Best Practices for Protecting the Network Edge Include SASE
shifting to this model of edge/perimeter protection:
- Require SASE vendors to provide evidence of third-party testing of SD-WAN capabilities and security capabilities, and require network security vendors to show you their SASE roadmap.
- SASE should be positioned as a digital business enabler that provides greater speed and agility.
- Security staff will need to deliver policy-based security services, not just manage “security boxes.”
- Engage now with network architects to plan for SASE.
- Architect solutions so that inspection engines move to the user session, not the other way around.
- If possible, reduce network security complexity by shifting to one vendor for secure web gateway (SWG), cloud access security broker (CASB), DNS, zero-trust network access (ZTNA) and remote browser isolation capabilities.
SASE adoption is still low, but Gartner predicts that by 2024, at least 40% of companies will have SASE strategies in place. And while many MSPs may not be working with their customers to deploy SASE, it is important to remember that many customers are adopting cloud apps and services at an unprecedented rate. (Q2 2020 cloud services spending was 30% higher than Q2 2019, per research from Canalys.)
As companies of all sizes continue on their digital transformation journeys, there will be opportunities for MSPs to look among their customer bases to determine who has the need for these types of networking and security solutions offered as a cloud-based service–and then to fulfill those needs using a new and unique approach made possible by SASE.
Chris Crellin is Senior Director of Product Management for Barracuda MSP, a provider of security and data protection solutions for managed services providers, where he is responsible for leading product strategy and management.
This guest blog is part of a Channel Futures sponsorship.
- Page 1
- Page 2