SlideShare a Scribd company logo
1 of 16
Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Introduction to Zero Trust &
SASE
De-Witt Tromp
- the industry frameworks for securing users in cloud in a perimeter-
less world
2 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
3 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
The Evolution
Migrating Your Business to the Cloud
Business Perimeter
DNS Perimeter
Private
Datacenter
Private
Datacenter
Private
Datacenter
Network Perimeter
4 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
The Challenges of Delivering on the Promise
Securing the Digital Transformation
The user experience suffers
from complexity and
poor performance
IT suffers from reduced security
visibility & control, and
increased complexity
Organizations suffer from
increased technology costs and
impacted productivity
Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
The Duo
6 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
SASE capabilities are delivered as a service based upon the identity of
the entity, real-time context, enterprise security/compliance policies
and continuous assessment of risk/trust throughout the sessions.
Identities of entities can be associated with people, groups of people
(branch offices), devices, applications, services, IoT systems or edge
computing locations.
How Does One Enable the Other?
Formal Definition of SASE
The Zero Trust model is the de-facto security model which should be
supported and implemented by the controls available in the SASE
architecture.
7 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
Zero Trust
SCOPE
Devices Network
Zero Trust
Policy
People Resources
Employees
Partners
Customers
Laptops
Desktops
Phones
Tablets
Servers
Public
Private
Managed
On-prem
SaaS
PaaS
IaaS
Control
Context
Intelligence + Automation
8 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
Zero Trust
Intelligence + Automation
SCOPE
Devices Network
Zero Trust
Policy
People Resources
Employees
Partners
Customers
Laptops
Desktops
Phones
Tablets
Servers
Public
Private
Managed
VERIFY
On-prem
SaaS
PaaS
IaaS
Role
Task
Type
Agent
Version
Joined
Managed
Secure
Corp
Geo
Familiar
Botnet
Attacking
Scope
Classification
Sensitivity
Regulation
Risk
Threat Intel
Compliance
Time
Anomalies
Block
StrongAuthentication
Audit
Control
Context
9 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
Zero Trust
Intelligence + Automation
Devices Network
Zero Trust
Policy
People Resources
EXAMPLE
FTE Domain-
joined
Off-CorpNet HR Application
No anomalies MFA sign-in
Control
Context
When an FTE on a domain-joined machine tries to access a resource with no risk, require MFA.
10 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
The SASE Experience
Pushing Simple, Fast, Flexible, and Scalable Security to the Service Edge
“Reduce complexity now on the network security side by moving to ideally one
vendor for secure web gateway (SWG), cloud access security broker (CASB), DNS,
zero trust network access (ZTNA), and remote browser isolation capabilities.”
11 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
The SASE Experience
Pushing Simple, Fast, Flexible, and Scalable Security to the Service Edge
Gartner Magic Quadrant for Enterprise Data Loss Prevention
Gartner Magic Quadrant for Secure Web Gateways
Gartner Magic Quadrant for Cloud Access Security Brokers
The only vendor with:
 Agentless ZTNA
 Isolation as an integrated
capability
 Best-in-class SSL
decryption
“Reduce complexity now on the network security side by moving to ideally one
vendor for secure web gateway (SWG), cloud access security broker (CASB), DNS,
zero trust network access (ZTNA), and remote browser isolation capabilities.”
12 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
Secure SSL
Decrypt
File Extraction
& Inspection
Authentication
Advanced Malware
Analysis Service (Sandbox)
Remote Browser Isolation
DLP Inspect & Enforce
Cloud Visibility
& Control (CASB)
Cloud Firewall Service
Headquarters
w/ Data Center
Regional
Offices
Roaming
Users
NGFW
Connection
Services
Advanced Security Services
SWG Proxy
Inspect Before Delivery
URL / Content / Application
Categorization
SEP
WSS Agent
ProxySG
Accelerated
Cloud Backbone
Telco POP
Backbone
Automate Policy &
Content Acceleration
Elastic Cloud
SVC Structure
Content Peering &
Connection Scaling
3rd Party
Monitoring
Bandwidth
Enforcement
Secure Access Cloud (ZTNA)
SEP/Agent
Explicit or
Proxy Fwd
SD-WAN Connect
IPSec or B/W
The Symantec SASE Framework
De-Risk Your Secure Access and Reduce Costs
Private Data
Center
Internet
13 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
Security Operations Center (SOC)
All events are available or exported
to SIEM and other SOC
tools/dashboards
Symantec SASE in Action
Providing Fast & Secure Access to Resources for Users with Managed Devices
As the user attempts to access the internet, hosted corporate application, or public cloud service from
any location, they are consistently redirected to the nearest Symantec SASE Cloud service point
 SASE Cloud authenticates and validates user
 Firewall rules and acceptable use policies are
applied
 SSL traffic is selectively decrypted based on
compliance and privacy policies
 Relevant security controls inspect traffic and
implement policy
Accessing the Internet
 SASE Cloud authenticates and validates user
authorization
 SASE Cloud connects the user to application
 SASE Cloud applies all relevant policies and
controls to traffic in real-time
Accessing corporate hosted
applications (IaaS & data
center)
 SASE Cloud authenticates and validates user
authorization
 SASE Cloud forwards authorized user to SaaS
application without backhauling traffic to
corporate network
 SASE Cloud applies all relevant policies and
controls to traffic in real-time
Accessing SaaS applications
14 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
Security Operations Center (SOC)
Symantec SASE in Action
Providing Fast & Secure Access to Resources for Users with Unmanaged Devices
Users attempting to access hosted corporate applications or public cloud services are consistently
redirected to the nearest Symantec SASE Cloud service point without the need for an endpoint agent
 Redirection to SASE Cloud happens via
corporate domain (DNS) or application portal
 SASE Cloud authenticates and validates user
authorization
 SASE Cloud connects the user to application
Accessing corporate hosted
applications (IaaS & data
center)
 User authenticating to SaaS app is redirected
to the corporate Identity Provider (IdP) via
authentication redirection (SAML)
 Corporate IdP authenticates user and redirects
them to SASE Cloud’s Web Isolation platform
 SASE Cloud spins up a remote browser
instance and serves the virtualized SaaS
application to the user
 SASE Cloud applies all relevant policies and
controls to traffic in real-time
Accessing SaaS applications
All events are available or exported
to SIEM and other SOC
tools/dashboards
15 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
|
Symantec: Your Ideal Partner for Fulfilling the Promise of SASE
Deliver the SASE user experience today:
 Low-latency cloud and internet access for managed and unmanaged users
 Full breadth of best-in-class network security capabilities
Achieve unmatched performance and
operational efficiency over time:
 The lowest latency access and unlimited
scalability through our GCP migration
 Agentless access and managed endpoint
agent consolidation
 Simplified operations thanks to federated
solution management “Reduce complexity now on the network security side by
moving to ideally ONE VENDOR for secure web gateway (SWG),
cloud access security broker (CASB), DNS, zero trust network
access (ZTNA), and remote browser isolation capabilities.”
Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
Thank you

