{"id":19386,"date":"2020-08-20T09:24:11","date_gmt":"2020-08-20T09:24:11","guid":{"rendered":"https:\/\/lavellenetworks.com\/?p=19386"},"modified":"2024-08-09T10:19:07","modified_gmt":"2024-08-09T10:19:07","slug":"sase-adoption-helps-enterprise-security","status":"publish","type":"post","link":"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/","title":{"rendered":"Why Multi-SASE adoption makes sense for an enterprise?"},"content":{"rendered":"<h2><b>The Scenario<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Today\u2019s <\/span><b>distributed enterprises<\/b><span style=\"font-weight: 400;\"> use <\/span><b>various kinds of applications<\/b><span style=\"font-weight: 400;\"> right from basic collaboration tools to complex enterprise applications and everything in between. Users use <\/span><b>multiple SaaS applications, Infrastructure, and platform-as-a-service solutions<\/b><span style=\"font-weight: 400;\"> in some way to perform their day-to-day tasks. Users also access<\/span><b> random resources on the internet<\/b><span style=\"font-weight: 400;\"> &#8211; from social media to news streaming. And Hackers are trying to exploit all possible ways to gain access to the enterprise.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">On the other hand, although SD WANs addressed the challenges of backhauling the enterprise traffic at the data center, and significantly reducing the cost of MPLS; they were never as secure as the traditional MPLS. The simple reason was that the <\/span><b>SD-WAN uses numerous different transport mechanisms, including LTE, MPLS, and broadband Internet connections.<\/b><span style=\"font-weight: 400;\"> as opposed to the traditional secure MPLS tunnels.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">So, now is the time SD-WAN vendors took some serious look at the security functions of their SD-WAN solutions.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The categorization of Secure SD-WAN solution and the resultant dilemma<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Every SD-WAN vendor tried to address security in their own way. In fact, SD-WAN players started adding security features to come up with a \u201csecure\u201d SD-WAN offering. And even the pure-play security vendors created secure SD-WAN solutions by adding networking capabilities to their security products. The result is that almost the entire market offered at least one component of the networking and security mix that they did not have much expertise in.<\/span><b> Broadly, there are four types of SD-WAN solutions in the market depending upon the security and networking features<\/b><span style=\"font-weight: 400;\">. These are SD-WAN appliances with basic firewalling, SD-WAN appliances with advanced firewall, Firewall appliances with SD-WAN, and Secure SD-WAN as a service. The fourth solution, i.e., a secure SD-WAN as a service, offers the characteristics of the much talked about SASE architecture. In the first three types of offerings, SD-WAN appliances with basic firewalling, SD-WAN appliances with advanced firewall, Firewall appliances with SD-WAN, IT teams are left managing separate security and networking domains. Whereas a secure SD-WAN as a service provider offers<\/span><b> a fully integrated security and SD-WAN service<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Challenges with traditional SD-WAN solutions<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><b>Challenges with SD-WAN+Security solutions of today is that they have not been developed ground up as per the SASE framework<\/b><span style=\"font-weight: 400;\">. And as SASE is just a few months old concept, it is not even expected from all the vendors to create solutions based on this architecture. <\/span><b>The reality is that these solutions are either not a great SD-WAN solution or they do not offer great best of breed comprehensive security features.<\/b><span style=\"font-weight: 400;\"> Some SD-WAN solutions are good at Data Loss Prevention (DLP), while others are more capable of protecting against ransomware and other malware. And some solutions offer just some good email security tools. Most, if not all, do not have the best of the breed functions that are seamlessly integrated and offer smooth manageability. For example, some Firewall appliances with SD-WAN features, developed by vendors that were originally offering security solutions, take up to 30 to 40 seconds to converge on an alternate IP connection. This is in contrast to good SD-WAN solutions that are able to switch to a secondary connection in seconds and, ideally, sub-second, which is required to maintain a session state. Similarly, SD-WANs that claim to offer advanced firewall protection too are not sufficient to prevent sophisticated attacks. <\/span><b>An enterprise always needs the best of the breed functions both for security as well as networking in their secure SD-WAN solution because an organization needs to have robust protection against all kinds of threats.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2><b>How SASE architecture helps in using best of breed functions?