SlideShare a Scribd company logo
1 of 7
Download to read offline
Enterprise & Cloud
Why Integrating Network
Technology & Security Makes
Sense Now
EDITORS' PICK | 1,937 views | Mar 5, 2020, 10:07am EST
Louis Columbus Senior Contributor
GETTY
Bottom Line: Identities are the new security perimeter, making the
integration of network technologies and security essential for any
organization.
The cybersecurity industry has seen many smart, connected, next-
generation products come on the market recently, along with the service
that support them at the recent RSA Conference. In order for those
products and services to succeed, the organizations creating them need t
create tighter integration between network technology and security.
Employees, suppliers, service teams and, most importantly, customers,
all need anytime, anywhere access to cloud applications, platforms and
services, all in real-time. Add to that sky-high customer expectations for
network speed and low latency, and enterprises begin to see the perfect
conditions to forge a new approach to network technology and security.
Demystifying Cybersecurity Networks In 2020
Gartner, the world’s leading research and advisory company, has
observed a new trend of converging network services and cybersecurity
technology. That trend has become so prevalent that in the last year, the
Gartner coined the name Secure Access Service Edge (SASE) to describe
it. According to Gartner, “the secure access service edge is as an
emerging offering combining comprehensive WAN capabilities with
comprehensive network security functions (such as SWG, CASB, FWaaS
and ZTNA) to support the dynamic secure access needs of digital
enterprises,” that is delivered primarily as a cloud-based service in their
recent research report, Gartner The Future of Network Security Is In The
Cloud (Gartner subscription required) by Neil MacDonald, Lawrence
Orans, and Joe Skorupa published the 30 of August, 2019. You can see
graphic illustrating the convergence of these two services below:
th
GARTNER THE FUTURE OF NETWORK SECURITY IS IN THE CLOUD (GARTNER SUBSCRIPTION REQUIRED) BY NEIL MACDONALD,
LAWRENCE ORANS, AND JOE SKORUPA PUBLISHED THE 30TH OF AUGUST, 2019.
Executives identified the following factors that are accelerating SASE
evaluation and adoption across enterprises today:
The best digital business models adapt and flex in real-
time to customer requirements, unrestrained by branch
office locations. SASE’s design is responsive to the rise of
highly-distributed enterprises, and the strain they place on on-
premises systems. With SASE, a sales representative completing a
deal using their smartphone in a coffee shop has the same
application availability and security as one located in
headquarters. SASE is designed to flex and treat every identity as
new security perimeter. I believe this is why Gartner included Zer
Trust Network Access (ZTNA) in the framework. ZTNA protects
the proliferating number of endpoints across a growing digital
business.
Devices, not data centers, need to drive cybersecurity
strategies today. A large driver in the development of SASE is
the recognition that data centers don’t need to be the hub of their
networks anymore; in fact, relying on data centers constricts the
ability of any organization to stay adaptable. Smarter networks ar
using devices, identified by machine learning algorithms that
analyze their usage patterns, as the building blocks of network
security.
Building a business case for any new digital product or
service requires IT, security and real-time reporting to b
integrated. Considering how connected, contextually intelligent
and always-on customers expect current and next-generation
products to be, integrating networks and security is an essential
part of building a compelling business case. It’s become table
stakes for the future development of new products.
Today In: Enterprise & Cloud
Defining the SASE Identity-Centric Architecture
Given the business case for SASE and its foundational role for the next
generation of smart, connected products and contextually intelligent
services, the components that comprise the framework need to be
explored. Since its introduction last year, dozens of vendors have claimed
that they are already fully SASE compliant, many without understanding
the framework in depth. In my opinion, the key components of the SASE
Identity-Centric Architecture include:
Cloud-native microservices architecture capable of
handling policy-based contexts for users, devices and
applications. A true SASE architecture will be able to scale and
support identities and credentials, treating them as the new
security perimeter for an organization. The architecture will also
be able to provide real-time risk and trust assessments, role
definition, location, time and device profile data that is analyzed i
real-time using machine learning algorithms to evaluate and
quantify risk. Above all, the microservices architecture needs to b
constructed so that API-based cloud-to-cloud integration is
possible with minimal development effort. I believe that Infoblox,
a leading network services provider, has led the way in this regard
having invested in the cloud-native BloxOne platform for
containerized microservices over the course of the past several
years.
Define identities as security perimeters and keep them in
context relative to resource requests including real-time
cloud application access. This is one of the true tests of any
claim of SASE compliance, as it requires real-time orchestration
between networks and network security components. When a
vendor can properly accomplish this, the network can enable
anyone, anywhere to have the same access privileges, security,
application and resource access as a colleague located in an office
in headquarters.
SD-WAN integration that is adaptive enough to enable
remote locations leas-privilege access based on ZTNA
while providing real-time system availability. Integral to
the SASE Identity-Centric Architecture, SD-WAN is essential for
the framework to deliver the many benefits it’s designed for.
Real-time network activity monitoring combined with
Zero Trust Network Access (ZTNA) access privilege
rights to the role level. While Gartner lists ZTNA as one of
many components in its Network security-as-a-service, I believe i
is essential to treating identity as the new security perimeter.
ZTNA makes it possible for every device, location, and session to
have full access to all application and network resources and for a
true Zero trust-based approach of granting least-privileged access
to work. Vendors claiming to have a true SASE architecture need
to have this for the entire strategy to work.
The ability to combine data from all elements in the SAS
architecture and identify sensitive data, then adapt ZTNA
least privilege access to the role level. Another excellent test
to see if a vendor has a true SASE architecture is whether the data
generated can be used to fine-tune least privilege access. This
reflects how well data policies interpret and act on the quality of
security data. Understanding sensitive data in cloud-based
applications, databases and platforms requires APIs that inspect
data and can classify and analyze it to continually fine-tune the
architectures’ resiliency.
Conclusion
With the majority of work occurring outside of organizations today, the
SASE Identity-Centric Architecture is timely in its design, specifically in
the areas of integrating network technology and security. The future of
digital business is being built on the foundation of smart, connected,
contextually intelligent products and real-time services that enhance and
add value to customer experiences. The disconnect between IT and
security needs to be fixed so existing new digital business models can
flourish and grow.
Follow me on Twitter or LinkedIn. Check out my website.
Louis Columbus
I am currently serving as Principal, IQMS, part of Dassault Systèmes. Previous
positions include product management at Ingram Cloud, product marketing at
iBASEt, Plex… Read More
Site Feedback Tips Corrections Reprints & Permissions Terms Priva
© 2020 Forbes Media LLC. All Rights Reserved. AdChoic
ADVERTISEMENT
Follow

More Related Content

What's hot

Gartner - Top 10 technology trends 2014
Gartner - Top 10 technology trends 2014Gartner - Top 10 technology trends 2014
Gartner - Top 10 technology trends 2014
Digital Insurance News
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
Ulf Mattsson
 
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
IMC Institute
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
YogeshIJTSRD
 

What's hot (20)

Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & AmplipaheBlocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
 
Cloud computing to have a big impact on IT careers: Gartner
Cloud computing to have a big impact on IT careers: GartnerCloud computing to have a big impact on IT careers: Gartner
Cloud computing to have a big impact on IT careers: Gartner
 
City of Geel Case Study
City of Geel Case StudyCity of Geel Case Study
City of Geel Case Study
 
Gartner - Top 10 technology trends 2014
Gartner - Top 10 technology trends 2014Gartner - Top 10 technology trends 2014
Gartner - Top 10 technology trends 2014
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
Why the cloud is a trend
Why the cloud is a trendWhy the cloud is a trend
Why the cloud is a trend
 
Thailand Business with the Cloud Service
Thailand Business with  the Cloud ServiceThailand Business with  the Cloud Service
Thailand Business with the Cloud Service
 
Value Journal - June 2021
Value Journal - June 2021Value Journal - June 2021
Value Journal - June 2021
 
Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
 
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
Maximize the Capabilities of Oracle® Golden Gate: Replicate Data Bi-Direction...
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...ตลาด Cloud Computing ในประเทศไทย  และ กระแสการใช้ Cloud  ทั้งในภาครัฐและภาคธุ...
ตลาด Cloud Computing ในประเทศไทย และ กระแสการใช้ Cloud ทั้งในภาครัฐและภาคธุ...
 
