<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/ztna/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #ZTNA</title><description>Cloud 9 Advisers - News #ZTNA</description><link>https://www.cloud9advisers.com/News/tag/ztna</link><lastBuildDate>Sat, 28 Feb 2026 13:47:26 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Case Study: Nonprofit]]></title><link>https://www.cloud9advisers.com/News/post/case-study-nonprofit</link><description><![CDATA[Cloud 9 was able to introduce the customer to four top service providers that were able to provide and manage all the internet circuits, even though they we from several different carriers, a far superior security stack with the SASE platform, and fully manage and support the entire solution.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_mq5D7izSTpiBt3P6s4ljOA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_RiDP_m8vT3aUtFluU_UwKQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7Z_CpCTMSFKAoSdJ4PAlLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KcDZiPaYT6q4ALvClxvxVw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KcDZiPaYT6q4ALvClxvxVw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Nonprofit needed unstoppable Internet and Security</span></h1></div>
<div data-element-id="elm_I-GtGN3va5DaYPdDpoPfwg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_I-GtGN3va5DaYPdDpoPfwg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1527192491265-7e15c55b1ed2?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=Mnw0NTc5N3wwfDF8c2VhcmNofDc1fHxvZmZpY2V8ZW58MHx8fHwxNjE3MzIzODQ3&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080" size="original" alt="Nonprofit office expansion needed strong security and bulletproof internet. Cloud 9 saved the day!" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Gp5uJp01Sq2rLEXupA1Sdg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Gp5uJp01Sq2rLEXupA1Sdg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_gdWqQPTcZi-XxAibycg2tA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_gdWqQPTcZi-XxAibycg2tA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_Rc3x_ZAmoERyE1dl5yQylg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rc3x_ZAmoERyE1dl5yQylg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:15px;">A long-time Nonprofit client of Cloud 9 Advisers was looking for a budget-conscious solution to improve connectivity as they added new locations across the country and to correct problematic reoccurring outages and “brownouts” they’d been having with their high-speed broadband cable provider. With a handful of critical applications and a lean IT staff, they needed a solution that would streamline their network management and generally improve security. While they had your typical set of security solutions, it was aging and they found themselves managing more than they’d like and didn’t have the staff or the skillset to manage a complex security solution. While they hadn’t had any security incidents, they decided up-to-date services made sense but didn’t want to spend any more than they had in the past. A new and modern managed security solution would be a “nice-to-have” if it fit the budget.</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-weight:bold;font-size:15px;">Dual Bandwidth connections</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">With their two current locations and two more coming on board along the East Coast, they wanted to ensure each site had solid, reliable internet connectivity especially considering their recent experiences. They’d been pushing more apps to the cloud, especially communications and collaboration tools so a high-quality connection was important at each site, but they wanted to avoid the higher costs of Direct Internet Access (DIA) Fiber circuits, if possible. Plus they still had a few highly proprietary database servers running at their headquarters in the Washington, DC area with off-site cloud backups.&nbsp;</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">They got lucky at the original two locations, their two largest, and the winning provider was able to find both broadband cable <span style="font-style:italic;">and broadband <span style="font-weight:bold;">fiber</span></span>. The two new locations were going to be smaller satellite locations, so broadband cable and a cheap strong secondary connection were chosen. One site had cable and DSL, the other site had cable and a 4G LTE mobile data-only device.&nbsp;</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-weight:bold;font-size:15px;">Secure Access Service Edge (SASE)</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">Cloud 9 vendor-neutral engineers realized that dual bandwidth connected to a solid SD-WAN solution would address the customer connectivity requirements by providing rock-solid, bulletproof connectivity (to the point were even if a connection dropped during a VoIP call, the call would stay active) and be able to fully control video and call quality. We also want to address their security &quot;nice-to-haves&quot; as well.&nbsp;</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">A real and proper SDWAN solution is arguably the best option for any video and VoIP communication apps, and considerably improved VPN performance.</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="font-size:15px;">The customer-selected winning provider included a Secure Access Service Edge (SASE, pronounced sassy)&nbsp; platform that combined all the benefits of a top SD-WAN, plus was able to replace the customer’s entire security stack and even endpoint protection agents. SASE improves security, boosts network performance, and reduces the number of vendors and devices businesses and IT have to deal with. The winning provider's SASE (security) solution had five key ingredients: SDWAN, Zero-Trust Network Access (ZTNA), Cloud Access Security Broker (CASB), Next-Gen Firewall (NGFW), and Secure Web Gateway (SWG) for devices--and all cloud-based.</span></div><p><span style="color:inherit;font-size:15px;"><br></span></p><blockquote style="margin-left:40px;border:none;"><div><span style="font-size:15px;">As an added and unforeseen bonus especially during the pandemic shutdowns, the SASE solution was able to allow all end-users and devices to authenticate and gain secure access to all the resources both cloud and on-premise, that they are authorized to reach protected by security, located close to them. Once authenticated, the end-users had direct access to those resources, rather than having to be routed to a central location via traditional firewall and VPN. This dramatically reduced latency issues for all users working from home.&nbsp;</span></div></blockquote><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="color:inherit;font-size:15px;"><p style="margin-bottom:8pt;">As the Cloud 9 engineering team dug deeper into solutions options the project ballooned and the customer realized they would be able to cover far more than they had originally expected.&nbsp;</p><p style="margin-bottom:8pt;">Cloud 9 was able to present and introduce the customer to four top service providers that were able to provide and manage all the internet circuits, even though they we from several different carriers, a far superior security stack with the SASE platform, and fully manage and support&nbsp; the entire solution. All things considered there was only a minor increase in the total new solution price compared to what the customer was previously spending. However, even better, the customer had originally planned on a 35% increase due to the fact that they knew they wanted dual connections, assumed DIA fiber would be required, and had planned on replacing some of their original security appliances and software. The customer was absolutely thrilled with the entire experience.</p></span></div></div>
</div></div><div data-element-id="elm_ITNOG8te8_xLdDm8YV_LXw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ITNOG8te8_xLdDm8YV_LXw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_ixgWQsXDhpzM7CFY181hrQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ixgWQsXDhpzM7CFY181hrQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_I8gER0OcvBuIyWrarfltwQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_I8gER0OcvBuIyWrarfltwQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all%20200x103.png" data-src="/C9-Logo1.t-all%20200x103.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Cloud 9 Advisers helps business leaders make IT buying decisions quickly and confidently. Whether you need impartial advice on the best new tech, or assistance with a project outside your wheelhouse, we have expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. We work with you to identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own.</span><br></p></div>
</div></div></div><div data-element-id="elm_HdZzg6dsRiKIWKq2Y7JM7A" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 01 Apr 2021 19:47:36 -0500</pubDate></item><item><title><![CDATA[Never Trust and Always Verify]]></title><link>https://www.cloud9advisers.com/News/post/never-trust-and-always-verify</link><description><![CDATA[Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TAHtRM7MTwyz93DQF4vulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EK0C27GDQIeK-T7DwhG40g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1wDa-H2ITMKidvNyBIDVAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Zero Trust Picking up Steam in the Enterprise</h2></div>
<div data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/ZeroTrustSecurity.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_3MYoUag1of7CYIZHqfMTrA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_3MYoUag1of7CYIZHqfMTrA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_KX-DnESpwPeszGZSn0xybQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KX-DnESpwPeszGZSn0xybQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gmq_CGqL3txZQszRpkTkTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gmq_CGqL3txZQszRpkTkTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something. </p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">&quot;The traditional perimeter-based security model is dead. It has been overtaken by an era of cloud, mobility, and BYOD that requires a new approach to network access control.&quot;</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">The Zero Trust Network Access (ZTNA) model is a new method of access control that considers all network connections untrusted. This is a shift from the traditional concept of an inside/outside network where only some connections were considered trusted. The ZTNA model requires organizations to consider all traffic as potential threats, which means security controls must be in place at every stage of the attack lifecycle and beyond the firewall layer into your environment.</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">Never Trust and Always Verify</span>&nbsp;is the general premise behind Zero Trust Network Access (ZTNA). A strong proponent for the replacement of traditional remote access like Virtual Private Networking (VPN), where a secure tunnel straight into the corporate network is created and anything that goes through that tunnel is presumed &quot;safe&quot; and &quot;trusted&quot;. There are a number of &quot;faith-based&quot; assumptions that take place when using&nbsp; VPN. One big one being the remote device creating the tunnel is <span style="font-style:italic;">still</span>&nbsp;a trusted device. ZTNA takes a different approach: nothing is trusted and everything must be verified. This might seem laborious, but the user experience is minimally affected and security benefits are significant.