top of page

Modern Secure Communications with SASE and SSE

A rich full suite of integrated services are available for organizations to custom configure for their operations. 

Modern Secure Communications using a cloud architecture involves numerous components: 

​

  • Secure Access Service Edge (SASE) network architecture, 

  • Choosing a suite of Software as a Service (SaaS) applications that best-fit operations, 

  • Configuring and using SaaS vendor integrations for chosen applications, 

  • Use Infrastructure as a Service (IaaS) and applications for non-SaaS applications, 

  • Deploy and configure appropriate security throughout, 

  • Review operations, agility, and productivity enhancements with and adjust for work anywhere mobility, 

  • Update organizational goals, culture, and policy with new and changing operational models. 

​

Cloud services architecture allows an 80/20 split in Information Technology (IT) responsibilities.

 

  • Large infrastructure providers like Google, Microsoft, and Amazon can take on responsibilities for data center operations and infrastructure.  

  • Software vendors can make their full suite of applications available with integrations available with other cloud vendors. 

  • The vendor takes care of all the base maintenance, patching, health monitoring, repairs and fixes, upgrades over time, and most operational components. 

  • The service consumer is responsible for configuring applications and services to fit their operations (20%). 

 

This allows for a much more agile and sophisticated deployment, with 80% of the cost shared across a much larger user base. 

​

By moving to a cloud architecture, 80% of the work in traditional models can be moved to application and infrastructure service vendors that provide a much richer environment deployed on a very large scale.  A rich full suite of integrated services are available for organizations to custom configure for their operations. 

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​

​​​​SASE & SSE Network Components

​

  • Universal Wide Area Network (WAN) and Internet access security independent of worker location or mobility, identity based with the same options available for workers no matter the location: office, branch, corporate data center, cloud data center, remote locations or home (security is integrated across all components, not just networking)

  • Cloud based global software defined firewalls for WAN and Internet

  • Identity based security based on the user, independent of location, enables network segmentation based on user anywhere on the WAN

  • Application aware network security applied using policies based on user identity and application identity – enables global application prioritization and improved user experience 

  • Managed middle mile internet networks integrated with last mile SD-WAN site connectivity for better application quality of service and availability

  • Improved cost efficiency as scaling connectivity becomes incremental with multiple broadband connections aggregated using SD-WAN

  • Integrated with campus network Shortest Path Bridging (SPB) software defined networks for fast operational scaling and performance

  • Simplicity provided through advanced software defined networks allows improved business agility,

  • Enhanced traffic visibility and management allows improved efficiencies and performance.

  • Enables hybrid application deployment and migration.  Applications become services that can be moved easily from corporate data centre, to cloud IAAS, and cloud SaaS solutions – with minimal impact on the end user

​

Core Business Applications - Cloud

​

  • Easily scale up or down with application agility - fast onboarding and scaling,

  • Upgrades and core application components seamlessly vendor managed by their experts,

  • Configuration managed and defined by user organization,

  • Cloud vendors offer standard integration with other cloud vendors allowing enhanced customized work flow and operations,

  • Integrated authentication (SAML) improves ease of use and user experience.

  • Availability allows work anywhere mobility,

  • Significant number of options for security allows for wide range of security features to fit many organizations

​

Security Management & Incident Response

​

  • Integrated directory services and authentication simplifies management and agility, while improving user experience

  • Integrated multifactor authentication options improve security,

  • Security monitoring with advanced analytics enhances security detection capabilities to reduce business risk

  • Device management cloud systems enhance deployment agility and emergency security response capabilities improving operational availability,

  • Integrated network and device management systems and data analytics improve security and availability,

  • Personnel security awareness monitoring and training systems improve the most important part of active security – people 

​

Data Analytics

​

  • Make decisions faster by making information available to staff in near real time

  • Used to develop strategies based on real data from a variety of sources,

  • Insights used to improve products and services,

  • Measure value proposition and understand customers better than your competitors, 

  • Artificial Intelligence (AI) helps customers with real time application decisions, responses, and animation. 

​

SSE vs SASE.jpg
bottom of page