The Cloud Landscape of Thailand: Policies, Challenges and Opportunities
The Cloud Landscape of Thailand: Policies, Challenges and OpportunitiesThe Cloud Landscape of Thailand: Policies, Challenges and Opportunities
The Cloud Landscape of Thailand: Policies, Challenges and Opportunities
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
 
Blockchain 101 for Financial Services
Blockchain 101 for Financial ServicesBlockchain 101 for Financial Services
Blockchain 101 for Financial Services
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Oracle cloud-predictions-2019-5244106
Oracle cloud-predictions-2019-5244106Oracle cloud-predictions-2019-5244106
Oracle cloud-predictions-2019-5244106
 
Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021
 
Application Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the ChallengesApplication Integration Architecture of Excellence - Answering to the Challenges
Application Integration Architecture of Excellence - Answering to the Challenges
 
Company presentation Servicenoew
Company presentation ServicenoewCompany presentation Servicenoew
Company presentation Servicenoew
 

Similar to Why Integrating Network Technology & Security Makes Sense Now

SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdfSASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
Anto664537
 
What Is Openstack And Its Importance
What Is Openstack And Its ImportanceWhat Is Openstack And Its Importance
What Is Openstack And Its Importance
Lorie Harris
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Juniper Networks
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
juliennehar
 

Similar to Why Integrating Network Technology & Security Makes Sense Now (20)

SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdfSASE-for-Superheroes-The-Complete-Integration-eBook.pdf
SASE-for-Superheroes-The-Complete-Integration-eBook.pdf
 
CLOUD BASED SERVICES EX.pdf
CLOUD BASED SERVICES EX.pdfCLOUD BASED SERVICES EX.pdf
CLOUD BASED SERVICES EX.pdf
 
idc-link-dna
idc-link-dnaidc-link-dna
idc-link-dna
 
Top SASE (Secure Access Service Edge) Vendors of 2024
Top SASE (Secure Access Service Edge) Vendors of 2024Top SASE (Secure Access Service Edge) Vendors of 2024
Top SASE (Secure Access Service Edge) Vendors of 2024
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
J3602068071
J3602068071J3602068071
J3602068071
 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
 
Schoology cloud assignment
Schoology cloud assignmentSchoology cloud assignment
Schoology cloud assignment
 
What Is Openstack And Its Importance
What Is Openstack And Its ImportanceWhat Is Openstack And Its Importance
What Is Openstack And Its Importance
 
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdfTop Emerging Cloud Computing Trends To Look for in 2021.pdf
Top Emerging Cloud Computing Trends To Look for in 2021.pdf
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and SolutionsSecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
SecSecuring Software as a Service Model of Cloud Computing: Issues and Solutions
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - Cloud
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
Value journal September_2019
Value journal September_2019 Value journal September_2019
Value journal September_2019
 
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docxTrends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
Trends in cloud computingTRENDS IN CLOUD COMPUTINGAB.docx
 
WHAT IS CLOUD COMPUTING
WHAT IS CLOUD COMPUTINGWHAT IS CLOUD COMPUTING
WHAT IS CLOUD COMPUTING
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 

More from Abaram Network Solutions

More from Abaram Network Solutions (20)

Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021Why Cloud Technology Is Expected To Dominate 2021
Why Cloud Technology Is Expected To Dominate 2021
 
The Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud TechnologyThe Real Year of 5G: What it Means For Cloud Technology
The Real Year of 5G: What it Means For Cloud Technology
 
10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accounts10 Tips for protecting your cloud accounts
10 Tips for protecting your cloud accounts
 
An Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud StorageAn Architect's Guide to Hybrid Cloud Storage
An Architect's Guide to Hybrid Cloud Storage
 
Cloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power usersCloud storage tips: Pro advice for power users
Cloud storage tips: Pro advice for power users
 
How to Optimize Cloud Storage Costs
How to Optimize Cloud Storage CostsHow to Optimize Cloud Storage Costs
How to Optimize Cloud Storage Costs
 
Cloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 PriorityCloud Computing Trends in 2021: Optimization is #1 Priority
Cloud Computing Trends in 2021: Optimization is #1 Priority
 
Cloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analyticsCloud computing is the inventible future of data analytics
Cloud computing is the inventible future of data analytics
 
What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?What does the future hold for cloud and edge computing?
What does the future hold for cloud and edge computing?
 
How cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile appsHow cloud-based AI is set transform mobile apps
How cloud-based AI is set transform mobile apps
 
This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...This cutting-edge cloud-computing service is helping researchers track COVID'...
This cutting-edge cloud-computing service is helping researchers track COVID'...
 
This cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% offThis cloud computing certification bundle is on sale for 98% off
This cloud computing certification bundle is on sale for 98% off
 
What does the future with cloud computing look like
What does the future with cloud computing look likeWhat does the future with cloud computing look like
What does the future with cloud computing look like
 
The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021The Dos and Don'ts for SMB Cybersecurity in 2021
The Dos and Don'ts for SMB Cybersecurity in 2021
 
These are the top cybersecurity challenges of 2021
These are the top  cybersecurity challenges of 2021These are the top  cybersecurity challenges of 2021
These are the top cybersecurity challenges of 2021
 
What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?What's in store for cybersecurity in 2021?
What's in store for cybersecurity in 2021?
 
5 cybersecurity predictions for 2021
5 cybersecurity predictions for 20215 cybersecurity predictions for 2021
5 cybersecurity predictions for 2021
 
How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021How To Level Up Your Cybersecurity In 2021
How To Level Up Your Cybersecurity In 2021
 
The growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurityThe growing role of AI anf ML in cybersecurity
The growing role of AI anf ML in cybersecurity
 
Top cloud computing tips of 2020
Top cloud computing tips of 2020Top cloud computing tips of 2020
Top cloud computing tips of 2020
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Why Integrating Network Technology & Security Makes Sense Now