</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">ZTNA is starting to turn heads with IT for its protection of applications, data, and networks, easier control, and innate simplicity allowing access to remote staff, suppliers, and contractors. Some providers offer client and clientless versions for far greater flexibility and no need to constantly update Active Directory just to let a supplier in for two hours worth of work. And even provided secure access to users' personal devices without the typically required &quot;big brother'&quot;intrusions.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">The real power of ZTNA comes when its combined with the power of a Secure Access Service Edge (SASE) solution. These two put together forms a full security barrier and flexible perimeter thoroughly protecting endpoints and users.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">Using disparate/separate SASE and ZTNA platforms can certainly be done, but should only be done so by the most adept and experience security professionals. The management interface and integration of these separated systems is highly complex. Many solutions exist&nbsp; that combine both SASE and ZTNA together with a single management interface. Some providers also offer a completely managed solutions as well.&nbsp;</p><p style="font-size:16px;"><br></p><p><span style="color:inherit;"></span></p><p style="font-size:16px;">Regardless there is a lot to consider. Contact us and we'll get you in contact with a Strategic Tech Expert to wal you through all of the options and find out who the best vendors are for your business</p></div>
</div></div><div data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_iS6O_iNXLx1VEelRIBau9w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_iS6O_iNXLx1VEelRIBau9w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all.png" data-src="/C9-Logo1.t-all.png" size="medium" data-lightbox="true" style="height:140px;width:271.85px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help decision-makers buy great technology. We work with you to rationalize and reduce technology spending without sacrificing the technology itself and employ sound digital transformation principles and strategies.</div><p><span style="color:inherit;"><br></span></p><div>We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We diagnose problems, prescribe solutions, and facilitate decisions.</div><p><span style="color:inherit;"><br></span></p><div>We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. We’ll help you make confident decisions quickly.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>To learn more contact us today and book an appointment.</div><p><span style="color:inherit;"><br></span></p><div><br></div></div>
</div></div></div><div data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 16 Mar 2021 17:11:26 -0500</pubDate></item><item><title><![CDATA[New WFH Workforce protections]]></title><link>https://www.cloud9advisers.com/News/post/new-wfh-workforce-protections</link><description><![CDATA[There may be some light at the end of this pandemic tunnel… Remote work has evolved into a permanent fixture and must be included in long-term planning. This introduces more risks around access as employees connect in new ways.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gOkdvbyBQHmEWjHApA_8Yg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yKOJH6bdT4Kih8kIJe9BNg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cu0WdtFoSMmdkIG_5G0nZg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_76bglzXFREWUAAmjFAUoPw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_76bglzXFREWUAAmjFAUoPw"].zpelem-heading { border-radius:1px; margin-inline-end:100px; margin-inline-start:100px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Tech and </span>Techniques<span style="color:inherit;">&nbsp;to Protect the New WFH Workforce</span></h1></div>
<div data-element-id="elm_gcpkrgEkLQamaqvEWaQIKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gcpkrgEkLQamaqvEWaQIKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Even if the pandemic ends tomorrow, everything has changed. It’s time to revisit, rethink, and revise. A look at a few technologies to better secure systems, data, and a permanent home-based/hybrid workforce.</span><br></p></div>
</div><div data-element-id="elm__Pb-ylLvJSD-xb-PJzIf3w" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm__Pb-ylLvJSD-xb-PJzIf3w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/WFCS-1.jpeg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_qR7Kf7k6Tu2pp0eKBQIphg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qR7Kf7k6Tu2pp0eKBQIphg"].zpelem-text { border-radius:1px; margin-block-start:22px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Remote work has evolved into a permanent fixture and must be included in long-term planning. This introduces more risks around access as employees connect in new ways.</span><br></p></div>
</div><div data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_umLn4meYqa32K95-tLgY6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_umLn4meYqa32K95-tLgY6g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xzz7Ap_QxTWfrfeJ-b-mkg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xzz7Ap_QxTWfrfeJ-b-mkg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_lXzHN7r4Qcla3nvsYpHnmA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lXzHN7r4Qcla3nvsYpHnmA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:15px;">There may be some light at the end of this pandemic tunnel… oh wait, no. That’s just a guy on a bicycle with a flashlight coming this way to tell us it ain’t over yet. Nevermind.&nbsp; ...but it is clear that many companies will never go back to demanding employees come to the office once this thing is finally over. The thought of not coming back to the office at all has crossed the minds of some owners, founders, and executives, leaving the open question “do we still need to pay all that money for all that space?”