CTO Insights

Blog Home > Featured Topic > CTO Insights

Maximizing SASE and Zero Trust Performance: The Vital Role of ‘At Scale’ Distributed Enforcement
Network security deployment architectures undergo regular evolution, driven by various enterprise requirements. Some of the Industry recent trends are outlined[...]
Read Post >
Choosing the Unified SASE Provider: The Execution Isolation Factor
Shared Processes for Packet-level Security Technologies Networking and security technologies at the packet level, such as stateful inspection firewalls, IPSEC,[...]
Read Post >
Thwart Security Risks with Comprehensive IDPS in Unified SASE
Within the realm of Secure Access Service Edge (SASE), the integration of Intrusion Detection and Prevention Systems (IDPS) is almost[...]
Read Post >
Make Security Simple: Streamline Policies in Unified SASE
Balancing Configuration and Control is critical for reducing security risks and management complexity
The Secure Access Service Edge (SASE) service, along with its associated architecture, comprises a powerful amalgamation of multiple security components.[...]
Read Post >
Enhancing SaaS Security: Next-Gen ZTNA for Authentication & Authorization
Authentication & Authorization comes in various colors The Zero Trust Network Access (ZTNA) component of SASE is designed to provide[...]
Read Post >
Unlocking the Potential: The Crucial Role of SWG in a SASE Architecture
The Secure Web Gateway (SWG) plays a crucial role in the SASE/SSE solution, which aims to secure internet-bound connections. Its[...]
Read Post >
Role of DNS-level security for SASE
Many articles in the industry and my blog on Deciphering SASE are very clear on the major constituents of SASE.[...]
Read Post >
The Role of Identify Brokers in a SASE Solution
In my previous blog on identity-aware SASE I discussed zero trust, the role of SASE, and the importance of identity[...]
Read Post >
Convergence of proxy types for SASE
Why Proxies in SASE? Gone are the days when the packet level security was considered sufficient. Due to the sophistication[...]
Read Post >
Threat Hunting Techniques and Solutions with Unified SASE
What is threat hunting? