SASE SECURITY BUYER ’ S GUIDE
HOW TO CHOOSE A SASE PLATFORM THAT PUTS DATA SECURITY FIRST
Remote work today means “ work anywhere ”— at home , in an office , or wherever travel may be permitted . Connecting people to the data they need and delivering consistent security wherever data is used are the new challenges .
With people , applications , and data now frequently beyond the traditional boundaries of the enterprise , security teams must continue to deliver consistent security where it ’ s needed , while supporting productivity for today ’ s anywhere worker and lowering the operational burden . Gartner ’ s Secure Access Service Edge ( SASE ) architecture is a compelling path forward , designed to bring together disparate networking and security technologies as converged services delivered from the cloud .
Some SASE solutions focus on connecting people to applications ; however , access is simply the way people securely obtain the data they need to get their jobs done . Cybersecurity must also protect the usage of that data from the edge to the cloud .
Use this guide to understand the different approaches for SASE security and the capabilities you should expect and trust from a SASE platform .
Two Types of SASE
SASE reinvents disparate stacks of networking and security hardware as converged cloud services that primarily follow two schools of thought :
Access-centric SASE Advantages : As the name suggests , access-centric SASE security focuses primarily on safely connecting users to applications and data , whether on the web , in the cloud , or in internal private data centers . Typically delivered as a cloud , this type of SASE provides centralized control over who can use crucial business systems and protects against attackers from malware , ransomware , and other advanced threats . p
www . intelligentcio . com INTELLIGENTCIO LATAM 19