{"id":2691,"date":"2022-04-21T23:01:58","date_gmt":"2022-04-21T23:01:58","guid":{"rendered":"http:\/\/cubecyber.com\/?p=2691"},"modified":"2022-11-24T11:46:06","modified_gmt":"2022-11-24T11:46:06","slug":"sase-secure-access-service-edge-a-simple-overview","status":"publish","type":"post","link":"https:\/\/cubecyber.com\/sase-secure-access-service-edge-a-simple-overview\/","title":{"rendered":"SASE &#8211; Secure Access Service Edge: A Simple Overview"},"content":{"rendered":"<p>Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home.<\/p>\n<p>With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), corporate data networks are struggling with the bottleneck of traffic.<\/p>\n<p>VPN\u2019s may now not be the best solution for your business. So, let\u2019s talk about the latest next-generation security solution.<\/p>\n<p>Pronounced \u2018sassy,\u2019 SASE is short for Secure Access Service Edge, a cloud-hosted framework that protects data, end users and applications by using both security and network services. The term was first coined by <a href=\"https:\/\/blogs.gartner.com\/andrew-lerner\/2021\/03\/26\/checking-in-on-sase\/?_ga=2.73273364.647079010.1649744811-947380930.1649744811\" target=\"_blank\" rel=\"noopener\">Gartner<\/a> in August 2019, who have calculated that \u201cby 2025, at least 60% of enterprises will have explicit strategies and timelines for SASE adoption, encompassing user, branch and edge access, up from 10% in 2020\u201d.<\/p>\n<h2>What is SASE?<\/h2>\n<p>SASE is a security framework that uses existing technologies to deliver wide area network and security controls as a cloud computing service directly to the source of the connection rather than a data centre or business premise. Security is based on digital identity, real-time context, and company security and compliance policies.<\/p>\n<p>SASE helps to solve the bottlenecking of traffic into the network, by effectively combining security as a service (SECaaS) and network as a service (NaaS) into a single cloud-based service.<\/p>\n<p>This merging of services allows the end-user to work securely from any location or device, without compromising the same level of security you would have in the office.<\/p>\n<p>Implementing it is not the case of buying a single product and setting it up but requires multiple steps to enable services on existing cloud-hosted platforms. For most businesses, the level of expertise required in setting up a SASE approach will mean collaborating with a trusted vendor who understands your business needs.<\/p>\n<p><img decoding=\"async\" class=\"wp-image-2697 size-full aligncenter lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"http:\/\/cubecyber.com\/wp-content\/uploads\/2022\/04\/SASE-network-security-diagram.png\" alt=\"SASE network- security diagram\" width=\"1920\" height=\"1080\"><noscript><img decoding=\"async\" class=\"wp-image-2697 size-full aligncenter lazyload\" src=\"http:\/\/cubecyber.com\/wp-content\/uploads\/2022\/04\/SASE-network-security-diagram.png\" alt=\"SASE network- security diagram\" width=\"1920\" height=\"1080\"><\/noscript><\/p>\n<h2>How does SASE work?<\/h2>\n<p>Current systems may look something like this; traffic comes in via MPLS, internal traffic, or the internet and enters the router, this is then processed through a VPN, and then once verified through a firewall, access is gained to the network.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-2695 size-full lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"http:\/\/cubecyber.com\/wp-content\/uploads\/2022\/04\/old-network-security-model.png\" alt=\"old network security model\" width=\"1920\" height=\"1080\"><noscript><img decoding=\"async\" class=\"aligncenter wp-image-2695 size-full lazyload\" src=\"http:\/\/cubecyber.com\/wp-content\/uploads\/2022\/04\/old-network-security-model.png\" alt=\"old network security model\" width=\"1920\" height=\"1080\"><\/noscript><\/p>\n<p>Traffic ends up passing through the internet, security rules are applied, before being sent back out to the internet. This traffic is essentially passing through twice, meaning each security measure is essentially paying for double the amount of traffic, making this model inefficient and expensive.<\/p>\n<p>With SASE, services are managed at the edge of the cloud, so secure communications are delivered to the specific resources the user wants to access, via the fastest path. This can help to provide the same level of security you would see in the corporate workplace, to any remote user, and from any location, device, or application, surely a necessity at this point in time.