<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/ngfw/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #NGFW</title><description>Cloud 9 Advisers - News #NGFW</description><link>https://www.cloud9advisers.com/News/tag/ngfw</link><lastBuildDate>Sat, 28 Feb 2026 13:45:44 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[SD-WAN and SASE]]></title><link>https://www.cloud9advisers.com/News/post/sd-wan-and-sase</link><description><![CDATA[SDWAN optimizes your network. SASE secures your edge. We demystify the two fastest-growing acronyms in networking, clarify their distinct benefits for single and multi-location companies, and explain the components that create a truly unified SASE platform.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1jXyK-BxSzyrWaKP8RqrUA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iT5zEM8tTIydTEbJVk5i1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gS4hskNZS06uKMpuP2R1QQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5E1mk1d-aq_UX3M_nNC1YA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>SDWAN &amp; SASE: The Essential Guide to Converging Connectivity and Cloud Security</span></h1></div>
<div data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><div><span><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></span></div><div><span><span><br/></span></span></div><div><span><span><span><span>Cloud-first operations demand a new network model. Understanding the roles of Software-Defined Wide Area Networking (SDWAN) and Secure Access Service Edge (SASE) is the first step toward building a truly resilient and secure edge.</span></span><br/></span></span></div><div><span><span><span><span><br/></span></span></span></span></div><div><span><span><span><span><span><span>SASE and SDWAN represent the necessary convergence of security (the perimeter) and networking (the pathway) in the age of cloud and hybrid work.</span></span><br/></span></span></span></span></div></div></div>
</div><div data-element-id="elm_jkUNxYuneitwIK_sewBFAg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"> [data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WblXvipEFTmJ2j7HnywXfw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WblXvipEFTmJ2j7HnywXfw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;"></span></p><div><h2><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></h2><p><span>For many IT leaders, the networking and security landscape over the past few years has felt like an endless alphabet soup. Two acronyms, in particular, have dominated strategic conversations: </span><strong>SDWAN</strong><span> and </span><strong>SASE</strong><span>.</span></p><p><span><br/></span></p><p><span>Both are frequently discussed in the context of modernization, cloud migration, and supporting the hybrid workforce. This has led to widespread confusion, with many vendors incorrectly presenting them as competing solutions, or worse, claiming that one automatically includes the other without proper implementation.</span></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we act as pragmatic, expert advisers to help you cut through this noise. Simply put: </span><strong>SDWAN optimizes the network; SASE secures the edge.</strong><span> They are not competing technologies, but essential components that, when unified correctly, form the foundation of a modern, secure, and resilient network.</span></p><p><span>Understanding their individual roles is the first step to making the right strategic investment.</span></p><h3><span><br/></span></h3><h3><span>Part 1: Demystifying SDWAN (Software-Defined Wide Area Network)</span></h3><p><span>SDWAN is fundamentally a revolutionary approach to Wide Area Networking (WAN). Traditionally, WANs relied on complex hardware—specific routers, expensive leased lines (like MPLS), and manual configurations—to connect separate locations.</span></p><p><span><br/></span></p><p><span>SDWAN separates the control plane (the intelligence of the network) from the data plane (the physical connections). By shifting control to software, it gains two critical advantages: </span><strong>intelligence</strong><span> and </span><strong>flexibility</strong><span>.</span></p><p><span><br/></span></p><p><span>The SDWAN appliance at each location becomes application-aware, meaning it knows the difference between a voice packet, an email, or a large file download. This intelligence is then used to optimize traffic flow in real time across any combination of underlying links (fiber, broadband, 4G/5G, etc.).</span></p><h4><span><br/></span></h4><h4><span>The Pragmatic Benefits of SDWAN</span></h4><p><span>While SDWAN was originally designed to connect </span><strong>multiple locations</strong><span> effectively, it offers distinct and significant benefits even for </span><strong>companies with a single location</strong><span>:<br/><br/></span></p><table><tbody><tr><th style="width:13.516%;"><p><span style="font-weight:bold;">Audience</span></p></th><th style="width:25.137%;"><p><span>Primary Problem Solved</span></p></th><th style="width:59.5205%;"><p><span>Core SDWAN Benefit</span></p></th></tr><tr><td style="width:13.516%;"><p><strong>Single Location</strong></p></td><td style="width:25.137%;" class="zp-selected-cell"><p><span>Internet instability, QoS issues for real-time apps, reliance on expensive single circuits.</span></p></td><td style="width:59.5205%;"><p><strong>Reliability &amp; Efficiency:</strong><span> It aggregates multiple, low-cost internet links into a unified connection. It uses that power to ensure mission-critical applications (like UCaaS or a cloud ERP system) always have the bandwidth they need, while less critical traffic is given lower priority. It provides a more robust, stable connection than any single circuit ever could.</span></p></td></tr><tr><td style="width:13.516%;"><p><strong>Multiple Locations</strong></p></td><td style="width:25.137%;"><p><span>High cost of traditional WAN (MPLS), complex management, and traffic backhauling for security.</span></p></td><td style="width:59.5205%;"><p><strong>Virtual Network &amp; Cost Reduction:</strong><span> This is the original design intent. It creates a seamless, virtual network that spans multiple physical locations, making management centralized and simple. Critically, it allows companies to swap expensive MPLS with low-cost broadband, reducing ongoing network costs while improving agility and allowing for dynamic, automated routing around outages or congestion.