BACKGROUND:

Researchers at Avant Analytics have released The 6-12 Report: SASE, reporting that 90% of IT leaders plan to implement secure access service edge (SASE) migrations into their current framework. Excerpts:

  • SASE is a security model, typically cloud-based, which bundles software-defined networking with network security functions, all of which are delivered by a single provider using multiple points-of-presence (POPs)…
  • The SASE market will grow at a compound annual growth rate of 116%, CAGR, attaining a market value of $5.1 billion by 2024. – Dell’Oro Group
  • More than two-thirds of the respondents in our survey point to security as the main benefit of SASE.
  • SASE combines critical network security functions, such as CASB, RBI, SWG, and ZTNA, with WAN capabilities (e.g. SD-WAN) to deliver secure services and applications at reliable performance levels.

Experts Comments

November 17, 2021
Garret F. Grajek
CEO
YouAttest

SASE solutions along with CASB and ZTNA are gaining popularity as they offer better security and performance over VPNs and typical corporate perimeter-based security capabilities. However, IT execs should be careful to launch such implementations on the basis of a solid foundation with a zero trust strategy. 

Zero trust relies on strong identity and authentication as the first step. As password credentials are easy to phish or replay, eliminating passwords is critical to establish a strong

.....Read More

SASE solutions along with CASB and ZTNA are gaining popularity as they offer better security and performance over VPNs and typical corporate perimeter-based security capabilities. However, IT execs should be careful to launch such implementations on the basis of a solid foundation with a zero trust strategy. 

Zero trust relies on strong identity and authentication as the first step. As password credentials are easy to phish or replay, eliminating passwords is critical to establish a strong foundation for zero trust. W3C WebAuthN and the FIDO Alliance offer a variety of passwordless authentication options for various use cases. These authenticators establish an unphishable connection between a user and their IT system making the environment impervious to a data breach. Furthermore, such authentication methods have less user friction and improve operational costs for the organization.

  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.