Solution architecture is important, and yes, you want to minimize the number of daisy chains to reduce complexity. However, it doesn’t mean you cannot have any daisy chains in your solution. In fact, dictating zero daisy chains can have consequences–not for performance, but for security.
SASE consolidates a wide array of security technologies into one service, and yet each of those technologies are their own standalone segments today–with their own industry leaders and laggards. Any buyer who dictates no daisy chains is trusting that one single SASE provider can (all by themselves) build the best technologies across a constellation of capabilities that is only growing larger. Being beholden to one company is not pragmatic given that the occasional daisy chain greatly increases the ability to unite multiple best-of-breed technologies under one umbrella. Here are a few more reasons why daisy chains are needed:
SASE revolves around the cloud and is undoubtedly about speed and agility achieved through cloud-deployed security. But SASE doesn’t mean the cloud is the only way to go–ignore everything else. Instead, IT leaders should take a more practical position, using the best technology given the situation and problem. For example, on-premise next-gen firewall appliances are usually still the best option for large offices where performance and total cost of ownership are the key goals. If your SASE approach is cloud-first but not cloud-only, make sure your solution follows suit. Not all solutions allow for both cloud and on-premise firewalls!
Don’t assume SASE is a total solution. SASE covers a lot of ground, but it does not cover all the technologies a company needs to secure a remote-work and multi-cloud environment. For example, Cloud Workload Protection (CWP) and Endpoint Detection and Response (EDR) are critical in securing user and cloud computing environments, but are not part of the SASE framework. Although EDR is a primary technology used to address ransomware, a threat vector skyrocketing today, it is excluded from SASE because it does not require network traffic inspection to function. Rather, it’s an agent-based solution that monitors operating system activity and integrity.
Moreover, SASE addresses only the technology components of an effective security program, leaving out the experts required for 24/7 security monitoring and mature incident response. Without a dedicated team of security analysts at the ready, security technologies are ineffective–whether they are included in SASE or not. Professional skills are necessary to further investigate threats and stop them before major damage is done.
The security arena is the source of much SASE buzz, but let’s not forget that SASE solutions don’t work without SD-WAN and its centralized management platform pulling everything together. Plus, SASE is essentially dead on arrival unless the underlying network performs at acceptable levels. In selecting a SASE provider, IT leaders should check that both security and networking capabilities meet their needs, otherwise the entire “solution” can fail. Evaluations should touch on scalability, access flexibility, visibility and control, performance, as well as the ability to separate, prioritize, and secure bandwidth for remote employees.
SASE is all the rage, promising the ideologies that IT leaders have dreamed about for years, but taking a purist approach can have consequences. Hard-lined expectations around daisy chains and the cloud should be softened in favor of maximizing security excellence and business outcomes. Likewise, SASE solutions need to be compared against the broader security and network strategy, seeing where it adds value and where it may still fall short. By taking a pragmatic approach and wrapping SASE with fully managed network and security services, companies can make ideologies tangible, achieving agility and productivity all with ready-made security.
How can you partition networks to avoid complexity? Here’s how Masergy advises IT leaders when it comes to segmenting networks for security purposes.
Security strategies from the past 20 years are no longer working. Zero Trust offers a more resilient security approach for today’s challenges.
Here we explore the SASE plans companies are making and the difficult questions they address along the way.