More Related Content

Similar to De-Witt Tromp- Introduction to Zero Trust & SASE.

Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksArticulate Marketing
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsZscaler
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Cyrus Sorab
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?QOS Networks
 
Realise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyesRealise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyesThousandEyes
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3EnterpriseGRC Solutions, Inc.
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera Technologies
 
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)Amazon Web Services
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
cloud Raid
cloud Raidcloud Raid
cloud Raidgsmenon1
 

Similar to De-Witt Tromp- Introduction to Zero Trust & SASE. (20)

Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
 
Faster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in awsFaster, simpler, more secure remote access to apps in aws
Faster, simpler, more secure remote access to apps in aws
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...Unlocking the value of the cloud - The benefits of deploying asset and facili...
Unlocking the value of the cloud - The benefits of deploying asset and facili...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Saas security
Saas securitySaas security
Saas security
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
Realise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyesRealise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyes
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
cloud Raid
cloud Raidcloud Raid
cloud Raid
 

More from itnewsafrica

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...itnewsafrica
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omniitnewsafrica
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023itnewsafrica
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retailitnewsafrica
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...itnewsafrica
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...itnewsafrica
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...itnewsafrica
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcareitnewsafrica
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcareitnewsafrica
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...itnewsafrica
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platformitnewsafrica
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Betteritnewsafrica
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...itnewsafrica
 

More from itnewsafrica (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
Kenneth Palliam- Cybersecurity Maturity: The Role of the GITO Considering New...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
Ansgar Pabst- Disruptive Innovation through Corporate Collaboration with Star...
 