</span></p></td></tr></tbody></table><p><span><br/></span></p><p><span>SDWAN’s value is in </span><strong>resilience</strong><span> and </span><strong>performance</strong><span>. It is the key to providing the high-quality, low-latency connectivity required for the sensitive, real-time applications we discussed in our last article on Call Survivability.</span></p><h3><span><br/></span></h3><h3><span>Part 2: Demystifying SASE (Secure Access Service Edge)</span></h3><p><span>If SDWAN is the intelligent highway, then </span><strong>SASE (Secure Access Service Edge)</strong><span> is the integrated, cloud-native security perimeter applied to that highway's entrance and exit ramps.</span></p><p><span><br/></span></p><p><span>SASE is an architectural framework, not a single product. It was introduced to address the reality that the traditional network perimeter—the firewall in your server room—is obsolete. Users now access corporate data from home, coffee shops, and client sites using personal devices, reaching applications hosted in multiple clouds.</span></p><p><span><br/></span></p><p><span>The goal of SASE is simple: </span><strong>Secure and reliable access to corporate resources from any location, without sacrificing user experience or performance.</strong></p><p><span><br/></span></p><p><span>A comprehensive, robust SASE solution is built upon the convergence of several key security and networking components, all delivered via a single, cloud-based platform. If a vendor is missing even one of these components, they are selling a partial, non-SASE solution.</span></p><h4><span><br/></span></h4><h4><span>The Five Essential Components of a True SASE Platform</span></h4><p><span>A good SASE solution brings together the following technologies into a unified stack:</span></p><ol><li><p><strong>Secure Web Gateway (SWG):</strong><span> Provides secure, cloud-based internet access. It acts as the first line of defense, blocking malicious websites, filtering URLs, and applying advanced malware detection before traffic even reaches the user’s device or the corporate network.</span></p></li><li><p><strong>Cloud Access Security Broker (CASB):</strong><span> The CASB provides critical visibility and control over cloud applications (SaaS). It monitors user activity within apps like Microsoft 365, Salesforce, and Dropbox, enforces security policies, and prevents data leakage by encrypting sensitive data both in transit and at rest.</span></p></li><li><p><strong>Firewall-as-a-Service (FWaaS):</strong><span> This replaces the traditional physical, on-premise firewall. FWaaS is a cloud-native security layer that controls access to corporate resources and blocks unauthorized traffic, applying consistent security policies to users regardless of their location.</span></p></li><li><p><strong>Zero Trust Network Access (ZTNA):</strong><span> This is the modern replacement for traditional VPNs. ZTNA is critical because it never grants blanket access to the entire network. Instead, it operates on a principle of &quot;never trust, always verify,&quot; granting users access only to the specific applications they need, only after identity verification, and only from a compliant device. This hides corporate resources from the public internet entirely.</span></p></li><li><p><strong>Identity and Access Management (IAM):</strong><span> An integral part of the Zero Trust model. IAM provides the centralized control over user identities, authentication (often multi-factor, or MFA), and authorization. It is the engine that validates who a user is and what they are allowed to access, enforcing policy consistently across the entire SASE stack.</span></p></li></ol><p><span><br/></span></p><p><span>And finally, the often-misunderstood component:</span></p><ul><li><p><strong>Software-Defined Wide Area Networking (SDWAN):</strong><span> A true SASE architecture </span><strong>includes</strong><span> SDWAN functionality. The networking side of SASE is responsible for optimizing the transport layer—selecting the best path for traffic based on business requirements and dynamically routing it across various links (broadband, 5G, private connections). It ensures the high-performance delivery of traffic to and from the secure SASE cloud edge.</span></p></li></ul><h3><span><br/></span></h3><h3><span>SDWAN + SASE: The Convergence Strategy</span></h3><p><span>The modern B2B enterprise is defined by dispersed data, dispersed users, and dispersed applications. The only way to manage this complexity effectively is through convergence.</span></p><p><span><br/></span></p><p><span>The strategic relationship can be summarized simply:</span></p><ul><li><p><strong>SDWAN is the foundation of high-performance connectivity.</strong><span> It delivers the path optimization, quality of service (QoS), and resilience (call survivability) that your business demands.</span></p></li><li><p><strong>SASE is the strategic security framework.</strong><span> It delivers the identity-centric access control (ZTNA), threat prevention (SWG, FWaaS), and data protection (CASB) that your business requires, regardless of where the user is located.</span></p></li></ul><p><span><br/></span></p><p><span>By consolidating these functions into a unified, cloud-based platform—the core tenet of SASE—businesses gain:</span></p><ol><li><p><strong>Simplified Management:</strong><span> Moving from managing six different boxes (router, firewall, VPN concentrator, web filter, etc.) to managing one policy stack in the cloud.</span></p></li><li><p><strong>Consistent Security:</strong><span> Every user, no matter where they are or how they connect, gets the exact same security inspection and policy enforcement.</span></p></li><li><p><strong>Cost Efficiency:</strong><span> Reducing hardware footprints and maintenance costs, leveraging lower-cost internet links, and consolidating vendor contracts.</span></p></li><li><p><strong>Agility:</strong><span> The network scales instantly to accommodate mergers, acquisitions, or sudden shifts to remote work, without needing to deploy physical hardware.</span></p></li></ol><h3><span><br/></span></h3><h3><span>Simplifying the Strategic Choice</span></h3><p><span>The choice between SDWAN and SASE is a false one; the correct answer is a converged solution.</span></p><p><span><br/></span></p><p><span>However, the vendor landscape is complex, with providers offering partial solutions that may excel at the &quot;SDWAN&quot; part but provide poor, bolt-on security, or vice versa. The strategic challenge is identifying the partner that can deliver a </span><strong>truly unified SASE platform</strong><span>—one where the networking and security components are built to work together seamlessly, eliminating gaps and preserving performance.</span></p><p><span><br/></span></p><p><span>Don’t get stuck in the alphabet soup of acronyms. Focus on the required outcomes: </span><strong>resilient performance and secure access from anywhere.</strong></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we help technology leaders sift through the noise, evaluate the true integration level of SASE vendors, and select the platform that meets the specific demands of their single or multi-location business model.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div>