<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">The inability to keep security at the heart of SD-WAN deployments has been one of the key reasons for security breaches across the globe. <\/span><b>Security is essential because most\u00a0 SD-WAN\u2019s benefits \u2013 cost optimization, improved cloud performance, and agility \u2013 rely majorly on secure direct Internet access<\/b><span style=\"font-weight: 400;\">; and the internet is not as secure as other transport mechanisms. The SASE architecture enables SD-WAN vendors as well as security vendors to offer a comprehensive security solution in their SD-WAN offering. This is possible by architecting a solution with the best of the breed security functions. A robust security offering of an SD-WAN solution must take into account the following:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Nature of traffic or nature of the application<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The end-user profile<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The expected user behavior based on historical behavioral patterns of the user<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The source and the destination &#8211; where is traffic coming from and where is it headed?<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">And for each of the potential security threat touchpoints, there must be at least one or more best of the breed security functions in place. Some of these security functions include, but certainly not limited to, next-generation firewalling, malware protection, advanced threat protection, etc.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>What does an enterprise need?<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><b>A seamlessly integrated solution<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In order to make the best of cloud-native security functions, enterprises are looking increasingly at moving security inspection into the cloud as security-as-a-service.<\/span><b> Instead of multiple security appliances, security-as-a-service providers converge the functionality of multiple security appliances into a cloud-native software stack<\/b><span style=\"font-weight: 400;\">. Sites send traffic to the provider\u2019s nearest point of presence (PoP) for inspection and from there directly onto the Internet. Some of the SDN vendors use AWS, Azure, and Google Cloud Platform whereas some other vendors are heavily investing in their own points of presence around the world without depending on what AWS, Azure, and GCP are doing. Here\u2019s a representation of how Network as a service and network security as a service converge in a SASE architecture.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this new architecture, both Network as a Service and Security As A Service converge and create a seamlessly integrated solution that can be managed through a single console. All the best of the breed network services (such as SD-WAN, Carriers, CDN, WAN Optimization, etc.) and the best of the breed security services (such as CASB, Cloud SWG, ZTNA\/VPN, WAAPaaS, FWaaS, DNS, RBI, etc.) converge to offer the real secure SD-WAN architecture. <\/span><b>The best part is that NaaS and SECaaS platforms always offer the flexibility to choose from a range of network and security functions and keep updating the stack as new services are developed.<\/b><span style=\"font-weight: 400;\"> The SASE architecture allows a simple plug and play kind of a model to select the best of the breed services based on specific requirements of an organization.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><b>Best of the breed security functions<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Secure access is a key element of SASE architecture. Access privileges are enforced by policies based on user identities. Other pieces of information that inform policies include the location the user or group\u2019s traffic is coming from, the time of day, the risk\/trust assessment of the user\u2019s device, and the sensitivity of the application or data being accessed. <\/span><b>The network security functions used in access management are secure web gateways (SWGs), cloud access security brokers (CASBs), firewalls, and zero-trust network access.\u00a0<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Similarly, network security function <\/span><b>Data Loss Prevention (DLP)<\/b><span style=\"font-weight: 400;\"> is used for making sure that end users do not send sensitive or critical information outside the corporate network.<\/span><b> A WAF or Web Application Firewall<\/b><span style=\"font-weight: 400;\"> helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet. A <\/span><b>remote browser<\/b><span style=\"font-weight: 400;\"> isolates the user\u2019s Internet browsing activity from the end user\u2019s device and from the rest of the enterprise\u2019s networks and systems.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Hence one or many security functions work in tandem to enable a security feature.<\/b><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><b>End-to-end security on an Identity-Centric Architecture<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">This is how the entire converged platform looks like that is centered on user Identity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The above image shows how <\/span><b>identities are the center to access<\/b><span style=\"font-weight: 400;\"> decisions. <\/span><b>The context that the users, devices, and applications have determines their level of access to the different clouds<\/b><span style=\"font-weight: 400;\"> to the left.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>A SASE architecture enables end-to-end security for everyone across the organization &#8211; whether the source is a remote worker, a branch location, the headquarters, or even the customer that interacts with the organization\u2019s networks and applications.<\/b><span style=\"font-weight: 400;\"> Threat prevention capabilities inherent to SASE include encryption of all communications, firewalls, URL filtering, anti-malware, and intrusion prevention systems (IPS). These capabilities are available to all connected network edges across the globe. SASE combines an SD-WAN approach and security functionalities into one cloud-based service. A WAN in a SASE service is not the same as in an SD-WAN. A SASE vendor has a globally distributed network fabric that is made up of their own points of presence (PoPs). And as we mentioned above, an alternative to the vendor\u2019s network fabric is to use a public cloud provider\u2019s PoPs.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">To sum up, <\/span><b>every organization needs an SD-WAN solution that can support multiple options to select from an always-updated stack of various networking as well as security functions and create a cloud-native capability to completely secure their WAN.<\/b><\/p>\n<p>&nbsp;<\/p>\n<h2>Get your copy of SASE Whitepaper\u00a0<a href=\"https:\/\/lavellenetworks.com\/sase-the-future-of-sd-wan-network-security\/\">here<\/a>:<\/h2>\n<p><a href=\"https:\/\/lavellenetworks.com\/sase-the-future-of-sd-wan-network-security\/\"><img loading=\"lazy\" class=\"wp-image-19367 aligncenter\" src=\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2021\/11\/ScaleAOn493x403.png\" alt=\"\" width=\"380\" height=\"271\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Scenario &nbsp; Today\u2019s distributed enterprises use various kinds of applications right from basic collaboration tools to complex enterprise applications and everything in between. Users use multiple SaaS applications, Infrastructure, and platform-as-a-service solutions in some way to perform their day-to-day tasks. Users also access random resources on the internet &#8211;<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":6,"featured_media":20357,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10],"tags":[95],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v16.0.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Multi-SASE adoption makes sense for an enterprise? - Lavellenetworks<\/title>\n<meta name=\"description\" content=\"In this article we discuss about Adding `SASE\u2019 To The Network Architecture For Improved Security for Enterprise\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Multi-SASE adoption makes sense for an enterprise? - Lavellenetworks\" \/>\n<meta property=\"og:description\" content=\"In this article we discuss about Adding `SASE\u2019 To The Network Architecture For Improved Security for Enterprise\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Lavellenetworks\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-20T09:24:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-09T10:19:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2020\/08\/Multi-SASE_Adoption_For_Enterprise_Blog_Banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shyamaltw\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"7 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#website\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/\",\"name\":\"Lavellenetworks\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lavellenetworks.com\/blog\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2020\/08\/Multi-SASE_Adoption_For_Enterprise_Blog_Banner.png\",\"width\":1024,\"height\":512},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/#webpage\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/\",\"name\":\"Why Multi-SASE adoption makes sense for an enterprise? - Lavellenetworks\",\"isPartOf\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/#primaryimage\"},\"datePublished\":\"2020-08-20T09:24:11+00:00\",\"dateModified\":\"2024-08-09T10:19:07+00:00\",\"author\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#\/schema\/person\/a5af704b05b0f16ac3f3ef4ec378b968\"},\"description\":\"In this article we discuss about Adding `SASE\\u2019 To The Network Architecture For Improved Security for Enterprise\",\"breadcrumb\":{\"@id\":\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/\",\"name\":\"Blog\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/sase-adoption-helps-enterprise-security\/\",\"name\":\"Why Multi-SASE adoption makes sense for an enterprise?\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#\/schema\/person\/a5af704b05b0f16ac3f3ef4ec378b968\",\"name\":\"Shyamal Kumar\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lavellenetworks.com\/blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/lavellenetworks.com\/blog\/wp-content\/uploads\/2018\/05\/Shyamal-1-150x150.jpg\",\"caption\":\"Shyamal Kumar\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/shyamalk\/\",\"https:\/\/twitter.com\/shyamaltw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19386"}],"collection":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=19386"}],"version-history":[{"count":4,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19386\/revisions"}],"predecessor-version":[{"id":21121,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/19386\/revisions\/21121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/media\/20357"}],"wp:attachment":[{"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=19386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=19386"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lavellenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=19386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}