Author: Srini Addepalli
Role of DNS-level security for SASE
Role of DNS-level security for SASE
Many articles in the industry and my blog on Deciphering SASE are very clear on the major constituents of SASE. In the case of SASE Security, the predominant components discussed are Secure Web Gateway (SWG), Cloud Access[...]
Read Post >
Identity Broker
Identity Broker
In my previous blog on identity-aware SASE I discussed zero trust, the role of SASE, and the importance of identity in access controls. Another blog on SASE Proxy explained how SASE solutions obtain users’ identities after authenticating[...]
Read Post >
Convergence of various kinds of proxies for SASE
Convergence of various kinds of proxies for SASE
Why Proxies in SASE? Gone are the days when the packet level security was considered sufficient. Due to the sophistication of attacks, it is becoming imperative to do deep content inspection for various kinds of protections. Identity[...]
Read Post >
Unified SASE role Cyber Threat Hunting
Unified SASE role Cyber Threat Hunting
What is threat hunting? Threat hunting is a proactive defense approach to detect threats that evade existing security solutions. Why threat hunting? Firewall, IDS/IPS, SWG, ZTNA, CASB functions help in protecting enterprise assets from known threats. Security[...]
Read Post >
Realizing Identity-aware SASE
Realizing Identity-aware SASE
Why Identity awareness in SASE? My previous blog on Deciphering SASE talked about identity awareness in various security components of SASE. This post describes the various methods for realizing identity-aware SASE. Access controls in traditional perimeter-centric security[...]
Read Post >
Evolution of SASE Architecture
Evolution of SASE Architecture
You might have heard about multiple architecture principles in the context of network security in general and SASE in particular. Some software architecture principles used by the industry in SASE context are: Single-pass Architecture One-proxy Architecture Run-to-completion[...]
Read Post >
Securing the Data – SASE, CNAPP and CSMA roles
Securing the Data – SASE, CNAPP and CSMA roles
Data has become the most valuable resource for Enterprises.  No wonder, there are many bad actors trying to disrupt the Enterprise businesses from stealing & corrupting the data. Data security is all about protecting the data from[...]
Read Post >
Deciphering SASE, Unified SASE and Universal SASE
Deciphering SASE, Unified SASE and Universal SASE
What is SASE? SASE (Secure Access Service Edge) is defined by Gartner. Network security functions are not new, and SD-WAN is not new to the industry. SASE delivers them as a cloud service. Simply put, SASE combines[...]
Read Post >