</div></div><div data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sase" target="_blank"><span class="zpbutton-content">Learn more about SASE</span></a></div>
</div><div data-element-id="elm_FxB8pAckLtzq7zPAwodPLg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_FxB8pAckLtzq7zPAwodPLg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan" target="_blank"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div><div data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" title="The 'Real' SDWAN Test:" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div><div data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_oF0HDA0tROSZN17dhE2uvg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_oF0HDA0tROSZN17dhE2uvg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-left zpbutton-align-tablet-left"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 15 Jun 2023 09:40:58 -0500</pubDate></item><item><title><![CDATA[Case Study: Nonprofit]]></title><link>https://www.cloud9advisers.com/News/post/case-study-nonprofit</link><description><![CDATA[Cloud 9 was able to introduce the customer to four top service providers that were able to provide and manage all the internet circuits, even though they we from several different carriers, a far superior security stack with the SASE platform, and fully manage and support the entire solution.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_mq5D7izSTpiBt3P6s4ljOA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_RiDP_m8vT3aUtFluU_UwKQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7Z_CpCTMSFKAoSdJ4PAlLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KcDZiPaYT6q4ALvClxvxVw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KcDZiPaYT6q4ALvClxvxVw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Nonprofit needed unstoppable Internet and Security</span></h1></div>
<div data-element-id="elm_I-GtGN3va5DaYPdDpoPfwg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_I-GtGN3va5DaYPdDpoPfwg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1527192491265-7e15c55b1ed2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDc1fHxvZmZpY2V8ZW58MHx8fHwxNjE3MzIzODQ3&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" size="original" alt="Nonprofit office expansion needed strong security and bulletproof internet. Cloud 9 saved the day!" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Gp5uJp01Sq2rLEXupA1Sdg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Gp5uJp01Sq2rLEXupA1Sdg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_gdWqQPTcZi-XxAibycg2tA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_gdWqQPTcZi-XxAibycg2tA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Rc3x_ZAmoERyE1dl5yQylg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rc3x_ZAmoERyE1dl5yQylg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:15px;">A long-time Nonprofit client of Cloud 9 Advisers was looking for a budget-conscious solution to improve connectivity as they added new locations across the country and to correct problematic reoccurring outages and “brownouts” they’d been having with their high-speed broadband cable provider. With a handful of critical applications and a lean IT staff, they needed a solution that would streamline their network management and generally improve security. While they had your typical set of security solutions, it was aging and they found themselves managing more than they’d like and didn’t have the staff or the skillset to manage a complex security solution. While they hadn’t had any security incidents, they decided up-to-date services made sense but didn’t want to spend any more than they had in the past. A new and modern managed security solution would be a “nice-to-have” if it fit the budget.</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-weight:bold;font-size:15px;">Dual Bandwidth connections</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">With their two current locations and two more coming on board along the East Coast, they wanted to ensure each site had solid, reliable internet connectivity especially considering their recent experiences. They’d been pushing more apps to the cloud, especially communications and collaboration tools so a high-quality connection was important at each site, but they wanted to avoid the higher costs of Direct Internet Access (DIA) Fiber circuits, if possible. Plus they still had a few highly proprietary database servers running at their headquarters in the Washington, DC area with off-site cloud backups.&nbsp;</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">They got lucky at the original two locations, their two largest, and the winning provider was able to find both broadband cable <span style="font-style:italic;">and broadband <span style="font-weight:bold;">fiber</span></span>. The two new locations were going to be smaller satellite locations, so broadband cable and a cheap strong secondary connection were chosen. One site had cable and DSL, the other site had cable and a 4G LTE mobile data-only device.&nbsp;</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-weight:bold;font-size:15px;">Secure Access Service Edge (SASE)</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">Cloud 9 vendor-neutral engineers realized that dual bandwidth connected to a solid SD-WAN solution would address the customer connectivity requirements by providing rock-solid, bulletproof connectivity (to the point were even if a connection dropped during a VoIP call, the call would stay active) and be able to fully control video and call quality. We also want to address their security &quot;nice-to-haves&quot; as well.&nbsp;</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">A real and proper SDWAN solution is arguably the best option for any video and VoIP communication apps, and considerably improved VPN performance.