Author: Srini Addepalli
Realizing Identity-aware SASE with Identity based Policies
Realizing Identity-aware SASE with Identity based Policies
Why Identity awareness in SASE? My previous blog on Deciphering SASE talked about identity awareness in various security components of SASE. This post describes the various methods for realizing identity-aware SASE. Access controls in traditional perimeter-centric security[...]
Read Post >
Evolution of SASE Architecture
Evolution of SASE Architecture
You might have heard about multiple architecture principles in the context of network security in general and SASE in particular. Some software architecture principles used by the industry in SASE context are: Single-pass Architecture One-proxy Architecture Run-to-completion[...]
Read Post >
Securing the Data – SASE, CNAPP and CSMA roles
Securing the Data – SASE, CNAPP and CSMA roles
Data has become the most valuable resource for Enterprises.  No wonder, there are many bad actors trying to disrupt the Enterprise businesses from stealing & corrupting the data. Data security is all about protecting the data from[...]
Read Post >
The Difference Between SASE, Unified SASE and Universal SASE
The Difference Between SASE, Unified SASE and Universal SASE
What is SASE? SASE (Secure Access Service Edge) is defined by Gartner. Network security functions are not new, and SD-WAN is not new to the industry. SASE delivers them as a cloud service. Simply put, SASE combines[...]
Read Post >