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-2696 size-full lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"http:\/\/cubecyber.com\/wp-content\/uploads\/2022\/04\/SASE-model-diagram.png\" alt=\"SASE model diagram\" width=\"1920\" height=\"1080\"><noscript><img decoding=\"async\" class=\"aligncenter wp-image-2696 size-full lazyload\" src=\"http:\/\/cubecyber.com\/wp-content\/uploads\/2022\/04\/SASE-model-diagram.png\" alt=\"SASE model diagram\" width=\"1920\" height=\"1080\"><\/noscript><\/p>\n<h2>The core components of the Framework<\/h2>\n<p><strong>A SASE architecture can comprise of the following components:<\/strong><\/p>\n<p>\u2022 <strong>Software-defined wide area network (SD-WAN).<\/strong> SD-WAN can help simplify communications by finding the best route to the internet or cloud-based apps, optimising user experience.<br \/>\n\u2022 <strong>Cloud access security broker (CASB).<\/strong> CASB\u2019s can secure cloud-based services by controlling data access and through data loss prevention (DLP). This prevents data leakage and malicious activity.<br \/>\n\u2022 <strong>Secure web gateways (SWG).<\/strong> SWG\u2019s implement company security policies and filter any unauthorised access or suspicious behaviour. Any unsecure traffic is prevented from entering the network.<br \/>\n\u2022<strong> Firewall-as-a-Service (FWaaS).<\/strong> FWaaS encompasses URL filtering, intrusion prevention systems (IPS), and threat protection to prevent cyber-attacks on cloud-hosted platforms.<\/p>\n<p>There are also further recommend levels in the model including Sandbox, WAF, NAC, NGAN\/ EDR and browsing Isolation. For an optional level you could also include a VPN or WLAN.<\/p>\n<h2>How can SASE benefit my company?<\/h2>\n<p>With more people than ever working from home, businesses of all sizes are needing to implement big security changes, fast. With cybercrime on the increase, there is no better time to convert to a SASE framework and secure every single user, device, and application entering your network. The time for updated cloud-based security is now.<\/p>\n<p><strong>Benefits of using SASE:<\/strong><\/p>\n<p>\u2022 Costs are lowered due to fewer hardware installs and a simplified system.<br \/>\n\u2022 Latency is reduced by finding the quickest path to the network.<br \/>\n\u2022 Zero-trust ensures secure data is only accessed by those authorised.<br \/>\n\u2022 Better performance and efficiency as users can access the network from anywhere.<br \/>\n\u2022 Keeps your data secure, within the network and prevents web attacks and malicious activity.<\/p>\n<h2>Implementing SASE<\/h2>\n<p><strong>Steps your organisation can take to implement a SASE approach:<\/strong><\/p>\n<p>\u2022 Move branch offices to a cloud-based perimeter.<br \/>\n\u2022 Set up zero-trust network access (ZTNA) for all users.<br \/>\n\u2022 Simplify your setup (VPN\u2019s, CASB, SWG) to combine services into a single, more effective system.<br \/>\n\u2022 Use an SD-WAN based network, as opposed to MPLS.<br \/>\n\u2022 Ensure you have a high-performance edge network to reduce latency issues.<\/p>\n<p>The SASE infrastructure can be overwhelming. If you think your business could benefit from a SASE framework, or you simply just want to find out more, then please do not hesitate to contact one of our experts at <a href=\"http:\/\/cubecyber.com\/contact\/\" target=\"_blank\" rel=\"noopener\">Cube Cyber<\/a>. We are always happy to help.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home. With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2701,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[46,24,26,21],"tags":[],"class_list":["post-2691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-crime-australia","category-large-corporation","category-remote-working","category-smes"],"_links":{"self":[{"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/posts\/2691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/comments?post=2691"}],"version-history":[{"count":2,"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/posts\/2691\/revisions"}],"predecessor-version":[{"id":3885,"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/posts\/2691\/revisions\/3885"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/media\/2701"}],"wp:attachment":[{"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/media?parent=2691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/categories?post=2691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cubecyber.com\/wp-json\/wp\/v2\/tags?post=2691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}