Koen den Hollander- The Future is Omni
Koen den Hollander- The Future is OmniKoen den Hollander- The Future is Omni
Koen den Hollander- The Future is Omni
 
Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023Wongama Millie- South African Social Media Insights 2023
Wongama Millie- South African Social Media Insights 2023
 
Emphasising Personalization and Customer Journey Mapping in Digital Retail
Emphasising Personalization and  Customer Journey Mapping in Digital  RetailEmphasising Personalization and  Customer Journey Mapping in Digital  Retail
Emphasising Personalization and Customer Journey Mapping in Digital Retail
 
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
Munyaradzi Nyikavaranda- Assessing the intersect between UX, AI, Big Data: Cr...
 
Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...Data Analytics & Customer Insights as enablers of businesses to employ predic...
Data Analytics & Customer Insights as enablers of businesses to employ predic...
 
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...Mark Cockerell- A New Era of  Retail Data  Integration Mark Cockerell Retail ...
Mark Cockerell- A New Era of Retail Data Integration Mark Cockerell Retail ...
 
Pravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in HealthcarePravir Ishvarlal- Artificial Intelligence in Healthcare
Pravir Ishvarlal- Artificial Intelligence in Healthcare
 
Braden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African HealthcareBraden van Breda- The Role of AI, Robotics in African Healthcare
Braden van Breda- The Role of AI, Robotics in African Healthcare
 
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
Rodney Taylor- AVA Disrupts Primary Healthcare with the Latest Asynchronous I...
 
Anish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination PlatformAnish Gupta- Smart Care Coordination Platform
Anish Gupta- Smart Care Coordination Platform
 
Andrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the BetterAndrew Roberts- How Technology can Transform Healthcare for the Better
Andrew Roberts- How Technology can Transform Healthcare for the Better
 
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
Andrew Roberts - Mobile Health Apps for Improved Patient Engagement and Educa...
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

De-Witt Tromp- Introduction to Zero Trust & SASE.

