One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2839745
Date de publication 2021-05-26 10:00:00 (vue: 2021-05-26 10:05:37)
Titre SASE as a Service: The role of managed services in the world of network security convergence
Texte The next iteration in the history of technology convergence emerged with Gartner’s Secure Access Service Edge (SASE). Networking and security vendors have been integrating capabilities for decades, and market adoption of these integrations has only accelerated due to innovations such as virtualization and cloud computing. From a networking perspective, routing of traffic extends far beyond IP and MAC addresses to now include application steering and transport-agnostic overlay networks. From a security perspective, the next-generation firewall brought together a full stack solution capable of inspecting packets, URLs, and macro address information with unified threat management (UTM).  SASE brings together these two areas in a manner which revolutionizes the way IT, network, and security organizations will manage their respective domains as well as interoperate cross-functionally. With revolution comes disruption to standard operating procedures; and, that disruption can bring confusion, complexity, and cost in the near term to achieve long-term savings and scalability. That said, transformation does not have to occur in a vacuum. Bringing in an expert, such as a managed services provider (MSP) to assist with the adoption and transition to SASE, can help achieve organizational success throughout the convergence of networking and security solutions. Historical precedent This makes sense when you think about the role MSPs have played throughout the internet era. Early networks were a foreign concept that some even considered a fad, and those disruptive enough to embrace them at the time were faced with complex management of costly systems. Dedicated teams were stood up to manage mainframes that became the first IT organizations. Eventually as these teams became more skilled, businesses emerged loaded with these experts with the acumen to help other organizations build out their own networks. By doing this, these early MSPs sped up the adoption of networking technologies by flattening the learning curve required to turn up a solution and scale their acumen to others as they completed builds for new companies. Noticeably absent (in hindsight) from these early networks was security, which was not even a consideration based on the initial framework of the ARPANET. Network security first started to take shape in 1988 after a student at Cornell University launched the first computer worm to access other connected devices. This resulted in the establishment of the Computer Emergency Response Team (CERT) at Carnegie Mellon University, the world’s first security operation center (SOC), to prevent these sorts of attacks from occurring in the future. As networking technologies evolved over time—along with the need to secure them—the MSPs managing legacy equipment adapted to these evolutions quickly, and helped organizations transform their infrastructures as well. In parallel, the role of the SOC expanded and network security technologies such as the firewall, intrusion detection system, and web application firewall emerged to help combat these threats. Managed security services providers (MSSPs) were spun up to manage these technologies as well as enable them to help protect other businesses. By taking on these evolving technologies, the onus for quickly understanding the evolution fell to network and security MSPs rather than on the organizations they served. The migration to SASE follows this precedent. Managed network and security providers have adept background in their respective domains and the ability to rapidly understand how technologies and architecture must evolve as the areas converge
Envoyé Oui
Condensat “they’re ‘sase ‘single  as  sase 1988 ability able about absent accelerated access account achieve achieved across acumen adapted added additional address addresses adept adoption advisor after agnostic align aligning all allow almost also api applicable application architecture are areas arpanet aspects assist assistance astute attacks background based became been beginning behalf best between beyond billing boast both bring bringing brings brought build builds businesses can capabilities capable carnegie case center centers cert certainly challenges change cloud combat comes common companies compared compatibility completed complex complexity components computer computing concept confusion connected connectivity consideration considered control converge converged convergence cornell cost costly cross curve customer customers decades dedicated deliver delivery depending deployments desire detection developed devices direct disparate disruption disruptive does doing domains due each early edge effective either embedded embrace emerged emergency enable end enough equipment equipped era especially establishment etc even eventually evolution evolutions evolve evolved evolving exist existing expanded expedient expert experts extends faced fad familiar far fell firewall first flattening flexible follows foreign foresight framework from full functional functionality functionally further future gartner’s generation get glass’ has have having headed help helped hindsight historical history holistic how however implement include increased information infrastructure infrastructures initial innovations inspecting integral integrate integrated integrating integration integrations interface internal internet interoperate intrusion invest iot issue iteration journey just lack landscape language launched learning legacy level like likely limited loaded long mac macro mainframes maintain makes manage managed management managing manner market matter meaning mellon mentioned might migrate migration mitigate models more moreover most msp msps mssps multiple must near need network networking networks never new next not noticeably now occur occurring offering offsets often only onus opening operating operation operations organizational organizations other others out over overlay own packets pane parallel part path people perspective plane played point policies policy portal portals precedent presented prevent previous primarily procedures; process products protect provider providers provides providing quantum quickly rapidly rather rationale read ready regarding rendering reports required requirement resolve resolves resources respective response resulted resulting revolution revolutionizes robust role routing said sase savings scalability scale seamless seamlessly secondly section secure security self sense served service service’ service: services serving shape should significant since single singular skilled soc solution solutions some sorts sound sped spun stack stakeholders standard started steering stood structure student subject success such support syntax system systems take taking team teams technical technologies technology term than them them—the then these think those threat threats through throughout ticket ticketing time time—along today together traffic transform transformation transition transport trusted turn two unattainable underlying understand understanding unified university urls use using utilizing utm vacuum variability vendor vendors virtualization visibility want wary way web well when whenever where whether which who wider will without work world world’s worm write
Tags Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: