SlideShare a Scribd company logo
7
Most read
8
Most read
9
Most read
SECURITY SERVICE EDGE
(SSE / SASE)
Secure connectivity that’s ready for anything
EVOLUTION OF WFH & MOBILE WORKFORCE
• Story / Experience / Questions
• WFH has changed to WFAnywhere
YESTERDAY
TODAY
APPLICATIONS
EXTERNAL APPS
(SAAS & WEB)
INTERNAL APPS
(DATA CENTER / IAAS)
WORK FROM
ANYWHERE,
HQ AND
BRANCH
CASB
FW
SWG
SSL
VPN
DLP
Sand
box
Anti-
Malware
Email
SSPM
CSPM
IPS
SD-WAN
RBI
SD-WAN
VPN
Direct
Legacy Designs may not work in the Future
USERS
BYOD, THIRD PARTY
Public Clouds Data Centres
Remote workers VPN Client
WEBSITES
PRIVATE APPS
Secure Web
Gateway
SSL
DLP
Threat
Protect
EUBA
CLOUD APPS
Branch Office
SSL SWG DLP Threat EUBA ZTNA
VPN concentrator
HOW SASE CHANGES IT SECURITY
API’s
SASE
Remote Workers Mobile Devices BYOD Devices
HQ
Global PoP Network
WWW
Internet
MPLS
Internet
Internet
Internet Internet
CONNECTIVITY MATTERS
NETWORK PEERING INFLUENCES USER EXPERIENCE
APP
TRUST
SHOULD
THE APP BE
TRUSTED?
INSTANCE
TRUST
SHOULD THE
INSTANCE BE
ALLOWED?
ACTIVITY
TRUST
SHOULD THE
ACTIVITY BE
ALLOWED?
BEHAVIOR
TRUST
SHOULD
THE
BEHAVIOR
ALLOWED?
DATA
TRUST
SHOULD
THE DATA
BE
ALLOWED?
LOCATION
TRUST
SHOULD THE
LOCATION
BE
TRUSTED?
SHOULD
THE DEVICE
BE
TRUSTED?
DEVICE
TRUST IJACSBU
AOLOLSU
LOLATOT
ACIHFWT
KHYE
WHAT
ACTION
SHOULD
RESPOND
SASE ZERO TRUST
PROVIDING THE ABILITY TO MAKE RISK-BASED DECISIONS ACROSS ALL PARTS OF
EVERY TRANSACTION
10 CRITICAL USE CASES
ALL WITHIN ONE CENTRALIZED PLATFORM & MANAGEMENT CONSOLE
Protect Against
Advanced Threats
Stop threats before they
get to
the endpoint
‣ Sandboxing & Browser
Isolation
‣ Cloud IPS
‣ Insider Threats
‣ Phishing &
Ransomware
‣ Risk Score & Intel
Sharing
1 2 3
Control Access &
Coach Users
Provide risk-based
Conditional
Access with user
warnings
4
Zero Trust Network Access
(ZTNA)
Provide access to internal apps
without exposing your
perimeter
5
Control Sensitive
Data Propagation
Understand the context
of user
actions in relation to
your data
Download
Share
Send
6
Secure Internet Breakouts,
& WAN Orchestration
Orchestrate your WAN;
secure your internet
breakouts
7
Track SaaS & IaaS
Standards Compliance
Continuous assessment of
your IaaS environments &
SaaS apps
8
Digital Experience
Management (DEM)
End-to-end performance
monitoring to ID & triage
issues
9
Integrate with & Facilitate
Intel Sharing b/w Vendors
Ensure your vendor
ecosystem works together
10
Nathan
User Risk Rating:
↓893/1000
GDrive (Personal)
App Risk Rating:
93/100
Visibility & Control
Over Shadow IT
Control usage & risk
across
SaaS, IaaS, and Private
Apps
Bulk Upload STOP!
You are trying to UPLOAD files to Dropbox.
Click HERE to go to OneDrive, or enter a
justification below to proceed to
Dropbox.
View Only
Isolate
Provide Secure Access to
BYOD & 3rd Parties
Real-time security & access
controls in a clientless
manner
Managed Devices Only Poor Performance!
Why?
Where is the issue?
KEY TAKEAWAYS
Consolidate
Vendors
Shrink the
Attack Surface
Move Away from
Hardware-based
Security
Stop Backhauling
Traffic – Go
Direct to Net
Reduce
Complexity
Replace
Legacy VPN
Improve the
Employee
Experience
Implement a
Zero Trust
Architecture
Find Cost
Savings

More Related Content

PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
PPTX
SD-WAN_MoD.pptx for SD WAN networks connectivity
PPTX
TechWiseTV Workshop: SD-WAN Security
PDF
GWAVACon 2015: GWAVA - Three dimensional security for Novell GroupWise
PDF
A Different Approach to Securing Your Cloud Journey
PPTX
palo-alto-networks-sase-overview-deck.pptx
PDF
Sangfor SSL VPN Brochure
PDF
SDWAN.pdf
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
SD-WAN_MoD.pptx for SD WAN networks connectivity
TechWiseTV Workshop: SD-WAN Security
GWAVACon 2015: GWAVA - Three dimensional security for Novell GroupWise
A Different Approach to Securing Your Cloud Journey
palo-alto-networks-sase-overview-deck.pptx
Sangfor SSL VPN Brochure
SDWAN.pdf

Similar to SECURE ACCESS SERVICE EDGE - SSE/SASE(CLOUD) (20)

PDF
Forcepoint SD-WAN and NGFW + IPS
PPTX
Softchoice & Microsoft: Public Cloud Security Webinar
PDF
SD-WAN - comSpark 2019
PDF
Sangfor SSL VPN Datasheet
PPTX
91c03816-de6c-441d-a9e6-3865765434ff.pptx
PDF
GWAVACon - Messaging Security at its Best
PPT
Information Security
PDF
Evolving the WAN for the Cloud, using SD-WAN & NFV
PDF
Secure Your Network for Scale & the Cloud
PDF
SSL VPN Evaluation Guide
PPTX
Extending Security to EVERY Edge
PDF
Estratégia de segurança da Cisco (um diferencial para seus negócios)
PPTX
The Future of Mobile Application Security
PPTX
Enhancing SaaS Performance: A Hands-on Workshop for Partners
PDF
Cisco Connect 2018 Malaysia - Cisco sd-wan-next generation wan to power your ...
PPTX
Check Point Solutions Portfolio- Detailed
PDF
DNA Intelligent WAN Campus Day
PPTX
De-Witt Tromp- Introduction to Zero Trust & SASE.
PPTX
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
PPTX
00. introduction to app sec v3
Forcepoint SD-WAN and NGFW + IPS
Softchoice & Microsoft: Public Cloud Security Webinar
SD-WAN - comSpark 2019
Sangfor SSL VPN Datasheet
91c03816-de6c-441d-a9e6-3865765434ff.pptx
GWAVACon - Messaging Security at its Best
Information Security
Evolving the WAN for the Cloud, using SD-WAN & NFV
Secure Your Network for Scale & the Cloud
SSL VPN Evaluation Guide
Extending Security to EVERY Edge
Estratégia de segurança da Cisco (um diferencial para seus negócios)
The Future of Mobile Application Security
Enhancing SaaS Performance: A Hands-on Workshop for Partners
Cisco Connect 2018 Malaysia - Cisco sd-wan-next generation wan to power your ...
Check Point Solutions Portfolio- Detailed
DNA Intelligent WAN Campus Day
De-Witt Tromp- Introduction to Zero Trust & SASE.
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
00. introduction to app sec v3
Ad

Recently uploaded (20)

PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
Tartificialntelligence_presentation.pptx
PPTX
A Presentation on Touch Screen Technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Hybrid model detection and classification of lung cancer
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
project resource management chapter-09.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
Web App vs Mobile App What Should You Build First.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Approach and Philosophy of On baking technology
Tartificialntelligence_presentation.pptx
A Presentation on Touch Screen Technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Zenith AI: Advanced Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
Chapter 5: Probability Theory and Statistics
Hybrid model detection and classification of lung cancer
WOOl fibre morphology and structure.pdf for textiles
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
MIND Revenue Release Quarter 2 2025 Press Release
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
project resource management chapter-09.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hindi spoken digit analysis for native and non-native speakers
Ad