</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">We can no longer assume the current environment is temporary and we must start planning and investing accordingly. The systems and tools that once supported the occasional road-warrior workforce and coincidentally served companies so well during the initial season of COVID now need to be revisited, rethought, and revised.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The glorious benefits and ability to work from anywhere has been in the vernacular of tech company sales teams for ages now. I remember, just a few years ago, being required to chant “anytime, anywhere, any device” in every sales meeting I had back when I was pedaling phone systems. Even if it was just for a 50 site gas station franchise.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Once relegated to traveling executives and sales teams, now the anytime, anywhere, any device mantra is the prevailing, and often only, option for many people. But enterprise tech needs to go much further than a decent cloud phone system and a VPN connection if companies want to pivot and make real and lasting changes.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Digital transformation is the promise of fundamentally changing how businesses operate and deliver value to customers by integrating “digital” into all areas of the business. It is no longer a distant pipe dream to keep pushing to the back burner. It is real, it is important, and it is necessary for change. Of the many categories, parts, and tactics to an overall digital transformation strategy, a solid security foundation might be the most important and therefore the best place to start.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Those systems and tools that once served so well in the beginning of the pandemic now need closer inspection. Creating an extended and enhanced secure foundation is critical. One that is nimble and flexible, able to support the “new normal” hybrid/remote workforce, able to provide access to all the company’s workflows, and enhance collaboration for dispersed teams.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The following sections are elements and excerpts from the article “6 top security technologies to protect remote workers” from our friends at <a href="https://www.csoonline.com">www.CSOonline.com</a> and written by Peter Wayner, Contributing Editor. We’ve embellished, elaborated, added, and removed some to fit here better. They illustrate a few basic security tools and technologies to support the new age of full-time and hybrid remote workers.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Multi-factor authentication (MFA)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">One of the first challenges will be identifying the users. The old-fashioned password may be sufficient within the confines of a trusted office but adding a layer of assurance is better. The simplest solution is to require a second level of authentication such as the employees’ mobile phones. Some service providers like 8x8, GoTo, Vonage, Ooma, and RingCentral offer a wide range of communications channels to users including business SMS text messaging.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">More sophisticated solutions use apps running locally on the mobile device that can generate single-use passwords based upon the time. Tools like Google Authenticator, DuoLingo, FreeOTP, and LinOTP store a shared secret when the user first initializes them and then uses this to generate a new password each time the user wants to log in.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">For the hyper-secure, there is increased interest in dedicated hardware tokens that apply all encryption and authentication algorithms inside a special piece of hardware. Tools like the RSA SecurID, Yubikey, or Onlykey aren’t susceptible to attacks that are able to infiltrate the desktop or mobile operating systems. They offer increased security but at the cost of requiring users to juggle one more device.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Identity and access management</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The tools for multi-factor authentication (MFA) need to work closely with enterprise applications, and this is a challenge for in-house developers who will need to adjust the local codebase. Some teams are turning to identity and access management (IAM) services. They are often referred to as Identity as a Service (IDaaS) or authentication as a service (but AaaS is not really a thing)&nbsp; IAM is&nbsp; designed to be easily integrated into any codebase. Software from companies like Auth0 or Okta handles identity and access management with the best algorithms, allowing the in-house developers to concentrate on the business logic.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Auth0, for instance, offers a collection of quick-start examples that let a developer cut and paste a few lines of code and secure everything inside the application. The code from Auth0 adds a login dialog box and then the Auth0 servers check the password and enforce any stronger rules like a requirement for two-factor authentication. If you need to trigger a mobile app or send an SMS, Auth0’s servers do the work. When it is satisfied, it passes control back to your application.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Okta offers a similar set of services and likes to call its approach an “identity engine” for testing anyone who wants access. It rolls together a collection of authentication and management tools into a flexible pipeline that simplifies creating accounts and granting the owners correct access. The steps can be configured to include a variety of options like tracking the user’s specific laptop or phone to reduce the focus on the password alone.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The companies also simplify the work of juggling all the accounts by providing a dashboard for tracking users, adding new accounts and adjusting access roles. The developer can add a sophisticated layer that organizes both identity and authentication with the pre-tested code.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Zero Trust Network Access (ZTNA)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">If you use a virtual private network (VPN), you already know that you must be able to trust the endpoint. Keep in mind that just because the company bought the asset three years ago doesn’t necessarily mean that it is still a trusted endpoint.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">While still widely used, VPN itself leaves much to be desired and is beginning to show its age. Today, VPN is not the best model for a world where there are no clear lines that mark where the office begins and where it ends. Growing in popularity as an alternative, some organizations are adopting a zero-trust model, which assumes that all employees are logging in from a dangerous place like, say, a coffee shop whose WiFi is compromised by an evil hacker collective. ZTNA always assumes that all packets are flowing through enemy territory.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">This wary attitude is not just for bits and bytes traveling over the network. Many inward-facing applications are constructed with the assumption that they will live in a secure network because some firewall or other tool has filtered out dangerous packets. The old paradigm of a strong perimeter made it possible for application developers to ignore security concerns.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Moving to zero trust means shifting attitudes. Todd Thiemann, vice president of marketing at threat intelligence firm HYAS, says, “The perimeter is thoroughly dead. If you are relying on gateway security, you are not watching all the traffic flowing in and out of the work-from-home [and other remote] endpoints.”</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Secure Access Service Edge (SASE)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Another way to rework existing applications for staff on the open internet is to add a special gatekeeper where users and their requests for data will be stopped to check for correct identity and access. One growing architectural model for this kind of smart, pan-enterprise filter is a process that some vendors call “Secure Access Service Edge” or SASE (pronounced “sassy”). This gatekeeper is much smarter than a typical firewall and can deploy stateful filtering by examining the data inside the requests and make intelligent decisions based upon these values. SASE aims to remove the outdated idea of a site-centric network to a more user-centric approach.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">This new layer can be added to protect any of the various cloud and web services including many that might even be hosted outside the company. The user’s computer talks only to the SASE gatekeeper and the other services only answer to requests that have been checked by the SASE gatekeeper.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Solutions from companies like CATO Networks, Cloud Genix (Palo Alto), Open Systems, and others not only combine all the benefits of SDWAN and Next-Gen Firewall technologies but also track users over time and make decisions about access to all services even if they aren’t hosted in the same location or the same cloud.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Software-Defined Perimeter (SDP)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">If it isn’t evident by now, allow me to reiterate. Networks operate far differently than in the past and especially so these days. Considering the dramatic increase in and changing patterns of traffic; both internal and external, the traditional “fixed” perimeter is severely limited. The traditional perimeter usually and simply deemed the internal network as trustworthy and the external network as hostile. Visibility and accessibility were the basis of that traditional approach.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">SDP is an extension of an overall zero-trust methodology and effectively creates a new flexible network perimeter. Rather than a fixed, static perimeter, SDP functionality deploys multiple dynamic perimeters to account for cloud, multi-cloud, hybrid environments, and on-premise and heavily relies on two important things; authentication and authorization. SDP can also be especially useful for the required dynamic access of today’s (and tomorrow’s) mostly permanent remote workforce.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Cloud applications and storage</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Employees’ remote computers can’t become regular storage locations for sensitive documents and data. Employees should not be able to work with sensitive information with unencrypted thumb drives or other hardware and leave the data in locations where thieves could prey upon them. Ransomware continues to be a serious threat for destroying remote data.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Many companies are shifting to web-based office tools like Google Workspace (formerly G Suite) or Microsoft Teams where cloud storage with encryption is available. These platforms are very flexible, perfect for dispersed teams, and relatively easy to deploy to a large workforce, but the security details are still not completely understood. While the major companies employ large security teams, the model of shipping code to people’s browsers is still evolving. Google, for example, suffered an embarrassing leak of private documents. And Microsoft has had its share of awkward moments and outages.