how-to-implement-secure-access-service-edge-sase-in-6-steps
how-to-implement-secure-access-service-edge-sase-in-6-steps
How to Implement
Secure Access
Service Edge (SASE)
in 6 Steps
Combine Networking and Security Capabilities for
Better Protection — Without Sacrificing Performance
“I don’t need another security tool.”
This is a common refrain from both IT and security leaders. And it makes sense when you The quantity of security
consider that many large enterprises today have over 130 security tools.1 This reality creates products utilized does not
a challenge, both in managing and optimizing these siloed systems — not to mention trying equate to safety. In fact,
to correlate them into a single risk rating. these tools may be working
According to Gartner and many global CISOs, the answer to this excessive proliferation is to do the opposite. Over
consolidation. Enterprises need tools that can be integrated to work together seamlessly, 70% of CISOs admit they
rather than deploying individual solutions that meet one-off requirements. don’t evaluate security tools
based on how effectively
Gartner’s secure access service edge (SASE) framework outlines the convergence
they reduce cyber risk.
of networking and security capabilities to create an effective and secure edge. The
And 36% report that their
cybersecurity concept emphasizes the need for vendor rationalization to reduce
security team is sidelined
complexity while increasing visibility and ease of management.
by manual efforts.2
2
How to Implement SASE in 6 Steps
3
Akamai Cloud-Delivered SASE
4
5. Plan out the phases for your transition to SASE
For most companies, the transition to SASE will be a multiphase journey. It may include By 2024, at least
moving away from individual point solutions as they age out. It is important to review your
40% of enterprises
gap analysis and consider which risks need to be prioritized first. For example, if your DNS
infrastructure or JavaScript environment is not protected, that is the right place to start. If will have explicit
you have an established program and are looking to mature it, there are some natural areas strategies to adopt
to focus on first.
SASE, up from less
• Gartner recommends that Zero Trust Network Access (ZTNA) should be the starting
than 1% at year-end
place for SASE implementation, as it allows for application-level access versus full 2018.
network access. In the long term, it is a better approach for a distributed workforce and
is the next-generation framework to focus on reducing lateral movement, security risk, Gartner
and known vulnerabilities. ZTNA solutions can provide security where it is needed to Hype Cycle for Enterprise
meet the needs of modern business — at the edge. A CDN delivery model for ZTNA Networking, 2020; 8 July 2020;
further extends protection across the core, to the cloud, and to the edge. Andrew Lerner, Danellie Young
• The next recommended phase for most companies is a secure web gateway (SWG)
and cloud access security broker (CASB). This brings up a natural challenge, as there
are no SASE providers that offer all of the solutions mentioned, so it is important to
look at vendors with a broad set of capabilities and integrated partners to meet your
strategic goals. A SWG that is cloud based and integrated into the edge provides
a better option than trying to adapt a legacy system. Look for SWGs that include
capabilities like data loss prevention (DLP) and sandboxing.
• Finally, these solutions should be built on foundational capabilities like web application
and API protection as a service (WAAPaaS), DNS security, and DDoS protections.
While many organizations have these capabilities today, they are likely not on a single
platform, which introduces complexity. Finding a platform that can support these
capabilities along with ZTNA and SWG helps reduce complexity and cost.
Take these six steps to develop an integrated performance and security strategy. Then
partner with Akamai — one of a small number of vendors named by Gartner as offering
a SASE platform — to discuss and initiate implementation. Extend protection across your
core, to the cloud, and out to the edge, minimizing risk while enabling future evolutions
in business strategies that leverage the cloud with SASE.
5
Sources:
1. https://biztechmagazine.com/article/2019/03/rsa-2019-most-organizations-use-too-many-cybersecurity-tools
2. https://panaseer.com/reports-papers/report/visibility-in-cybersecurity/
3. https://www.zdnet.com/google-amp/article/cybersecurity-one-in-three-breaches-are-caused-by-unpatched-vulnerabilities/
Akamai secures and delivers digital experiences for the world’s largest companies. Akamai’s intelligent edge platform surrounds everything,
from the enterprise to the cloud, so customers and their businesses can be fast, smart, and secure. Top brands globally rely on Akamai to
help them realize competitive advantage through agile solutions that extend the power of their multi-cloud architectures. Akamai keeps
decisions, apps, and experiences closer to users than anyone — and attacks and threats far away. Akamai’s portfolio of edge security, web
and mobile performance, enterprise access, and video delivery solutions is supported by unmatched customer service, analytics, and
24/7/365 monitoring. To learn why the world’s top brands trust Akamai, visit www.akamai.com, blogs.akamai.com, or @Akamai on Twitter.
You can find our global contact information at www.akamai.com/locations. Published 04/21.