<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" > <channel> <title>Ramesh Umashanker – iValue India</title> <atom:link href="https://ivaluegroup.com/en-in/author/rameshumashanker/feed/" rel="self" type="application/rss+xml" /> <link>https://ivaluegroup.com/en-in</link> <description>Maximizing Value of Technology Investments</description> <lastBuildDate>Thu, 02 Jun 2022 08:00:49 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod> hourly </sy:updatePeriod> <sy:updateFrequency> 1 </sy:updateFrequency> <generator>https://wordpress.org/?v=6.4.5</generator> <image> <url>https://ivaluegroup.com/en-in/wp-content/uploads/sites/2/2023/01/favicon-256x256-1-36x36.png</url> <title>Ramesh Umashanker – iValue India</title> <link>https://ivaluegroup.com/en-in</link> <width>32</width> <height>32</height> </image> <item> <title>Top 4 cybersecurity trends for APAC companies in 2022</title> <link>https://ivaluegroup.com/en-in/resources/blogs/top-4-cybersecurity-trends-for-apac-companies-in-2022/</link> <dc:creator><![CDATA[Ramesh Umashanker]]></dc:creator> <pubDate>Thu, 02 Jun 2022 08:00:49 +0000</pubDate> <category><![CDATA[Blogs]]></category> <category><![CDATA[Cyber Security]]></category> <guid isPermaLink="false">https://ivaluegroup.com/en-gl/?p=11126</guid> <description><![CDATA[<p>In recent years, the Asia-Pacific (APAC) region has become increasingly attractive to cybercriminals. According to IBM X-Force Threat Intelligence Index 2022, Asia was the most attacked region in 2021, receiving 26 percent of the global attacks. India tops the list of the most attacked country in Asia. Various reports highlight a significant shift in cyberattacks …</p> <p class="read-more"> <a class="" href="https://ivaluegroup.com/en-in/resources/blogs/top-4-cybersecurity-trends-for-apac-companies-in-2022/"> <span class="screen-reader-text">Top 4 cybersecurity trends for APAC companies in 2022</span> Read More »</a></p> <p>The post <a rel="nofollow" href="https://ivaluegroup.com/en-in/resources/blogs/top-4-cybersecurity-trends-for-apac-companies-in-2022/">Top 4 cybersecurity trends for APAC companies in 2022</a> appeared first on <a rel="nofollow" href="https://ivaluegroup.com/en-in">iValue India</a>.</p> ]]></description> <content:encoded><![CDATA[ <div data-elementor-type="wp-post" data-elementor-id="15190" class="elementor elementor-15190" data-elementor-post-type="post"> <section class="elementor-section elementor-top-section elementor-element elementor-element-438685f elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="438685f" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42dc900" data-id="42dc900" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-7402f90 elementor-widget elementor-widget-text-editor" data-id="7402f90" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <style>/*! elementor - v3.20.0 - 26-03-2024 */ .elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}</style> <div class="blog-post-des"><div class="blog-post-detail"><p>In recent years, the Asia-Pacific (APAC) region has become increasingly attractive to cybercriminals. According to <a href="https://www.ibm.com/downloads/cas/ADLMYLAZ" target="_blank" rel="noopener">IBM X-Force Threat Intelligence Index 2022</a>, Asia was the most attacked region in 2021, receiving 26 percent of the global attacks. India tops the list of the most attacked country in Asia.</p><p>Various reports highlight a significant shift in cyberattacks from North America and Europe to Asia. The rise in cyberattacks in APAC is credited to the region’s rapid digitalization coupled with low cybersecurity awareness, training, and regulations. This regional focus marks an emerging opportunity for business leaders in the APAC to consider how they can improve their cybersecurity postures and be aware of the latest cybersecurity trends.</p><p>Here are the top 4 cybersecurity trends for APAC companies in 2022:</p><ol><li><strong>A renewed focus on data privacy and security</strong></li></ol><p>The impact of GDPR laws on data protection has inspired APAC governments to introduce cybersecurity bills on data protection. Bangladesh is well on its path to introducing the first of its kind draft cybersecurity strategy that aims at creating safer cyberspace. While India is inching toward the final approval for its Personal Data Protection (PDP) bill.</p><p>But the biggest impact for companies in APAC is the widespread introduction of mandatory data breach notification laws. For instance, Singapore’s new Cybersecurity Act requires organizations from 11 key industry sectors to report any breach of critical information infrastructures to the Singapore Cyber Security Agency. Under its Personal Data Protection Commission (PDPC), organizations are to notify of any cyber incident within three days of the event. The shift from voluntary to mandatory reporting, in a time-limited setting, would require companies to focus on improving their privacy compliance and security strategies or risk paying hefty fines.