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">On the other hand, from a security perspective, these two giants have cleared several strict Federal cloud security programs like FedRAMP and others. FedRAMPs mission is to “promote the adoption of secure cloud services across the Federal Government by providing a standardized approach to security and risk assessment.” Ultra-security conscience agencies and contractors often rely on FedRAMP approved vendors and service providers because of the strict minimum standards required.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">TLS certificates</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">When employees log in remotely, they should use encrypted connections. Make sure websites have updated TLS certificates and the sites use HTTPS for all communications. Installing certificates to enable encrypted web connections couldn’t be easier thanks to the efforts of projects like Let’s Encrypt. Certificates offering more elaborate guarantees like organization are found with other certificate authorities like DigiCert, GeoTrust and Comodo. Many cloud providers and colocation services will resell certificates.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Review assumptions about remote security</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Some of the most important steps are not technical; they’re emotional and personal. “Everybody went home very rapidly and now I think we're in an era where we have to formalize procedures,” says Greg Conti, a co-founder of cybersecurity research firm Kopidlon. “We can’t assume it's temporary, then we need to develop policies for the long haul.&quot;&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">One important premise behind digital transformation is user and customer accessibility. The best foundation for digital transformation is “distributed” security. The best strategy for security is a layered approach. Combining a few, or in some cases all, of the technologies and techniques here may be the right approach for your organization. For example ZTNA and SDP work well together, when done right. In many instances, these technologies can completely replace existing legacy solutions and methodologies. Caution should be taken so that things don’t get unnecessarily complicated and undermine goals and objectives..&nbsp;</span></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Everyone should pause and revisit all decisions made in haste. The pandemic forced everyone to act quickly and in some cases rashly. It’s no longer a matter of holding on until this thing is over. Even if it’s all ends tomorrow it has changed everything and those changes aren’t going away.</span></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span><span style="color:inherit;"></span></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><div></div>
<p></p><p><span style="font-size:15px;"><span style="color:inherit;"></span></span></p></div>
</div></div><div data-element-id="elm_f7K7eJjHlgYw6e-1oTIOEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_f7K7eJjHlgYw6e-1oTIOEg"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_g-T-HgQvSlz8clQaDUusZw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_g-T-HgQvSlz8clQaDUusZw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_HHGclGAVB56BMinShtsYYg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HHGclGAVB56BMinShtsYYg"].zpelem-text { border-radius:1px; margin-inline-end:60px; margin-inline-start:60px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help you buy the right technology solutions and not “get sold” on the wrong ones. We work with you to rationalize and reduce technology spending without sacrificing technology by employing sound digital transformation principles and strategies.</div><div><br></div><div>We do not sell solutions, we help you buy solutions. We are not a vendor, we help you find the right vendors. We facilitate decisions by diagnosing the problems and pains you’re currently facing then prescribing the right procedures and “medication”.&nbsp;</div><div><br></div><div>We are impartial, unbiased, and vendor-neutral experts in Cybersecurity, Communications, Connectivity, and Cloud technologies and solutions. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We will quickly discover, refine, then match your requirements with the vendors’ capabilities; eliminating months of research trying to do it on your own.&nbsp;</div><div><br></div><div>Contact us and book an appointment today to learn more</div></span></div>
</div></div><div data-element-id="elm_4_ArpSxEQo29V4AfwGb_Fw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_4_ArpSxEQo29V4AfwGb_Fw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 12 Feb 2021 12:20:10 -0500</pubDate></item><item><title><![CDATA[SASE, the next-gen SD-WAN?]]></title><link>https://www.cloud9advisers.com/News/post/Is-SASE-the-next-gen-SDWAN</link><description><![CDATA[Gartner claims SASE will make legacy networking obsolete. This is not hyperbole. We cut through the marketing noise to define the four non-negotiable requirements of a true SASE architecture and why identity, not the IP address, is the new network anchor.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_aVn03PLjTPC2C0--suORlg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oY8K_nMGQwKzWiHm9mR4mA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YJlc6Aw3R--ufTdeEYFGlA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><div><span>The Four Pillars of SASE: Why Your Legacy Network Architecture is Obsolete</span></div></span></h1></div>
