Intelligent CIO Europe Issue 46 | Page 79

t cht lk

t cht lk

Main steps to implementation
SASE offers numerous benefits , especially in the age of remote working . But as it isn ’ t an off-the-shelf product that businesses can simply install right now , most organisations will be at the planning stages of their SASE journey .
The whole implementation process can be quite daunting for businesses , especially those still getting to grips with the concept . To start with , it ’ s worth spending some time monitoring and logging user activity to get a better understanding of from where and when employees are accessing data . This will also link well with reviewing all admin rights to ensure that privileged access is restricted to those that need it . Leaving open access to sensitive folders is making organisations vulnerable to exploitation , so it ’ s important to consider the state of company databases .
While VPNs have been of great value to businesses over the last few decades , their time in the light has passed . Limiting further investment into existing VPNs and slowly phasing them out is another big step in adopting SASE . Once these previous actions have been completed , businesses can go a step further and prepare to segment their network , installing last defence mechanisms which can limit the damage to one area should an attacker successfully breach the perimeter .
Above all else , however , there is one element that all companies should look to adopt to successfully implement SASE .
The importance of Zero Trust
Zero Trust and Zero Trust Network Access ( ZTNA ) live at the heart of SASE . The concept of ‘ verify first , then trust ’, is what Zero Trust is founded on . Once implemented , trust is never assumed and users must continue to verify their account each time they wish to access databases . With the security landscape constantly evolving , the best policy is to assume all users are suspicious until proven otherwise .
The importance of Zero Trust is now even more apparent when you consider the hundreds of locations employees are working from . Previous network security solutions relied on IP addresses to determine trust , but this was when access to the network was granted in more controlled conditions .
Now , however , with IP addresses recognised as weak identifiers , these solutions are no longer viable . Organisations may be left vulnerable to account takeovers , which could put sensitive data files and wider systems at risk .
With ZTNA , authentication is granted by an intermediary layer that validates the user ’ s identity and the way in which they are attempting to access certain data files . Instead of having to authenticate once you ’ ve connected to the network , ZTNA ensures users are made to authenticate before they get anywhere near the network . Adopting these solutions contributes to the end of VPNs and kickstarts a business ’ journey to successful SASE adoption .
The future of SASE
Last year , Gartner confirmed that recent months had exposed limitations in legacy technologies , and so it was time to look ahead to the latest developments . All organisations are at different points on their security journey , influenced by factors such as priorities and budget . Before teams can even begin to think about SASE adoption , the entire business must get on board .
Even if all departments bar one successfully implements SASE , vulnerabilities could remain in that one section that have the potential to unravel the time and effort put in by everyone else .
There will always be more to do – SASE is not a one-step process . It ’ s just about recognising the journey , taking it one change at a time and keeping eyes on the long-term benefits the company is working to achieve . p
www . intelligentcio . com INTELLIGENTCIO EUROPE 79