Have any questions? Call us at 310-839-5444
Excel Office Services
  • Services
    • Managed Print
    • Managed IT
    • Unified Communications
  • Xerox
    • Xerox Products
    • Xerox Solutions
  • Blog
  • About
    • Our Team
    • Our Company
    • Our Partners
  • Contact
  • Support
    • EOS Support
    • Xerox Support
  • Search
  • Menu Menu
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn

How SASE with Zero Trust Framework Secures Remote Workers

Business Intelligence, Innovative Ideas, Managed Network Services, Security

eWEEK SECURITY PERSPECTIVE: Working from non-offices means that the hybrid workplace is here to stay and that security must adapt to these needs.

By Vicki Reyzelman   

May 11, 2021

Our lives have been transformed by the COVID pandemic. We have changed the way we work remotely and are unlikely to be back to the office completely; a hybrid workplace is here to stay.

According to research released by S&P Global in June 2020, 80% of companies surveyed had implemented or expanded universal work-from-home policies in response to the crisis, and 67% expect these to remain in place either for the long term or permanently. As more people continue to work remotely, the number of connections increases and so does the potential attack surface.

Analysis of the threat landscape, and most recently the SolarWinds breach, found that hackers are often able to gain broad systems access. In many cases, the hackers move through networks unfettered to set up back doors and administrator accounts. With employees now connecting in large numbers, they are creating a hacker’s playground, with new, vulnerable endpoints and access points being exposed. New frameworks and tools are required to manage these threats.

Defining SASE and Zero Trust

Secure Access Service Edge (SASE), a segment coined by Gartner Research, and Zero Trust, created by Forrester Research, are two such frameworks that can help protect our employees.

Zero Trust as a concept has been around for a decade at least. In its simplest form it is: Don’t trust the things you do not need to trust. For the things you must trust, trust but verify constantly. Today there are many isolated Zero Trust projects focused on networks, users, devices or servers.

The SASE model combines networking and network security services, cloud access security broker (CASB), firewall as a service (FWaaS), data loss protection (DLP) and more, into a single comprehensive, integrated solution that supports all traffic, applications and users.

It’s all about defensive security strategy

Both SASE and Zero Trust support a new approach: a defensive security strategy at the edge. The model calls for an inspection to take place at the service edge. “The model would be to understand the identity of the employee, the student, or contractor based on their access identity. But at no point are they on the network, and you assign trust based on where they are in that network topology,” Patrick Sullivan, CTO of Akamai and an expert on security, said.

Such a proxy would allow access to web services no matter where they are hosted—and even to services hosted in local corporate networks.

Such an approach helps hide internal web applications and avoid posing them to the internet, providing secure access via proxy. This eliminates the use of a VPN because web applications can be accessed from anywhere via proxy in a secure way applying Zero Trust alone. The flexibility of deploying security inspection at the edge means that, regardless of shifts in the location of computing, security inspection can be performed at a local edge node.

Furthermore, since multi-cloud is the predominant architecture, deploying security at a homogeneous edge makes more sense than trying to engineer consistent controls using heterogeneous capabilities available at various cloud security providers (CSPs).

Enterprises need to be intentional about this

Analysts agree that an effective security implementation takes time, commitment and cultural change. The following points need to be evaluated and considered:

  • Multiple layers of security
  • Enterprise-level security around any type of connection
  • Simplified deployment
  • Scalability
  • Improved network performance
  • Lower operational overhead

The key to implementing security frameworks such as SASE and Zero Trust is to reduce complexity while also increasing visibility and ease of management. It is designed to focus on protecting the company and employees. People want to work—and do their best work—for an organization that gives them the flexibility and the rich, secure digital experience to do their job well—and do it from anywhere.

Author

Vicki Reyzelman
https://www.linkedin.com/in/vreyzelman/
Vicki Reyzelman is a cloud and security strategic engagement manager with Akamai.

Property of TechnologyAdvice.
Terms of Service | Privacy Notice | Advertise | California – Do Not Sell My Information

© 2021 TechnologyAdvice. All Rights Reserved

June 4, 2021/by Hunter Smith
Tags: innovative ideas, Managed Network services, Network Security, strategy
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn
https://www.excelofficeservices.com/wp-content/uploads/2021/06/SASE.jpg 749 848 Hunter Smith https://www.excelofficeservices.com/wp-content/uploads/2018/08/EOS_Slide_Logo_Transparent.png Hunter Smith2021-06-04 14:09:322021-06-04 14:09:32How SASE with Zero Trust Framework Secures Remote Workers
You might also like
An industrial manufacturing perspective: Tech Trends 2019
Week In Breach
Cloudflare hacked using auth tokens stolen in Okta attack
The FCC wants to make robocalls that use AI-generated voices illegal
The Week in Breach
Alexa, move my bank account to Amazon.
Facebook data breach: 4 simple steps to stay safer right now
Cybersecurity on a Budget: Here are 3 Tips From an Expert

Want to receive our blog posts automatically??

Categories

  • Business Intelligence
  • Innovative Ideas
  • Managed Network Services
  • Managed Print Services
  • Productivity
  • Security
  • Sustainability
  • Uncategorized

Recent Posts

  • Tariffs, Technology, and Office Productivity: A Looming Challenge
  • Hidden Print Costs: Why Partnering with a Managed Print Provider Just Makes Sense
  • World Backup Day: Protect Your Business Before It’s Too Late

Tags

3d printing Ai AR audit big data business intelligence cloud copier copiers Customer retention CX cyberattackccp Cyber crime cybersecurity data databreach excel excel office services green habits innovative innovative ideas IoT Los Angeles Managed Network Services managedIT manageditservices Managed Network services Managed Services managedservices MNS mobile printing mps MPS Los Angeles Network Security printing Production Print productivity Ransomware security small business SMB strategy Sustainability toner Week In Breach Xerox
©2025 ALL RIGHTS RESERVED
Week in BreachWeek In Breach
Scroll to top