<div data-element-id="elm_I1dOk7MZXI2b2D5bRFjL6g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:center;"><span>Gartner makes the claim that the shift to SASE will make obsolete existing networking and security models.</span><br/></p><p style="text-align:left;"><span><br/></span></p><p style="text-align:left;"><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter<br/></span></p><p style="text-align:left;"><span>A true SASE framework moves security policy from the physical office location to the user’s identity, fundamentally transforming how enterprises connect and protect their digital assets.</span></p></div><p></p></div>
</div><div data-element-id="elm_0RjKUZh11XaAKusROPkYlw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"] .zpimagetext-container figure img { width: 1024px !important ; height: 576px !important ; } } [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/infosecmonitoring.jpeg" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><span><span>The SASE architecture is a fundamental shift, moving the security perimeter from a physical location to a cloud-native, identity-centric service edge.</span></span></div>
</div></div><div data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_ziZwRssE0coI-arTeb4D0Q" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ziZwRssE0coI-arTeb4D0Q"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div></div><div><h2><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter</span></h2><p><span>In 2019, Gartner introduced the Secure Access Service Edge (SASE) model, describing it as a fundamental architectural shift that would eventually render existing networking and security models obsolete. While many in the industry initially treated it as hype, the events of the last few years—namely, the explosion of cloud application usage and the permanence of the dispersed, mobile workforce—have made this prediction an undeniable reality.</span></p><p><span><br/></span></p><p><span>Today, every enterprise is facing unprecedented pressure on its legacy network and security architecture. Users, applications, and data have migrated from the confines of the corporate network to the cloud and the edge. This digital transformation improves agility and competitiveness, but it requires a corresponding evolution in how we connect and, more importantly, how we secure those connections.</span></p><p><span><br/></span></p><p><span>The SASE category represents this necessary evolution. It converges the capabilities of the WAN edge (networking) with network security (security) into a single, unified, cloud-native service. However, the market is crowded with vendors claiming SASE capabilities, when, in reality, they are offering little more than traditional products loosely &quot;service-chained&quot; together.</span></p><p><span><br/></span></p><p><span>To cut through this noise and ensure you are making a strategic, future-proof investment, you must evaluate solutions against the </span><strong>four non-negotiable pillars</strong><span> of a true SASE architecture.</span></p><h3><span><br/></span></h3><h3><span>The Problem: When SDWAN Alone Is Not Enough</span></h3><p><span>SDWAN is a critical part of the modern network, solving performance, resilience, and efficiency problems. But as valuable as it is, it is only </span><em>one part</em><span> of the larger SASE story.</span></p><p><span><br/></span></p><p><span>The traditional approach to security—regardless of whether you use SDWAN—was to </span><strong>backhaul</strong><span> all traffic from remote users and branch offices back to a central, on-premise security stack. This approach is fatally flawed today:</span></p><ol><li><p><strong>High Latency:</strong><span> For users accessing cloud applications like Microsoft 365, forcing traffic halfway across the country just to hit a corporate firewall and then turn back to the cloud introduces unacceptable latency and degrades performance.</span></p></li><li><p><strong>Inconsistent Security:</strong><span> Creating a patchwork of appliances (VPN concentrators, firewalls, web gateways) and physically stringing them together via &quot;service chaining&quot; results in fragmented visibility, inconsistent policy enforcement, and complex management. As Gartner noted, service chaining is emphatically </span><strong>not</strong><span> SASE.</span></p></li><li><p><strong>The IP Address Conundrum:</strong><span> Legacy security is tied to a network anchor, typically the IP address of a device or location. In a world where the office can be a coffee shop, an airport, or a home network, an IP address is useless as a hook for security enforcement.</span></p></li></ol><p><span>To overcome these structural limitations, the architecture must evolve beyond the old data center and embrace the cloud-native design principles of SASE.</span></p><h3><span><br/></span></h3><h3><span>Pillar I: Converged WAN Edge and Network Security</span></h3><p><span>A true SASE architecture is defined by convergence. It cannot be a collection of disparate appliances or services loosely managed by different dashboards.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> The WAN edge (SDWAN functionality, traffic optimization, and routing) and the comprehensive network security stack (Firewall-as-a-Service, Secure Web Gateway, CASB, ZTNA) must be folded into a single, cloud-native software fabric.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> This convergence delivers the simplicity, scalability, and pervasive security that customers demand. By operating as a single software stack, the platform can perform </span><strong>single-pass architecture</strong><span> inspection, where traffic is decrypted, inspected against all security and networking policies simultaneously, and then re-encrypted. This greatly reduces processing time and latency compared to chaining separate security devices, ensuring high performance while maintaining security coverage.