</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">The customer-selected winning provider included a Secure Access Service Edge (SASE, pronounced sassy)&nbsp; platform that combined all the benefits of a top SD-WAN, plus was able to replace the customer’s entire security stack and even endpoint protection agents. SASE improves security, boosts network performance, and reduces the number of vendors and devices businesses and IT have to deal with. The winning provider's SASE (security) solution had five key ingredients: SDWAN, Zero-Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Next-Gen Firewall (NGFW), and Secure Web Gateway (SWG) for devices--and all cloud-based.</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><blockquote style="margin-left:40px;border:none;"><div><span style="font-size:15px;">As an added and unforeseen bonus especially during the pandemic shutdowns, the SASE solution was able to allow all end-users and devices to authenticate and gain secure access to all the resources both cloud and on-premise, that they are authorized to reach protected by security, located close to them. Once authenticated, the end-users had direct access to those resources, rather than having to be routed to a central location via traditional firewall and VPN. This dramatically reduced latency issues for all users working from home.&nbsp;</span></div></blockquote><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="color:inherit;font-size:15px;"><p style="margin-bottom:8pt;">As the Cloud 9 engineering team dug deeper into solutions options the project ballooned and the customer realized they would be able to cover far more than they had originally expected.&nbsp;</p><p style="margin-bottom:8pt;">Cloud 9 was able to present and introduce the customer to four top service providers that were able to provide and manage all the internet circuits, even though they we from several different carriers, a far superior security stack with the SASE platform, and fully manage and support&nbsp; the entire solution. All things considered there was only a minor increase in the total new solution price compared to what the customer was previously spending. However, even better, the customer had originally planned on a 35% increase due to the fact that they knew they wanted dual connections, assumed DIA fiber would be required, and had planned on replacing some of their original security appliances and software. The customer was absolutely thrilled with the entire experience.</p></span></div></div>
</div></div><div data-element-id="elm_ITNOG8te8_xLdDm8YV_LXw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ITNOG8te8_xLdDm8YV_LXw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_ixgWQsXDhpzM7CFY181hrQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ixgWQsXDhpzM7CFY181hrQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_I8gER0OcvBuIyWrarfltwQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_I8gER0OcvBuIyWrarfltwQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all%20200x103.png" data-src="/C9-Logo1.t-all%20200x103.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Cloud 9 Advisers helps business leaders make IT buying decisions quickly and confidently. Whether you need impartial advice on the best new tech, or assistance with a project outside your wheelhouse, we have expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. We work with you to identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own.</span><br></p></div>
</div></div></div><div data-element-id="elm_HdZzg6dsRiKIWKq2Y7JM7A" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Apr 2021 19:47:36 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Nitel]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-Nitel</link><description><![CDATA[With technology becoming mission-critical, IT teams are struggling to keep up with the adoption and innovation of the latest security best practices, leaving their assets vulnerable to cybercriminals. Cloud 9 can help.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_D-Nz53vkQxquWyV5fg7jdQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MgtG_ZrcS2mNS7npggHEOA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BdizElknRkuISnouLpCG9A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_QJOCT7dRQDmslE7NejpYyQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QJOCT7dRQDmslE7NejpYyQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Nitel: Managed Next-Generation Security</span></h1></div>
<div data-element-id="elm_4TKuqEeUkwPg9RaWb_7pFA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_4TKuqEeUkwPg9RaWb_7pFA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/NITEL_Managed_Security_Testing.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_OHp_iLmqR6u-XaQx78xgeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OHp_iLmqR6u-XaQx78xgeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By: Nitel USA, see the article here&nbsp;<a href="https://www.nitelusa.com/blog/explore-4-levels-of-security-testing/">https://www.nitelusa.com/blog/explore-4-levels-of-security-testing/</a></span></p></div>
</div><div data-element-id="elm_fciiwuYY6NKxhDk31yORrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fciiwuYY6NKxhDk31yORrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Supplier Spotlight:&nbsp; <a href="https://www.nitelusa.com/" title="NITEL" target="_blank">NITEL</a></p></div>
</div><div data-element-id="elm_W4TKPMCMz1lTSPGcbsDXdw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_W4TKPMCMz1lTSPGcbsDXdw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/ISP%20Nitel2.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_N294fkf-kdgYXGrWEEeODg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_N294fkf-kdgYXGrWEEeODg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Explore Four Levels of Security Testing</h2></div>