SECURE ACCESS SERVICE EDGE - SSE/SASE(CLOUD)

  • 1. SECURITY SERVICE EDGE (SSE / SASE) Secure connectivity that’s ready for anything
  • 2. EVOLUTION OF WFH & MOBILE WORKFORCE • Story / Experience / Questions • WFH has changed to WFAnywhere
  • 5. APPLICATIONS EXTERNAL APPS (SAAS & WEB) INTERNAL APPS (DATA CENTER / IAAS) WORK FROM ANYWHERE, HQ AND BRANCH CASB FW SWG SSL VPN DLP Sand box Anti- Malware Email SSPM CSPM IPS SD-WAN RBI SD-WAN VPN Direct Legacy Designs may not work in the Future USERS BYOD, THIRD PARTY
  • 6. Public Clouds Data Centres Remote workers VPN Client WEBSITES PRIVATE APPS Secure Web Gateway SSL DLP Threat Protect EUBA CLOUD APPS Branch Office SSL SWG DLP Threat EUBA ZTNA VPN concentrator HOW SASE CHANGES IT SECURITY API’s SASE
  • 7. Remote Workers Mobile Devices BYOD Devices HQ Global PoP Network WWW Internet MPLS Internet Internet Internet Internet CONNECTIVITY MATTERS NETWORK PEERING INFLUENCES USER EXPERIENCE
  • 8. APP TRUST SHOULD THE APP BE TRUSTED? INSTANCE TRUST SHOULD THE INSTANCE BE ALLOWED? ACTIVITY TRUST SHOULD THE ACTIVITY BE ALLOWED? BEHAVIOR TRUST SHOULD THE BEHAVIOR ALLOWED? DATA TRUST SHOULD THE DATA BE ALLOWED? LOCATION TRUST SHOULD THE LOCATION BE TRUSTED? SHOULD THE DEVICE BE TRUSTED? DEVICE TRUST IJACSBU AOLOLSU LOLATOT ACIHFWT KHYE WHAT ACTION SHOULD RESPOND SASE ZERO TRUST PROVIDING THE ABILITY TO MAKE RISK-BASED DECISIONS ACROSS ALL PARTS OF EVERY TRANSACTION
  • 9. 10 CRITICAL USE CASES ALL WITHIN ONE CENTRALIZED PLATFORM & MANAGEMENT CONSOLE Protect Against Advanced Threats Stop threats before they get to the endpoint ‣ Sandboxing & Browser Isolation ‣ Cloud IPS ‣ Insider Threats ‣ Phishing & Ransomware ‣ Risk Score & Intel Sharing 1 2 3 Control Access & Coach Users Provide risk-based Conditional Access with user warnings 4 Zero Trust Network Access (ZTNA) Provide access to internal apps without exposing your perimeter 5 Control Sensitive Data Propagation Understand the context of user actions in relation to your data Download Share Send 6 Secure Internet Breakouts, & WAN Orchestration Orchestrate your WAN; secure your internet breakouts 7 Track SaaS & IaaS Standards Compliance Continuous assessment of your IaaS environments & SaaS apps 8 Digital Experience Management (DEM) End-to-end performance monitoring to ID & triage issues 9 Integrate with & Facilitate Intel Sharing b/w Vendors Ensure your vendor ecosystem works together 10 Nathan User Risk Rating: ↓893/1000 GDrive (Personal) App Risk Rating: 93/100 Visibility & Control Over Shadow IT Control usage & risk across SaaS, IaaS, and Private Apps Bulk Upload STOP! You are trying to UPLOAD files to Dropbox. Click HERE to go to OneDrive, or enter a justification below to proceed to Dropbox. View Only Isolate Provide Secure Access to BYOD & 3rd Parties Real-time security & access controls in a clientless manner Managed Devices Only Poor Performance! Why? Where is the issue?
  • 10. KEY TAKEAWAYS Consolidate Vendors Shrink the Attack Surface Move Away from Hardware-based Security Stop Backhauling Traffic – Go Direct to Net Reduce Complexity Replace Legacy VPN Improve the Employee Experience Implement a Zero Trust Architecture Find Cost Savings