Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • Innovation
    • IT Management
    • Networking
    • Servers

    Why Multi-Cloud Environments Have Broken Enterprise Security

    Written by

    Chris Preimesberger
    Published April 23, 2020
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The adoption of multi-cloud environments that span public, private, and hybrid IT infrastructures have revolutionized the way companies do business, enabling them to cut costs, improve efficiencies and increase agility. 

      In the process, this cloud revolution has turned traditional data center-based security on its head, as more users, devices, apps, services, and data now reside outside the data center, than inside it. A report from Coalfire noted that 90 percent of enterprises are in the cloud to some degree.

      The traditional enterprise security model, which requires cloud traffic to be back-hauled through the data center for security inspection and policy enforcement and uses virtual private networks (VPNs) on endpoints, is broken. This approach is not only slow and expensive but riddled with potential problems, such as users bypassing VPNs.

      A better approach places security functionality closer to users.

      Gartner Research describes the model as a Secure Access Service Edge (SASE). It provides a multi-layered security defense that is seamless and non intrusive to users, while making it difficult for bad actors, including bots, to breach the network.

      In this eWEEK Data Points article, Ken Ammon, Chief Strategy Officer for OPAQ, a former U.S. Air Force security officer and and an industry expert in managed security, network security and government security, offers a primer on this new-gen approach.

      eWEEK’s resident networking and security analyst, Zeus Kerravala, has written entensively about SASE here on this site.

      Data Point No. 1: Defining SASE

      Gartner says SASE creates a policy-based, secure access service edge, regardless of the location of the entities requesting the networked capabilities or the location of those capabilities.

      Instead of the security perimeter being enforced in the data center, SASE extends the perimeter everywhere an enterprise needs it to be.

      Data Point No. 2: SASE Components

      The key building blocks for deploying SASE are secure web gateways (SWGs); firewall-as-a-service (FWaaS); advanced endpoint protection; micro-segmentation; and cloud access security brokers (CASBs).

      • SWGs blend URL filtering, advanced threat defense, and malware protection to shield users from internet-based threats, and to help enterprises enforce internet policy compliance. SWGs can be installed as on-premises appliances or cloud-based services, or in hybrid mode.
      • FWaaS replaces physical firewall devices at each site with a cloud-delivered alternative. It reduces capital expenditure on equipment, management overhead and security operations complexity.
      • Advanced endpoint protection is particularly important for devices in motion which are often exposed to untrusted networks, and provides an additional layer of granular security that reduces the workstation attack surface while preventing lateral movement (e.g., via ransomware) inside the enterprise.
      • Micro-segmentation enables an enterprise to segment all cloud-to-cloud traffic and data from one cloud environment to another — and to separate cloud apps from the data center.
      • CASBs interface between an enterprise’s on-premises infrastructure and cloud providers, enabling an enterprise to extend and enforce on-premise security policies to cloud resources including SaaS, IaaS and PaaS.

      Data Point No. 3: Key benefits of SASE in a data center

      SASE eliminates the cost and complexity of deploying, managing and maintaining multiple security physical and/or virtual appliances and software agents. 

      It delivers superior security since all access sessions are inspected and protected by requisite security policies. For example, access to Salesforce, Facebook, and cloud-hosted applications can be protected via a consistent policy applied to devices and users, regardless of their location.

      SASE also allows an enterprise to centrally create and manage  security policies and to enforce them locally — on endpoints close to the entities where local decision-making can be made.

      Data Point No. 4: What SASE brings to the IT table

      One of the biggest advantages afforded by SASE is its ability to provide the underlying infrastructure for implementing Zero Trust network access.

      For example, SASE enables an enterprise to treat cloud resources as an extension of the data center, while keeping cloud apps segmented from the network data center, and vice-versa. In addition, SASE encrypts all network communications, and segments lateral traffic, thereby reducing workstation-to workstation, and endpoint-to-endpoint takeovers. 

      The SASE architecture also provides visibility into traffic flows, including where connections are being made. This intelligence can be used to address performance issues and fine tune security policy enforcement to improve agility. 

      Data Point No. 5: Summary

      Finally, SASE makes it easier to restrict access to both on-premise and cloud resources to only those who require it. Permissions can be managed on a granular basis such as by developer, by user, by business need, and by IT resource.

      Ultimately, SASE enables organizations to extend what is left of the network perimeter out to the edge, where security controls can mitigate threats, reduce the enterprise attack surface and enforce workstation security to prevent breaches that can spread into the corporate IT infrastructure.

      If you have a suggestion for an eWEEK Data Points article, email [email protected].

      Chris Preimesberger
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor Emeritus of eWEEK. In his 16 years and more than 5,000 articles at eWEEK, he distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.
      Linkedin Twitter

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.