<div data-element-id="elm_FSt4bfxFQiqFOuoB2Fqz1w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FSt4bfxFQiqFOuoB2Fqz1w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>With cloud, big data and mobile solutions becoming mission-critical to organizations of all sizes, IT teams are struggling to keep up with the adoption and innovation of the latest security best practices, leaving their organizations vulnerable to cybercriminals. And it’s not just large organizations cybercriminals are targeting; smaller companies are just as likely to be attacked. They tend to be easier targets, more likely to pay up in the case of a ransomware attack. They can also serve as a back door into other third-party organizations they do business with.</div><p><br></p><div><div>Although managed security is an investment, many organizations simply cannot afford to not conduct on-going security testing. According to a recent <a href="https://www.trustwave.com/en-us/" title="Trustwave security report," target="_blank">Trustwave security report,</a> 41% of those surveyed feared financial damage to their company in the event of a cyberattack or data breach.</div></div><p><br></p><div>Managed security testing is defined as subscription-based proactive scanning and testing of environment security to identify vulnerabilities. However, a comprehensive managed security solution does more than identify vulnerabilities and weak points.</div><p><br></p><div>When working with a qualified managed security provider an organization should not only gain insight into weaknesses, but gain a blueprint on how to prioritize, mitigate and remediate these risks. When your customer engages with a provider of managed security services like Nitel, backed by a cybersecurity Gartner Magic Quadrant Leader Trustwave, they can choose to engage with four levels of testing depending on their budget and business needs, including:</div><ul><ul><li><span style="font-weight:bold;">Basic threat</span> – Simulates the most common attacks executed in the wild today. This class of attacker typically uses freely-available, automated attack tools.</li><li><span style="font-weight:bold;">Opportunistic threat</span> – Builds upon the basic threat and simulates an opportunistic attack executed by a skilled attacker that does not spend an extensive amount of time executing highly sophisticated attacks. This type of attacker seeks easy targets (”low-hanging fruit”) and will use a mix of automated tools and manual exploitation to penetrate their targets.</li><li><span style="font-weight:bold;">Targeted threat</span> – Simulates a targeted attack executed by a skilled, patient attacker that has targeted a specific organization. This class of attacker will expend significant resources and effort trying to compromise an organization’s systems.</li><li><span style="font-weight:bold;">Advanced threat</span> – Simulates an advanced attack executed by a highly motivated, well-funded and extremely sophisticated attacker who will exhaust all options for compromise before relenting.</li></ul></ul><div>Cloud 9 Advisers clientele benefit from Nitel/Trustwave’s crowd-sourced, global threat intelligence through a solution that is scoped to fit their needs. Nitel's intrinsic network knowledge, combined with Trustwave’s highly skilled SpiderLab ethical hacker team, can quickly identify security weak points and guide you to a solution to protect your organization.</div></div>
</div><div data-element-id="elm_rRZDbyeva5vy63rqVWFVGw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rRZDbyeva5vy63rqVWFVGw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Managed Next-Gen Security Solutions</h2></div>
<div data-element-id="elm_e-8WVdP5N1Rd5BRWbLahzA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_e-8WVdP5N1Rd5BRWbLahzA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">What keps business and IT leaders up at night?</span></div><div>For business leaders everywhere, a data breach is on par with the most damaging things that could happen to an organization. The thought of being the next company to make headlines keeps leaders up at night while IT organizations fight to keep the bad guys out. As threats become increasingly widespread, sophisticated and dangerous, companies look to develop security strategies that protect their environment while staying within budgets that seem to get tighter every year.</div><div><br></div><div><span style="color:inherit;"><div>Your business is unique, with its own set of needs and priorities. That’s why we offer a suite of security solutions that offers multiple&nbsp;<span style="color:inherit;">ways for you to protect your business. Whether your business is big or small, whether you value distributed architecture or centralized,&nbsp;</span><span style="color:inherit;">you’ll find a solution that fits how you prefer to manage your environment.</span></div></span></div></div>
</div><div data-element-id="elm_kOm3EHvRU5lyVCF4U-B-RQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_kOm3EHvRU5lyVCF4U-B-RQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_44Ols88sMN6a-H9zszeCIQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_44Ols88sMN6a-H9zszeCIQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zvFUBuG0Ue5WxILuDG0FbA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zvFUBuG0Ue5WxILuDG0FbA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;"><span style="color:inherit;">ENTERPRISE GRADE PROTECTION</span><br></span></p><div><ul><li>Safely enable applications, users and content by classifying all traffic, determining the business use case, and assigning policies to allow and protect access to relevant applications.</li><li>Prevent threats by eliminating unwanted applications to reduce your threat footprint and apply targeted security policies to block known vulnerability exploits, viruses, spyware, botnets and unknown malware (APTs).</li><li>Protect your datacenters through the validation of applications, isolation of data, control over rogue applications and high-speed threat prevention.</li><li>Secure public and private cloud computing environments with increased visibility and control; deploy, enforce and maintain security policies at the same pace as your virtual machines.</li><li>Embrace safe mobile computing by extending the enterprise security platform to users and devices no matter where they are located.</li></ul></div></div>
</div></div><div data-element-id="elm_TAMU5VgF_kAjGqSw-FDDMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TAMU5VgF_kAjGqSw-FDDMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XMii76EEv6YXr4DApouFPg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XMii76EEv6YXr4DApouFPg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">ROCK SOLID PROTECTION FOR SMB</span><br></p><p><span style="color:inherit;">Our customized solutions deliver next-generation security for&nbsp;</span><span style="color:inherit;">every size and type of business. Gain full control and visibility&nbsp;</span><span style="color:inherit;">of application traffic passing through your network, even for&nbsp;</span><span style="color:inherit;">encrypted traffic, thanks to application detection, user-identity&nbsp;</span><span style="color:inherit;">awareness, SSL interception and built-in live reporting.</span></p><span style="color:inherit;"><br><div>You benefit from the same critical next-generation security&nbsp;<span style="color:inherit;">features that large enterprises receive—but sized appropriately&nbsp;</span><span style="color:inherit;">for your business. Your business will fend off threats with&nbsp;</span><span style="color:inherit;">included next-gen features that take place directly in the data&nbsp;</span><span style="color:inherit;">path, including:</span></div><div><ul><li>Firewalling</li><li>Intrusion Detection and Prevention (IDS/IPS)</li><li>URL Filtering</li><li>Dual Antivirus</li><li>Application Control</li></ul></div></span></div>
