Arayka Blog
Realizing Identity-aware SASE
Realizing Identity-aware SASE
Why Identity awareness in SASE? My previous blog on Deciphering SASE talked about identity awareness in various security components of SASE. This post describes the various methods for realizing identity-aware SASE. Access controls in traditional perimeter-centric security[...]
Read Post >
Evolution of SASE Architecture
Evolution of SASE Architecture
You might have heard about multiple architecture principles in the context of network security in general and SASE in particular. Some software architecture principles used by the industry in SASE context are: Single-pass Architecture One-proxy Architecture Run-to-completion[...]
Read Post >
Securing the Data – SASE, CNAPP and CSMA roles
Securing the Data – SASE, CNAPP and CSMA roles
Data has become the most valuable resource for Enterprises.  No wonder, there are many bad actors trying to disrupt the Enterprise businesses from stealing & corrupting the data. Data security is all about protecting the data from[...]
Read Post >
Deciphering SASE, Unified SASE and Universal SASE
Deciphering SASE, Unified SASE and Universal SASE
What is SASE? SASE (Secure Access Service Edge) is defined by Gartner. Network security functions are not new, and SD-WAN is not new to the industry. SASE delivers them as a cloud service. Simply put, SASE combines[...]
Read Post >
x
Tips for IT Management

10 Tips for IT Management

How to Thrive During an Economic Downturn

Download Report >>