<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.viszensecurity.com/blogs/tag/doodle/feed" rel="self" type="application/rss+xml"/><title>Viszen Security - Insights #doodle</title><description>Viszen Security - Insights #doodle</description><link>https://www.viszensecurity.com/blogs/tag/doodle</link><lastBuildDate>Wed, 24 Dec 2025 11:58:53 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[The CIO's Guide to Secure Access Service Edge (SASE) Architecture]]></title><link>https://www.viszensecurity.com/blogs/post/secure-access-service-edge-sase-architecture-a-primer-for-cxos</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/Tue Jun 29 2021.png"/>Here's a quick down and dirty primer comparing the new Secure Access Service Edge (SASE) architecture to our traditional perimeter security methods.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_iwAvcGXwSdWLLHNm2g5Nbw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_loZ_GzKQS8CoCrbQIYKAnA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_V1fSkzXMSE2QWIkzy6869Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6yfmUNRZRhiqAnc1S4yH5g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6yfmUNRZRhiqAnc1S4yH5g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"></span></p><p style="text-align:left;"><span style="font-size:12pt;">If you're tired of hearing about the &quot;new normal&quot; post-pandemic, hold on to your knickers because some of the outcomes from COVID's business impact are here to stay. Really, it's not a bad thing and we're long overdue for an overhaul of how we identify, authenticate, connect, and authorize access for users and devices. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Here's a quick down and dirty primer comparing the new Secure Access Service Edge (SASE) architecture to our traditional perimeter security methods. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">Executive View of SASE Architecture<br></span></p><p style="text-align:left;"><span style="font-size:12pt;">From the 10,000-foot view, the three most pertinent points are:</span></p><ol><li><p style="text-align:left;"><span style="font-size:12pt;">SASE is one solution offering that's part of a larger (or longer) zero trust security strategy. As you'll see in the graphic below, SASE enforces the underlying principle of a zero trust network by not extending implicit access to resources. Meaning, what a user or a device can do or access is explicitly defined in the SASE fabric. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">SASE is more of a service set than a single product; it's cloud-based and 'follows' endpoints and users wherever they go, or in the case of work from home -- wherever they <span style="font-style:italic;">don't go</span>. SASE vendors do this with a global cloud PoP network so endpoints connect to the cloud to access resources, vs. connecting to a traditional on-prem datacenter and then egressing. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">SASE is likely to deliver on promises of increased simplicity and security with decreased cost, but there will be a certain amount of vendor lock-in as well as overlap with other products related to zero trust and endpoint security that the C-suite should prepare for. </span></p></li></ol><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;font-weight:700;">Technical View of SASE Architecture<br></span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;">Since this is a C-level primer, I'm not going to dive too deeply in to the nuts and bolts, but I know the CISOs and CIOs I work with, and most of you love a little technical meat. </span></p><ol><li><p style="text-align:left;"><span style="font-size:12pt;">From an implementation standpoint, how SASE is implemented and what it can (or can't) do is dependent in large part on the vendor. Some SASE vendors came from cloud access server broker (CASB) and secure web gateway (SWG) pedigree; others from firewall and network security. Mileage and roadmaps will vary. How they handle guest (or un-managed devices) as well as users that happen to be on-prem may also vary.</span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">SASE has myriad features (vendor-dependent), with support for zero trust networking being just one. Re</span><span style="font-size:12pt;">placing legacy VPNs terminating to on-prem datacenters is a great way to enter the SASE world, and then continue adding features as you go. <br></span></p></li></ol><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">Graphic: SASE Architecture vs Traditional Perimeter</span></p><p style="text-align:left;"><span style="font-size:12pt;">For those of you who haven't worked with me yet, I love to draw and doodle. I don't know about you, but I'm very visual and find a picture really is worth more than a thousand words. And who has time to read a thousand words? Here are just a few highlights of the SASE graphic. </span></p><ol><li><p style="text-align:left;"><span style="font-size:12pt;">On left you see a traditional network security perimeter where we may (at best) have LAN-based connections (wired or wireless) with authentication and perhaps dynamic segmentation with VLANs or downloadable ACLs. For remote access, we see a traditional VPN model with similar features to the LAN connections. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">On the right you see a typical SASE architecture with enforcement and decision layers plus SASE elements shown in yellow. One of the benefits of this SASE architecture is to abstract from physically-defined connections (those we control at layers 1-3) and instead apply granular context-based enforcement at layer 7 for both on-prem and in-cloud resources. </span></p></li></ol><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;"><img src="/Tue%20Jun%2029%202021.png"></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p></p></div>
</div><div data-element-id="elm_BJ5oSqF_QliH1mm4AuBpQQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_BJ5oSqF_QliH1mm4AuBpQQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://zc.vg/K5Fzk" target="_blank"><span class="zpbutton-content">Get more insights</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 28 Jun 2021 19:15:00 -0400</pubDate></item></channel></rss>