</div></div></div><div data-element-id="elm_xwzKvYLFv0iSWD7rAZLmvw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_xwzKvYLFv0iSWD7rAZLmvw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_aGCdmMTLWT3uXnRRpprJlw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_aGCdmMTLWT3uXnRRpprJlw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TIbXzuGwNIZyyPUKlto0Lg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TIbXzuGwNIZyyPUKlto0Lg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">SECURITY EXPERTISE ON YOUR SIDE</span></div><p>Nitel has partnered with Gartner Magic Quadrant leader Trustwave to complement our managed next-generation firewall service with a suite of security management services. This 1–2 punch creates a comprehensive managed security solution to reduce your business risk and give you peace of mind. With Nitel overseeing your network health, performance and security, you have a single partner working on your behalf to ensure your business operates optimally and safely.<br></p></div>
</div><div data-element-id="elm_wRDB5vkfWpYhvgolP2hiSw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_wRDB5vkfWpYhvgolP2hiSw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_A7Uxs0wzwOd4JppuM_pZaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_A7Uxs0wzwOd4JppuM_pZaw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kxjJly2NUqDKphGl7CZTBA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kxjJly2NUqDKphGl7CZTBA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">SECURITY INFORMATIONEVENT MANAGEMENT</span></div><p>Achieve more effective identification and mitigation of security threats. You’ll reduce your burden with around-the-clock support from 10 global security operations centers staffed with experts who have in-depth knowledge and experience working with complex network environments for highly distributed organizations.<br></p><p><span style="color:inherit;"><br></span></p><div>Our SIEM service collects, analyzes and stores logs from networks, hosts and critical applications. It extends visibility beyond the network perimeter to the application layer, helping you achieve more effective identification and mitigation of security threats, and compliance validation with numerous regulatory and industry standards.</div><p><span style="color:inherit;"><br></span></p><div>Advantages:</div><ul><li>SpiderLabs security research utilizing global event data to identify current and emerging threats</li><li>Industry-leading compliance expertise</li><li>Solutions tailored to the specific needs of healthcare, financial, retail and more<br></li><li>Collects and reviews over 1 billion events per day</li></ul></div>
</div></div><div data-element-id="elm_4nbA8yZAxfLB0YgoXHocQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4nbA8yZAxfLB0YgoXHocQg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DKxP6AjJ4qFTW-15oUjJWA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DKxP6AjJ4qFTW-15oUjJWA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;color:rgb(48, 4, 234);">Need to maintain compliance with PCI, DDS, HIPAA, SOX, FISMA, GLBA/FFIEC? </span><span style="color:inherit;">Let Nitel help. We’ll help you fulfill your requirements for vulnerability scanning, penetration testing and ongoing evaluation of your environments and applications.</span><br></p></div>
</div><div data-element-id="elm_vaHmouTnwhGdwxTmTqfr2w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vaHmouTnwhGdwxTmTqfr2w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">MANAGED SECURITY TESTING</span></div><p>Reveal potential vulnerabilities in your environment with thorough penetration testing. Expert “ethical hackers,” armed with the same techniques as today’s cybercriminals, attempt to hack into your network or application to help you identify network-connected assets, learn how those assets are vulnerable to attack and understand what could happen if those assets were compromised.</p></div>
</div></div></div></div></div><div data-element-id="elm_HiJDjLcbTgWolupM1WT0sQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HiJDjLcbTgWolupM1WT0sQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_8e96XAy6BCk6Ady-wpVTqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8e96XAy6BCk6Ady-wpVTqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Contact Cloud 9 Advisers for expert guidance and help with any compliance, risk management, monitoring, edge security and any other cybersecurity issues. We'll guide you to the right vendors, like Nitel, from our <a href="/suppliers" title="Supplier Portfolio">Supplier Portfolio</a>.&nbsp;</p></div>
</div><div data-element-id="elm_whExP12qqr410n4GYwgVlQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_whExP12qqr410n4GYwgVlQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_4415zG0x20XtZyYAYT5sJg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_4415zG0x20XtZyYAYT5sJg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:11pt;">Your Agent.&nbsp; Your Advocate. Your Adviser.</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;font-weight:bold;">Because it’s all about you.&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;">Cloud 9 Advisers will save you time during the often exhausting process of finding, evaluating, and selecting new technologies and competitive providers. We become an extension of your team and help manage the entire bidding and procurement process. We will save you money by using the buying power of thousands of other clients through our curated Supplier Portfolio, and finding the right companies from our portfolio to bid on your requirements. We provide you clarity by distilling all the information from each bidder, and clear the clutter so you can make the right decision on the best solution and provider. Cloud 9 gives you confidence throughout the decision-making process by continually evaluating the bidders and negotiating the best price and terms, so you can focus on what you do best.&nbsp;</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:bold;">Technology Partners. Strategic Advisers.</span></p><p><span style="color:inherit;font-weight:bold;"></span></p><div><span style="font-size:11pt;font-weight:700;"><br></span></div></div>