</p><p><strong>iValue Recommends:</strong> Set up an incident response team and create a template data breach notification. Your team would be responsible for planning a response to a breach and notifying employees, partners, vendors, regulatory bodies, and other stakeholders.</p><ol><li><strong>Combating Ransomware-as-a-Service</strong></li></ol><p>According to the <a href="https://cpl.thalesgroup.com/about-us/newsroom/2022-data-threat-report-press-release" target="_blank" rel="noopener">2022 Thales Data Threat Report</a>, 1 in 5 businesses have paid or would pay a ransom for their data. Organizations in APAC are attacked <a href="https://blog.checkpoint.com/2021/05/12/the-new-ransomware-threat-triple-extortion/" target="_blank" rel="noopener">51 times per week</a> on average. Indian companies are prime targets for ransomware, with 1 in 4 companies reporting a ransomware attack in 2021. Adding to the alarming statistics are reports that APAC organizations are <a href="https://security.claroty.com/report/global-state-industrial-cybersecurity-survey-2021" target="_blank" rel="noopener">more likely to pay the ransom</a> sometimes as high as $USD 1 million.</p><p>APAC’s vulnerability to ransomware, fuelled by Ransomware-as-a-Service (RaaS), is a push for leaders to devise ransomware defense plans. The aim is to prioritize building cyber resilience by implementing new technologies and providing cybersecurity training to employees.</p><p><strong>iValue recommends:</strong> The biggest element for cyberattacks is human error. Invest in training your staff in best practices of cybersecurity and maintaining basic security hygiene. Have advanced threat hunting solutions in place to weed out trojans (Trickbot, Emotet, Dridex, CobaltStrik) and ransomware infections from your network.</p></div></div> </div> </div> <div class="elementor-element elementor-element-0e2084d elementor-widget elementor-widget-image" data-id="0e2084d" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <style>/*! elementor - v3.20.0 - 26-03-2024 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=".svg"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}</style> <img decoding="async" src="https://ivaluegroup.com/en-gl/wp-content/uploads/2022/06/123.png" title="" alt="" loading="lazy" /> </div> </div> <div class="elementor-element elementor-element-fd71b1f elementor-widget elementor-widget-text-editor" data-id="fd71b1f" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="blog-post-des"><div class="blog-post-detail"><p>Source: Livemint</p><ol><li><strong>Rise in collaborative cybersecurity efforts</strong></li></ol><p>Given that threat actors target companies with multiple locations, there is a need for an increased collaborative effort between governments, companies, vendors to strengthen the cybersecurity landscape. In light of the increasing threats and challenges, many companies and governments are working together to share information and best practices and develop new cybersecurity solutions. Through initiatives such as information sharing platforms and incident response exercises, organizations in the Asia Pacific region are working together to address cyber threats and accelerate public-private partnerships in cybersecurity.</p><p><span style="font-style: inherit; font-weight: inherit; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);">For example, Philippine bankers are learning cybersecurity best practices from the United Kingdom. According to </span><a style="font-style: inherit; font-weight: inherit;" href="https://www.gov.uk/government/news/the-united-kingdom-shares-best-practices-on-cyber-security-with-the-philippines" target="_blank" rel="noopener">FIT Country Director Richard Colley</a><span style="font-style: inherit; font-weight: inherit; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);">, the initiative “aims to help forge relationships and build connections between the UK and the Philippines and work together in addressing cyber security risks.” Meanwhile, Microsoft is on a mission to unite APAC governments and state agencies with the cybersecurity council. The </span><a style="font-style: inherit; font-weight: inherit;" href="https://news.microsoft.com/apac/2021/05/31/microsoft-launches-first-asia-pacific-public-sector-cyber-security-executive-council-across-seven-markets-in-the-region/" target="_blank" rel="noopener">Asia-pacific Public Sector Cyber Security Executive Council</a><span style="font-style: inherit; font-weight: inherit; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);"> is a growing group of government leaders, policymakers, regulators, and industry stakeholders from Singapore, Indonesia, South Korea, Malaysia, Thailand, Brunei, and the Philippines. The council meets every quarter to “maintain a continuous exchange of information on cyber threats and cybersecurity solutions.”</span></p><p><strong style="font-style: inherit; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3);">iValue recommends:</strong><span style="font-style: inherit; background-color: var(--ast-global-color-4); color: var(--ast-global-color-3); font-weight: inherit;"> Look for security management platforms that offer automation at scale, customized threat intelligence, and leverage AI.