</span></p><p><span><br/></span></p><p><span>In essence, SASE mandates that networking and security cannot be two separate domains managed by different tools; they must be a single, centrally controlled entity.</span></p><h3><span><br/></span></h3><h3><span>Pillar II: Cloud-Native, Global Service Delivery</span></h3><p><span>The nature of cloud applications—specifically, their sensitivity to latency—demands that networking and security be delivered as close to the endpoint as possible. The edge is the new cloud, and it requires a distributed approach.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE offerings must be purpose-built for </span><strong>scale-out, cloud-native, and cloud-based delivery</strong><span>. This means relying on a vast, globally distributed network of Points of Presence (PoPs) to minimize the physical distance between the user and the security enforcement point.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> The geographical footprint is critical. It is not sufficient to simply run the service on a hyper-scaler with a limited number of PoPs, as this still forces users in remote regions to connect over long distances. A true SASE solution requires providers with a deep, global footprint and the agility to instantiate a PoP in response to emerging customer demands. This optimized, low-latency delivery ensures that security inspection does not negatively impact the performance of real-time applications.</span></p><h3><span><br/></span></h3><h3><span>Pillar III: A Network Designed for All Edges</span></h3><p><span>The traditional network focused almost exclusively on the site (the branch office or the headquarters). The modern enterprise must focus on securing </span><strong>all edges</strong><span> equally—the site, the cloud, and the individual mobile user.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE services must be capable of connecting and securing more than just physical sites. This requires an agent-based capability, managed as a cloud service, that can be installed on laptops and mobile devices to extend the full security stack to the individual user, regardless of their connecting network.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> Offerings that rely solely on on-premises, box-oriented delivery or only cater to a limited number of fixed cloud PoPs will inevitably fail to meet the requirements of an increasingly mobile workforce and emerging latency-sensitive edge applications. A genuine SASE architecture ensures that an employee working from a home office or a client site receives the same level of security and performance optimization as if they were sitting in the corporate headquarters.</span></p><h3><span><br/></span></h3><h3><span>Pillar IV: Identity and Real-Time Condition</span></h3><p><span>This is arguably the most revolutionary pillar of SASE, representing the complete departure from the legacy model.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> Security access and policy enforcement must be based on the </span><strong>user's identity</strong><span> and their real-time context (device type, time of day, location, and posture of the device), not the static IP address.</span></p><p><strong><br/></strong></p><p><strong>The IP Address Conundrum:</strong><span> Anything tied to a physical IP address is useless for security policy enforcement when users and resources are constantly moving. The legacy data center is no longer the center of the network universe. The new center of secure access networking design is the </span><strong>Identity</strong><span>—with the policy following that identity wherever they go.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> SASE allows IT leaders to customize the security level and network experience based on risk. For example:</span></p><ul><li><p><span>A user accessing a critical financial application from a corporate laptop in the office receives </span><strong>full access</strong><span>.</span></p></li><li><p><span>The same user attempting to access that application from an unmanaged personal device (different identity/condition) from a foreign country receives </span><strong>restricted, or zero, access</strong><span>.</span></p></li></ul><p><span>All policies are tied to the user's validated identity (which can be a person, a device, or an IoT entity), eliminating the vulnerability inherent in IP-based enforcement and fully embodying the principles of </span><strong>Zero Trust Network Access (ZTNA)</strong><span>.</span></p><h3><span><br/></span></h3><h3><span>A Pragmatic Call to Action</span></h3><p><span>The introduction of SASE is not marketing buzz; it is a true reflection of our times. The technologies have changed considerably, forcing a profound rethinking of legacy enterprise networks.</span></p><p><span><br/></span></p><p><span>As this market category matures, the marketing noise will continue to grow. Your responsibility as a technology leader is to move past the vendor claims and evaluate potential solutions against these four non-negotiable architectural pillars. If the solution cannot prove a </span><strong>cloud-native, globally converged architecture</strong><span> where policy is tied to </span><strong>identity</strong><span>, it will not deliver the simplicity, scale, or security your business needs to thrive in the cloud-first era.</span></p><p><strong><br/></strong></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div></div>
</div></div><div data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/sase"><span class="zpbutton-content">Learn about &quot;Sassy&quot;</span></a></div>
</div><div data-element-id="elm_sNE3REWav7IN4moRylK3kA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_CM4zod7TxypCvspafJfz9w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div><div data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 15 Oct 2019 12:47:06 -0500</pubDate></item></channel></rss>