</div></div><div data-element-id="elm_uv3x5ayeZhugascf41xYsQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_uv3x5ayeZhugascf41xYsQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 04 Feb 2020 12:06:38 -0500</pubDate></item><item><title><![CDATA[SASE, the next-gen SD-WAN?]]></title><link>https://www.cloud9advisers.com/News/post/Is-SASE-the-next-gen-SDWAN</link><description><![CDATA[Gartner claims SASE will make legacy networking obsolete. This is not hyperbole. We cut through the marketing noise to define the four non-negotiable requirements of a true SASE architecture and why identity, not the IP address, is the new network anchor.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_aVn03PLjTPC2C0--suORlg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oY8K_nMGQwKzWiHm9mR4mA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YJlc6Aw3R--ufTdeEYFGlA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><div><span>The Four Pillars of SASE: Why Your Legacy Network Architecture is Obsolete</span></div></span></h1></div>
<div data-element-id="elm_I1dOk7MZXI2b2D5bRFjL6g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:center;"><span>Gartner makes the claim that the shift to SASE will make obsolete existing networking and security models.</span><br/></p><p style="text-align:left;"><span><br/></span></p><p style="text-align:left;"><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter<br/></span></p><p style="text-align:left;"><span>A true SASE framework moves security policy from the physical office location to the user’s identity, fundamentally transforming how enterprises connect and protect their digital assets.</span></p></div><p></p></div>
</div><div data-element-id="elm_0RjKUZh11XaAKusROPkYlw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"] .zpimagetext-container figure img { width: 1024px !important ; height: 576px !important ; } } [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/infosecmonitoring.jpeg" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><span><span>The SASE architecture is a fundamental shift, moving the security perimeter from a physical location to a cloud-native, identity-centric service edge.</span></span></div>
</div></div><div data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_ziZwRssE0coI-arTeb4D0Q" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ziZwRssE0coI-arTeb4D0Q"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div></div><div><h2><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter</span></h2><p><span>In 2019, Gartner introduced the Secure Access Service Edge (SASE) model, describing it as a fundamental architectural shift that would eventually render existing networking and security models obsolete. While many in the industry initially treated it as hype, the events of the last few years—namely, the explosion of cloud application usage and the permanence of the dispersed, mobile workforce—have made this prediction an undeniable reality.</span></p><p><span><br/></span></p><p><span>Today, every enterprise is facing unprecedented pressure on its legacy network and security architecture. Users, applications, and data have migrated from the confines of the corporate network to the cloud and the edge. This digital transformation improves agility and competitiveness, but it requires a corresponding evolution in how we connect and, more importantly, how we secure those connections.</span></p><p><span><br/></span></p><p><span>The SASE category represents this necessary evolution. It converges the capabilities of the WAN edge (networking) with network security (security) into a single, unified, cloud-native service. However, the market is crowded with vendors claiming SASE capabilities, when, in reality, they are offering little more than traditional products loosely &quot;service-chained&quot; together.</span></p><p><span><br/></span></p><p><span>To cut through this noise and ensure you are making a strategic, future-proof investment, you must evaluate solutions against the </span><strong>four non-negotiable pillars</strong><span> of a true SASE architecture.</span></p><h3><span><br/></span></h3><h3><span>The Problem: When SDWAN Alone Is Not Enough</span></h3><p><span>SDWAN is a critical part of the modern network, solving performance, resilience, and efficiency problems. But as valuable as it is, it is only </span><em>one part</em><span> of the larger SASE story.</span></p><p><span><br/></span></p><p><span>The traditional approach to security—regardless of whether you use SDWAN—was to </span><strong>backhaul</strong><span> all traffic from remote users and branch offices back to a central, on-premise security stack. This approach is fatally flawed today:</span></p><ol><li><p><strong>High Latency:</strong><span> For users accessing cloud applications like Microsoft 365, forcing traffic halfway across the country just to hit a corporate firewall and then turn back to the cloud introduces unacceptable latency and degrades performance.</span></p></li><li><p><strong>Inconsistent Security:</strong><span> Creating a patchwork of appliances (VPN concentrators, firewalls, web gateways) and physically stringing them together via &quot;service chaining&quot; results in fragmented visibility, inconsistent policy enforcement, and complex management. As Gartner noted, service chaining is emphatically </span><strong>not</strong><span> SASE.</span></p></li><li><p><strong>The IP Address Conundrum:</strong><span> Legacy security is tied to a network anchor, typically the IP address of a device or location. In a world where the office can be a coffee shop, an airport, or a home network, an IP address is useless as a hook for security enforcement.</span></p></li></ol><p><span>To overcome these structural limitations, the architecture must evolve beyond the old data center and embrace the cloud-native design principles of SASE.</span></p><h3><span><br/></span></h3><h3><span>Pillar I: Converged WAN Edge and Network Security</span></h3><p><span>A true SASE architecture is defined by convergence. It cannot be a collection of disparate appliances or services loosely managed by different dashboards.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> The WAN edge (SDWAN functionality, traffic optimization, and routing) and the comprehensive network security stack (Firewall-as-a-Service, Secure Web Gateway, CASB, ZTNA) must be folded into a single, cloud-native software fabric.