<br /></span></p><p> </p><ol><li><strong>Cybersecurity education </strong></li></ol><p>A dearth of cybersecurity experts and skillsets is the bane of the cybersecurity industry. Despite reskilling and upskilling efforts, organizations are finding it increasingly difficult to find and retain qualified talent. According to the 2021 World Economic Forum (WEF) report, the APAC region accounts for 66 percent or 2.045 million of the global cybersecurity talent shortage.</p></div></div> </div> </div> <div class="elementor-element elementor-element-ddd133f elementor-widget elementor-widget-image" data-id="ddd133f" data-element_type="widget" data-widget_type="image.default"> <div class="elementor-widget-container"> <img fetchpriority="high" decoding="async" width="1024" height="634" src="https://ivaluegroup.com/en-in/wp-content/uploads/sites/2/2022/06/456-1024x634.jpg" class="attachment-large size-large wp-image-11132" alt="" srcset="https://ivaluegroup.com/en-in/wp-content/uploads/sites/2/2022/06/456-1024x634.jpg 1024w, https://ivaluegroup.com/en-in/wp-content/uploads/sites/2/2022/06/456-300x186.jpg 300w, https://ivaluegroup.com/en-in/wp-content/uploads/sites/2/2022/06/456-768x476.jpg 768w, https://ivaluegroup.com/en-in/wp-content/uploads/sites/2/2022/06/456-24x15.jpg 24w, https://ivaluegroup.com/en-in/wp-content/uploads/sites/2/2022/06/456-36x22.jpg 36w, https://ivaluegroup.com/en-in/wp-content/uploads/sites/2/2022/06/456-48x30.jpg 48w, https://ivaluegroup.com/en-in/wp-content/uploads/sites/2/2022/06/456.jpg 1240w" sizes="(max-width: 1024px) 100vw, 1024px" /> </div> </div> <div class="elementor-element elementor-element-f6bb381 elementor-widget elementor-widget-text-editor" data-id="f6bb381" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <div class="blog-post-des"><div class="blog-post-detail"><p>Source: World Economic Forum (WEF) Report 2021</p><p>To address the cybersecurity workforce gap, organizations, institutions, and governments are working on specialized cybersecurity training programs. For instance, The Asia Pacific University of Technology and Innovation (APU) in Malaysia offers specialized graduate courses in collaboration with industry experts, a state-of-the-art infrastructure learning space (CyberSecurity Talent Zone), a full-fledged Cyber Threats Simulation and Response Center (or Cyber Range), and a Security Operations Center (SOC) with military-grade real-time cybersecurity monitoring systems, research centers, and simulation infrastructure. Whereas, giant tech corporations like <a href="https://newsroom.ibm.com/2022-02-23-New-IBM-Cybersecurity-Hub-to-Help-Asia-Pacific-Organizations-Build-Cyber-Resiliency" target="_blank" rel="noopener">IBM</a> and <a href="https://news.microsoft.com/apac/2021/05/31/microsoft-launches-first-asia-pacific-public-sector-cyber-security-executive-council-across-seven-markets-in-the-region/" target="_blank" rel="noopener">Microsoft</a> are investing in cybersecurity hubs in APAC regions to deliver immersive training programs.</p><p><strong>iValue recommends:</strong> Cybersecurity is a necessity for every company. Organizations must recognize that investing in skilled cybersecurity professionals and building a team is essential for long-term success. Expand your team’s capabilities, skillsets, and geographies by hiring remote workers across the globe</p></div></div> </div> </div> </div> </div> </div> </section> </div> <p>The post <a rel="nofollow" href="https://ivaluegroup.com/en-in/resources/blogs/top-4-cybersecurity-trends-for-apac-companies-in-2022/">Top 4 cybersecurity trends for APAC companies in 2022</a> appeared first on <a rel="nofollow" href="https://ivaluegroup.com/en-in">iValue India</a>.</p> ]]></content:encoded> </item> <item> <title>SASE: The future of Cloud Security</title> <link>https://ivaluegroup.com/en-in/resources/blogs/sase-the-future-of-cloud-security/</link> <dc:creator><![CDATA[Ramesh Umashanker]]></dc:creator> <pubDate>Fri, 25 Mar 2022 19:51:50 +0000</pubDate> <category><![CDATA[Blogs]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Cloud Security]]></category> <category><![CDATA[network security]]></category> <guid isPermaLink="false">https://ivaluegroup.com/en-gl/?p=9297</guid> <description><![CDATA[<p>Over the last year, remote access and cloud computing access solutions saw an uptick in their adoption across global businesses. Driven by distributed workflows and a remote workforce, the enterprise perimeter is no longer limited to a location. As organizations move beyond the conventional network edge, the focus is on securing all endpoints. At the …</p> <p class="read-more"> <a class="" href="https://ivaluegroup.com/en-in/resources/blogs/sase-the-future-of-cloud-security/"> <span class="screen-reader-text">SASE: The future of Cloud Security</span> Read More »</a></p> <p>The post <a rel="nofollow" href="https://ivaluegroup.com/en-in/resources/blogs/sase-the-future-of-cloud-security/">SASE: The future of Cloud Security</a> appeared first on <a rel="nofollow" href="https://ivaluegroup.com/en-in">iValue India</a>.