.
  • Zero Trust: full session protection, regardless of whether a user is inside or outside the corporate network.
  • Threat prevention: integrated full content inspection.
  • Data protection: preventing unauthorized access and abuse of confidential data.

In short, SASE helps simplify network cybersecurity management by providing highly customizable policy-based control. It can be tailored to user identity, session context and application needs for performance and security, and is delivered from the cloud.

Finally comment that moving to a SASE model will be a gradual process as IT reconsiders how to connect a remote workforce to the distributed information resources they need. There is also likely to be a growing demand for “as a service” procurement models that offer more flexibility. This means a tactical shift and rethinking how to deploy IT in a different way that allows a user wherever they are to be properly secured.

 

Related news:

https://www.cisco.com/c/en/us/products/security/sase.html?dtid=osscdc000283

https://www.solutel.com/que-soluciones-de-seguridad-recomienda-solutel-a-las-pymes/

Cisco SecureX unifica la visibilidad de todos tus productos de seguridad

 

Share this post


Specialists in technological services

Telecommunications, networks and IT services

Contact a professional


Checkbox* field (GDPR-English)
In compliance with current legislation on data protection, we inform you that SOLUCIONES Y SERVICIOS TELEMÁTICOS SL is responsible for your personal data and will use them to carry out internal recruitment processes, both current and future. Applying for this job offer implies your authorization for the processing of your data by us. Your curricular data will be kept for a maximum period of one year in our organization, or as long as the candidate does not express his right of cancellation. You can exercise your data protection rights or request further information at info@solutel.com. (General Data Protection Regulation EU 2016/679)