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> This convergence delivers the simplicity, scalability, and pervasive security that customers demand. By operating as a single software stack, the platform can perform </span><strong>single-pass architecture</strong><span> inspection, where traffic is decrypted, inspected against all security and networking policies simultaneously, and then re-encrypted. This greatly reduces processing time and latency compared to chaining separate security devices, ensuring high performance while maintaining security coverage.</span></p><p><span><br/></span></p><p><span>In essence, SASE mandates that networking and security cannot be two separate domains managed by different tools; they must be a single, centrally controlled entity.</span></p><h3><span><br/></span></h3><h3><span>Pillar II: Cloud-Native, Global Service Delivery</span></h3><p><span>The nature of cloud applications—specifically, their sensitivity to latency—demands that networking and security be delivered as close to the endpoint as possible. The edge is the new cloud, and it requires a distributed approach.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE offerings must be purpose-built for </span><strong>scale-out, cloud-native, and cloud-based delivery</strong><span>. This means relying on a vast, globally distributed network of Points of Presence (PoPs) to minimize the physical distance between the user and the security enforcement point.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> The geographical footprint is critical. It is not sufficient to simply run the service on a hyper-scaler with a limited number of PoPs, as this still forces users in remote regions to connect over long distances. A true SASE solution requires providers with a deep, global footprint and the agility to instantiate a PoP in response to emerging customer demands. This optimized, low-latency delivery ensures that security inspection does not negatively impact the performance of real-time applications.</span></p><h3><span><br/></span></h3><h3><span>Pillar III: A Network Designed for All Edges</span></h3><p><span>The traditional network focused almost exclusively on the site (the branch office or the headquarters). The modern enterprise must focus on securing </span><strong>all edges</strong><span> equally—the site, the cloud, and the individual mobile user.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE services must be capable of connecting and securing more than just physical sites. This requires an agent-based capability, managed as a cloud service, that can be installed on laptops and mobile devices to extend the full security stack to the individual user, regardless of their connecting network.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> Offerings that rely solely on on-premises, box-oriented delivery or only cater to a limited number of fixed cloud PoPs will inevitably fail to meet the requirements of an increasingly mobile workforce and emerging latency-sensitive edge applications. A genuine SASE architecture ensures that an employee working from a home office or a client site receives the same level of security and performance optimization as if they were sitting in the corporate headquarters.</span></p><h3><span><br/></span></h3><h3><span>Pillar IV: Identity and Real-Time Condition</span></h3><p><span>This is arguably the most revolutionary pillar of SASE, representing the complete departure from the legacy model.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> Security access and policy enforcement must be based on the </span><strong>user's identity</strong><span> and their real-time context (device type, time of day, location, and posture of the device), not the static IP address.</span></p><p><strong><br/></strong></p><p><strong>The IP Address Conundrum:</strong><span> Anything tied to a physical IP address is useless for security policy enforcement when users and resources are constantly moving. The legacy data center is no longer the center of the network universe. The new center of secure access networking design is the </span><strong>Identity</strong><span>—with the policy following that identity wherever they go.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> SASE allows IT leaders to customize the security level and network experience based on risk. For example:</span></p><ul><li><p><span>A user accessing a critical financial application from a corporate laptop in the office receives </span><strong>full access</strong><span>.</span></p></li><li><p><span>The same user attempting to access that application from an unmanaged personal device (different identity/condition) from a foreign country receives </span><strong>restricted, or zero, access</strong><span>.</span></p></li></ul><p><span>All policies are tied to the user's validated identity (which can be a person, a device, or an IoT entity), eliminating the vulnerability inherent in IP-based enforcement and fully embodying the principles of </span><strong>Zero Trust Network Access (ZTNA)</strong><span>.</span></p><h3><span><br/></span></h3><h3><span>A Pragmatic Call to Action</span></h3><p><span>The introduction of SASE is not marketing buzz; it is a true reflection of our times. The technologies have changed considerably, forcing a profound rethinking of legacy enterprise networks.</span></p><p><span><br/></span></p><p><span>As this market category matures, the marketing noise will continue to grow. Your responsibility as a technology leader is to move past the vendor claims and evaluate potential solutions against these four non-negotiable architectural pillars. If the solution cannot prove a </span><strong>cloud-native, globally converged architecture</strong><span> where policy is tied to </span><strong>identity</strong><span>, it will not deliver the simplicity, scale, or security your business needs to thrive in the cloud-first era.</span></p><p><strong><br/></strong></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div></div>
</div></div><div data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/sase"><span class="zpbutton-content">Learn about &quot;Sassy&quot;</span></a></div>
</div><div data-element-id="elm_sNE3REWav7IN4moRylK3kA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_CM4zod7TxypCvspafJfz9w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div><div data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 15 Oct 2019 12:47:06 -0500</pubDate></item></channel></rss>