</p> ]]></description> <content:encoded><![CDATA[ <div data-elementor-type="wp-post" data-elementor-id="9297" class="elementor elementor-9297" data-elementor-post-type="post"> <section class="elementor-section elementor-top-section elementor-element elementor-element-7b0e3fe elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="7b0e3fe" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7ed3539" data-id="7ed3539" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-6469f38 elementor-widget elementor-widget-text-editor" data-id="6469f38" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Over the last year, remote access and cloud computing access solutions saw an uptick in their adoption across global businesses. Driven by distributed workflows and a remote workforce, the enterprise perimeter is no longer limited to a location. As organizations move beyond the conventional network edge, the focus is on securing all endpoints. At the beginning of the pandemic, VPNs were quickly deployed for remote access. However, traditional network access modes are inefficient for the dynamic environment.</p><p>Today’s distributed workforce requires low latency network connections across devices locations and resources. As our digital world expands, the network perimeter is no longer tied down to on-premises data centers. The new distributed workforce demands work from anywhere infrastructure. Between edge computing, cloud services, and a remote workforce, our data can no longer be secured by on-premises data center security measures. </p><p>Secure Access Service Edge (SASE) addresses these challenges.</p><p> <strong>What is SASE?</strong></p><p>Introduced by Gartner researchers, SASE (pronounced “sassy”), is an emerging cybersecurity concept replacing the traditional network security architecture. SASE merges software-defined wide area network (SD-WAN) and network security services into a single cloud-delivered service model – streamlining network access and improving security.</p><p>With a single management console, SASE unifies SD-WAN network optimization features with security capabilities such as Zero-trust network architecture (ZTNA), data loss prevention, web filtering, next-generation firewall policies, and threat detection. Four factors define the SASE model:</p><ul><li>User identity</li><li>Session context</li><li>Security and compliance policies</li><li>Risk assessment of every session</li></ul><p> </p><p>According to Gartner, “SASE capabilities are delivered as a service based upon the identity of the entity, real-time context, enterprise security/compliance policies and continuous assessment of risk/trust throughout the sessions. Identities of entities can be associated with people, groups of people (branch offices), devices, applications, services, IoT systems or edge computing locations.”</p><p>As enterprises solidify their plans for permanent work-from-home, SASE provides the ideal environment to create a scalable and secure network architecture. In their report, “The Future of Network Security in the Cloud, Gartner predicts that “by 2024, at least 40% of enterprises will have explicit strategies to adopt SASE, up from less than 1% at year-end 2018.”</p><p>The SASE model is made up of three major components:</p><ul><li> <strong>Global SD-WAN</strong>: Unlike traditional stand-alone WAN, SASE is defined by an integrated SD-WAN that forms the core of the model</li><li><strong>Cloud Architecture</strong>: SASE is a cloud-native solution that combines discrete networking and security devices. The cloud architecture forms the backbone of SASE architecture providing a consolidated security management console</li><li><strong>Zero Trust Network Access</strong>: SASE services are identity-driven. ZTNA is integral to SASE architecture. It helps defend against potential threats with real-time verification of every user, device, and application. Other network security components include cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure web gateways (SWG) </li></ul><p><strong>SASE Benefits</strong></p><ul><li> <strong>Enhanced network security</strong>: The Zero Trust Network combined with SASE’s framework on data protection policies ensure all-round security of your sensitive data</li><li><strong>Cost savings</strong>: SASE reduces IT infrastructure down to a single platform or security stack. Organizations save costs by avoiding investments in multiple products and services</li><li><strong>Provide advanced threat prevention</strong>: the flexible cloud-based platform aids in threat prevention with its integrated content inspection model. Organizations benefit by gaining better network visibility and insights</li><li><strong>Improve performance</strong>: SASE simplifies IT infrastructure that is easy to access by resources irrespective of their location, type of application, and connectivity speed</li></ul><p> <strong>Are we there yet?