  • 1. Enterprise & Cloud Why Integrating Network Technology & Security Makes Sense Now EDITORS' PICK | 1,937 views | Mar 5, 2020, 10:07am EST Louis Columbus Senior Contributor GETTY Bottom Line: Identities are the new security perimeter, making the integration of network technologies and security essential for any organization.
  • 2. The cybersecurity industry has seen many smart, connected, next- generation products come on the market recently, along with the service that support them at the recent RSA Conference. In order for those products and services to succeed, the organizations creating them need t create tighter integration between network technology and security. Employees, suppliers, service teams and, most importantly, customers, all need anytime, anywhere access to cloud applications, platforms and services, all in real-time. Add to that sky-high customer expectations for network speed and low latency, and enterprises begin to see the perfect conditions to forge a new approach to network technology and security. Demystifying Cybersecurity Networks In 2020 Gartner, the world’s leading research and advisory company, has observed a new trend of converging network services and cybersecurity technology. That trend has become so prevalent that in the last year, the Gartner coined the name Secure Access Service Edge (SASE) to describe it. According to Gartner, “the secure access service edge is as an emerging offering combining comprehensive WAN capabilities with comprehensive network security functions (such as SWG, CASB, FWaaS and ZTNA) to support the dynamic secure access needs of digital enterprises,” that is delivered primarily as a cloud-based service in their recent research report, Gartner The Future of Network Security Is In The Cloud (Gartner subscription required) by Neil MacDonald, Lawrence Orans, and Joe Skorupa published the 30 of August, 2019. You can see graphic illustrating the convergence of these two services below: th
  • 3. GARTNER THE FUTURE OF NETWORK SECURITY IS IN THE CLOUD (GARTNER SUBSCRIPTION REQUIRED) BY NEIL MACDONALD, LAWRENCE ORANS, AND JOE SKORUPA PUBLISHED THE 30TH OF AUGUST, 2019. Executives identified the following factors that are accelerating SASE evaluation and adoption across enterprises today: The best digital business models adapt and flex in real- time to customer requirements, unrestrained by branch office locations. SASE’s design is responsive to the rise of highly-distributed enterprises, and the strain they place on on- premises systems. With SASE, a sales representative completing a deal using their smartphone in a coffee shop has the same application availability and security as one located in headquarters. SASE is designed to flex and treat every identity as
  • 4. new security perimeter. I believe this is why Gartner included Zer Trust Network Access (ZTNA) in the framework. ZTNA protects the proliferating number of endpoints across a growing digital business. Devices, not data centers, need to drive cybersecurity strategies today. A large driver in the development of SASE is the recognition that data centers don’t need to be the hub of their networks anymore; in fact, relying on data centers constricts the ability of any organization to stay adaptable. Smarter networks ar using devices, identified by machine learning algorithms that analyze their usage patterns, as the building blocks of network security. Building a business case for any new digital product or service requires IT, security and real-time reporting to b integrated. Considering how connected, contextually intelligent and always-on customers expect current and next-generation products to be, integrating networks and security is an essential part of building a compelling business case. It’s become table stakes for the future development of new products. Today In: Enterprise & Cloud Defining the SASE Identity-Centric Architecture Given the business case for SASE and its foundational role for the next generation of smart, connected products and contextually intelligent services, the components that comprise the framework need to be
  • 5. explored. Since its introduction last year, dozens of vendors have claimed that they are already fully SASE compliant, many without understanding the framework in depth. In my opinion, the key components of the SASE Identity-Centric Architecture include: Cloud-native microservices architecture capable of handling policy-based contexts for users, devices and applications. A true SASE architecture will be able to scale and support identities and credentials, treating them as the new security perimeter for an organization. The architecture will also be able to provide real-time risk and trust assessments, role definition, location, time and device profile data that is analyzed i real-time using machine learning algorithms to evaluate and quantify risk. Above all, the microservices architecture needs to b constructed so that API-based cloud-to-cloud integration is possible with minimal development effort. I believe that Infoblox, a leading network services provider, has led the way in this regard having invested in the cloud-native BloxOne platform for containerized microservices over the course of the past several years. Define identities as security perimeters and keep them in context relative to resource requests including real-time cloud application access. This is one of the true tests of any claim of SASE compliance, as it requires real-time orchestration between networks and network security components. When a vendor can properly accomplish this, the network can enable anyone, anywhere to have the same access privileges, security,
  • 6. application and resource access as a colleague located in an office in headquarters. SD-WAN integration that is adaptive enough to enable remote locations leas-privilege access based on ZTNA while providing real-time system availability. Integral to the SASE Identity-Centric Architecture, SD-WAN is essential for the framework to deliver the many benefits it’s designed for. Real-time network activity monitoring combined with Zero Trust Network Access (ZTNA) access privilege rights to the role level. While Gartner lists ZTNA as one of many components in its Network security-as-a-service, I believe i is essential to treating identity as the new security perimeter. ZTNA makes it possible for every device, location, and session to have full access to all application and network resources and for a true Zero trust-based approach of granting least-privileged access to work. Vendors claiming to have a true SASE architecture need to have this for the entire strategy to work. The ability to combine data from all elements in the SAS architecture and identify sensitive data, then adapt ZTNA least privilege access to the role level. Another excellent test to see if a vendor has a true SASE architecture is whether the data generated can be used to fine-tune least privilege access. This reflects how well data policies interpret and act on the quality of security data. Understanding sensitive data in cloud-based applications, databases and platforms requires APIs that inspect
  • 7. data and can classify and analyze it to continually fine-tune the architectures’ resiliency. Conclusion With the majority of work occurring outside of organizations today, the SASE Identity-Centric Architecture is timely in its design, specifically in the areas of integrating network technology and security. The future of digital business is being built on the foundation of smart, connected, contextually intelligent products and real-time services that enhance and add value to customer experiences. The disconnect between IT and security needs to be fixed so existing new digital business models can flourish and grow. Follow me on Twitter or LinkedIn. Check out my website. Louis Columbus I am currently serving as Principal, IQMS, part of Dassault Systèmes. Previous positions include product management at Ingram Cloud, product marketing at iBASEt, Plex… Read More Site Feedback Tips Corrections Reprints & Permissions Terms Priva © 2020 Forbes Media LLC. All Rights Reserved. AdChoic ADVERTISEMENT Follow