  • 1. Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Introduction to Zero Trust & SASE De-Witt Tromp - the industry frameworks for securing users in cloud in a perimeter- less world
  • 2. 2 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. |
  • 3. 3 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | The Evolution Migrating Your Business to the Cloud Business Perimeter DNS Perimeter Private Datacenter Private Datacenter Private Datacenter Network Perimeter
  • 4. 4 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | The Challenges of Delivering on the Promise Securing the Digital Transformation The user experience suffers from complexity and poor performance IT suffers from reduced security visibility & control, and increased complexity Organizations suffer from increased technology costs and impacted productivity
  • 5. Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. The Duo
  • 6. 6 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | SASE capabilities are delivered as a service based upon the identity of the entity, real-time context, enterprise security/compliance policies and continuous assessment of risk/trust throughout the sessions. Identities of entities can be associated with people, groups of people (branch offices), devices, applications, services, IoT systems or edge computing locations. How Does One Enable the Other? Formal Definition of SASE The Zero Trust model is the de-facto security model which should be supported and implemented by the controls available in the SASE architecture.
  • 7. 7 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | Zero Trust SCOPE Devices Network Zero Trust Policy People Resources Employees Partners Customers Laptops Desktops Phones Tablets Servers Public Private Managed On-prem SaaS PaaS IaaS Control Context Intelligence + Automation
  • 8. 8 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | Zero Trust Intelligence + Automation SCOPE Devices Network Zero Trust Policy People Resources Employees Partners Customers Laptops Desktops Phones Tablets Servers Public Private Managed VERIFY On-prem SaaS PaaS IaaS Role Task Type Agent Version Joined Managed Secure Corp Geo Familiar Botnet Attacking Scope Classification Sensitivity Regulation Risk Threat Intel Compliance Time Anomalies Block StrongAuthentication Audit Control Context
  • 9. 9 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | Zero Trust Intelligence + Automation Devices Network Zero Trust Policy People Resources EXAMPLE FTE Domain- joined Off-CorpNet HR Application No anomalies MFA sign-in Control Context When an FTE on a domain-joined machine tries to access a resource with no risk, require MFA.
  • 10. 10 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | The SASE Experience Pushing Simple, Fast, Flexible, and Scalable Security to the Service Edge “Reduce complexity now on the network security side by moving to ideally one vendor for secure web gateway (SWG), cloud access security broker (CASB), DNS, zero trust network access (ZTNA), and remote browser isolation capabilities.”
  • 11. 11 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | The SASE Experience Pushing Simple, Fast, Flexible, and Scalable Security to the Service Edge Gartner Magic Quadrant for Enterprise Data Loss Prevention Gartner Magic Quadrant for Secure Web Gateways Gartner Magic Quadrant for Cloud Access Security Brokers The only vendor with:  Agentless ZTNA  Isolation as an integrated capability  Best-in-class SSL decryption “Reduce complexity now on the network security side by moving to ideally one vendor for secure web gateway (SWG), cloud access security broker (CASB), DNS, zero trust network access (ZTNA), and remote browser isolation capabilities.”
  • 12. 12 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | Secure SSL Decrypt File Extraction & Inspection Authentication Advanced Malware Analysis Service (Sandbox) Remote Browser Isolation DLP Inspect & Enforce Cloud Visibility & Control (CASB) Cloud Firewall Service Headquarters w/ Data Center Regional Offices Roaming Users NGFW Connection Services Advanced Security Services SWG Proxy Inspect Before Delivery URL / Content / Application Categorization SEP WSS Agent ProxySG Accelerated Cloud Backbone Telco POP Backbone Automate Policy & Content Acceleration Elastic Cloud SVC Structure Content Peering & Connection Scaling 3rd Party Monitoring Bandwidth Enforcement Secure Access Cloud (ZTNA) SEP/Agent Explicit or Proxy Fwd SD-WAN Connect IPSec or B/W The Symantec SASE Framework De-Risk Your Secure Access and Reduce Costs Private Data Center Internet
  • 13. 13 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | Security Operations Center (SOC) All events are available or exported to SIEM and other SOC tools/dashboards Symantec SASE in Action Providing Fast & Secure Access to Resources for Users with Managed Devices As the user attempts to access the internet, hosted corporate application, or public cloud service from any location, they are consistently redirected to the nearest Symantec SASE Cloud service point  SASE Cloud authenticates and validates user  Firewall rules and acceptable use policies are applied  SSL traffic is selectively decrypted based on compliance and privacy policies  Relevant security controls inspect traffic and implement policy Accessing the Internet  SASE Cloud authenticates and validates user authorization  SASE Cloud connects the user to application  SASE Cloud applies all relevant policies and controls to traffic in real-time Accessing corporate hosted applications (IaaS & data center)  SASE Cloud authenticates and validates user authorization  SASE Cloud forwards authorized user to SaaS application without backhauling traffic to corporate network  SASE Cloud applies all relevant policies and controls to traffic in real-time Accessing SaaS applications
  • 14. 14 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | Security Operations Center (SOC) Symantec SASE in Action Providing Fast & Secure Access to Resources for Users with Unmanaged Devices Users attempting to access hosted corporate applications or public cloud services are consistently redirected to the nearest Symantec SASE Cloud service point without the need for an endpoint agent  Redirection to SASE Cloud happens via corporate domain (DNS) or application portal  SASE Cloud authenticates and validates user authorization  SASE Cloud connects the user to application Accessing corporate hosted applications (IaaS & data center)  User authenticating to SaaS app is redirected to the corporate Identity Provider (IdP) via authentication redirection (SAML)  Corporate IdP authenticates user and redirects them to SASE Cloud’s Web Isolation platform  SASE Cloud spins up a remote browser instance and serves the virtualized SaaS application to the user  SASE Cloud applies all relevant policies and controls to traffic in real-time Accessing SaaS applications All events are available or exported to SIEM and other SOC tools/dashboards
  • 15. 15 Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. | Symantec: Your Ideal Partner for Fulfilling the Promise of SASE Deliver the SASE user experience today:  Low-latency cloud and internet access for managed and unmanaged users  Full breadth of best-in-class network security capabilities Achieve unmatched performance and operational efficiency over time:  The lowest latency access and unlimited scalability through our GCP migration  Agentless access and managed endpoint agent consolidation  Simplified operations thanks to federated solution management “Reduce complexity now on the network security side by moving to ideally ONE VENDOR for secure web gateway (SWG), cloud access security broker (CASB), DNS, zero trust network access (ZTNA), and remote browser isolation capabilities.”
  • 16. Broadcom Proprietary and Confidential. Copyright © 2023 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Thank you