</strong></p><p>Despite the hype, SASE is still in its infancy. Currently, Gartner lists only a handful of vendors that provide the complete gamut of SASE features. In the long run, SASE is supposed to reduce network security. However, the road to simplifying infrastructure, reducing WAN products, and finally consolidating the features onto the cloud is an arduous exercise that many enterprises shy away from. The other challenge enterprises would face is in breaking down the silos between network teams and security teams. Bringing the two together would require a cultural change that combines the organization’s people, skillsets, and technology.</p><p>But the situation isn’t dire. With the rapid increase in connected devices and the digital workforce, SASE’s concept of network security is here to stay. The digital business world is pushing for larger partnerships of network and security vendors. </p><p><strong>How can iValue help?</strong></p><p>SASE is an amalgamation of network and security products. Currently, the approach demands the involvement of multiple providers (software and hardware) that is cumbersome to manage. iValue helps enterprises by streamlining their technology needs with a range of network and security products. We provide the right mix of domain expertise and niche technology providers to help businesses across their digital transformation journey.</p> </div> </div> </div> </div> </div> </section> </div> <p>The post <a rel="nofollow" href="https://ivaluegroup.com/en-in/resources/blogs/sase-the-future-of-cloud-security/">SASE: The future of Cloud Security</a> appeared first on <a rel="nofollow" href="https://ivaluegroup.com/en-in">iValue India</a>.</p> ]]></content:encoded> </item> <item> <title>SASE: THE FUTURE OF CLOUD SECURITY</title> <link>https://ivaluegroup.com/en-in/resources/blogs/sase-the-future-of-cloud-security-2/</link> <dc:creator><![CDATA[Ramesh Umashanker]]></dc:creator> <pubDate>Fri, 25 Mar 2022 05:49:31 +0000</pubDate> <category><![CDATA[Blogs]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Cloud Security]]></category> <category><![CDATA[network security]]></category> <category><![CDATA[SASE]]></category> <guid isPermaLink="false">https://ivaluegroup.com/en-gl/blog/2022/03/25/sase-the-future-of-cloud-security-2/</guid> <description><![CDATA[<p>Over the last year, remote access and cloud computing access solutions saw an uptick in their adoption across global businesses. Driven by distributed workflows and a remote workforce, the enterprise perimeter is no longer limited to a location. As organizations move beyond the conventional network edge, the focus is on securing all endpoints. At the …</p> <p class="read-more"> <a class="" href="https://ivaluegroup.com/en-in/resources/blogs/sase-the-future-of-cloud-security-2/"> <span class="screen-reader-text">SASE: THE FUTURE OF CLOUD SECURITY</span> Read More »</a></p> <p>The post <a rel="nofollow" href="https://ivaluegroup.com/en-in/resources/blogs/sase-the-future-of-cloud-security-2/">SASE: THE FUTURE OF CLOUD SECURITY</a> appeared first on <a rel="nofollow" href="https://ivaluegroup.com/en-in">iValue India</a>.</p> ]]></description> <content:encoded><![CDATA[ <div data-elementor-type="wp-post" data-elementor-id="9095" class="elementor elementor-9095" data-elementor-post-type="post"> <section class="elementor-section elementor-top-section elementor-element elementor-element-b54a1c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="b54a1c9" data-element_type="section"> <div class="elementor-container elementor-column-gap-default"> <div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2ff2b69" data-id="2ff2b69" data-element_type="column"> <div class="elementor-widget-wrap elementor-element-populated"> <div class="elementor-element elementor-element-313bf9fa elementor-widget elementor-widget-text-editor" data-id="313bf9fa" data-element_type="widget" data-widget_type="text-editor.default"> <div class="elementor-widget-container"> <p>Over the last year, remote access and cloud computing access solutions saw an uptick in their adoption across global businesses. Driven by distributed workflows and a remote workforce, the enterprise perimeter is no longer limited to a location. As organizations move beyond the conventional network edge, the focus is on securing all endpoints. At the beginning of the pandemic, VPNs were quickly deployed for remote access. However, traditional network access modes are inefficient for the dynamic environment.</p><p>Today’s distributed workforce requires low latency network connections across devices locations and resources. As our digital world expands, the network perimeter is no longer tied down to on-premises data centers. The new distributed workforce demands work from anywhere infrastructure. Between edge computing, cloud services, and a remote workforce, our data can no longer be secured by on-premises data center security measures.</p><p>Secure Access Service Edge (SASE) addresses these challenges.</p><p><strong>What is SASE?</strong></p><p>Introduced by Gartner researchers, SASE (pronounced “sassy”), is an emerging cybersecurity concept replacing the traditional network security architecture. SASE merges software-defined wide area network (SD-WAN) and network security services into a single cloud-delivered service model – streamlining network access and improving security.</p><p>With a single management console, SASE unifies SD-WAN network optimization features with security capabilities such as Zero-trust network architecture (ZTNA), data loss prevention, web filtering, next-generation firewall policies, and threat detection. Four factors define the SASE model:</p><ul><li>User identity</li><li>Session context</li><li>Security and compliance policies</li><li>Risk assessment of every session</li></ul><p>According to Gartner, “SASE capabilities are delivered as a service based upon the identity of the entity, real-time context, enterprise security/compliance policies and continuous assessment of risk/trust throughout the sessions. Identities of entities can be associated with people, groups of people (branch offices), devices, applications, services, IoT systems or edge computing locations.”</p><p>As enterprises solidify their plans for permanent work-from-home, SASE provides the ideal environment to create a scalable and secure network architecture. In their report, “The Future of Network Security in the Cloud, Gartner predicts that “by 2024, at least 40% of enterprises will have explicit strategies to adopt SASE, up from less than 1% at year-end 2018.”</p><p>The SASE model is made up of three major components:</p><ul><li> <strong>Global SD-WAN</strong>: Unlike traditional stand-alone WAN, SASE is defined by an integrated SD-WAN that forms the core of the model</li><li><strong>Cloud Architecture</strong>: SASE is a cloud-native solution that combines discrete networking and security devices. The cloud architecture forms the backbone of SASE architecture providing a consolidated security management console</li><li><strong>Zero Trust Network Access</strong>: SASE services are identity-driven. ZTNA is integral to SASE architecture. It helps defend against potential threats with real-time verification of every user, device, and application. Other network security components include cloud access security broker (CASB), Firewall-as-a-Service (FWaaS), and secure web gateways (SWG)</li></ul><p><strong>SASE Benefits</strong></p><ul><li> <strong>Enhanced network security</strong>: The Zero Trust Network combined with SASE’s framework on data protection policies ensure all-round security of your sensitive data</li><li><strong>Cost savings</strong>: SASE reduces IT infrastructure down to a single platform or security stack. Organizations save costs by avoiding investments in multiple products and services</li><li><strong>Provide advanced threat prevention</strong>: the flexible cloud-based platform aids in threat prevention with its integrated content inspection model. Organizations benefit by gaining better network visibility and insights</li><li><strong>Improve performance</strong>: SASE simplifies IT infrastructure that is easy to access by resources irrespective of their location, type of application, and connectivity speed</li></ul><p><strong>Are we there yet?</strong></p><p>Despite the hype, SASE is still in its infancy. Currently, Gartner lists only a handful of vendors that provide the complete gamut of SASE features. In the long run, SASE is supposed to reduce network security. However, the road to simplifying infrastructure, reducing WAN products, and finally consolidating the features onto the cloud is an arduous exercise that many enterprises shy away from. The other challenge enterprises would face is in breaking down the silos between network teams and security teams. Bringing the two together would require a cultural change that combines the organization’s people, skillsets, and technology.</p><p>But the situation isn’t dire. With the rapid increase in connected devices and the digital workforce, SASE’s concept of network security is here to stay. The digital business world is pushing for larger partnerships of network and security vendors.</p><p><strong>How can iValue help?</strong></p><p>SASE is an amalgamation of network and security products. Currently, the approach demands the involvement of multiple providers (software and hardware) that is cumbersome to manage. iValue helps enterprises by streamlining their technology needs with a range of network and security products. We provide the right mix of domain expertise and niche technology providers to help businesses across their digital transformation journey.</p> </div> </div> </div> </div> </div> </section> </div> <p>The post <a rel="nofollow" href="https://ivaluegroup.com/en-in/resources/blogs/sase-the-future-of-cloud-security-2/">SASE: THE FUTURE OF CLOUD SECURITY</a> appeared first on <a rel="nofollow" href="https://ivaluegroup.com/en-in">iValue India</a>.</p> ]]></content:encoded> </item> </channel> </rss>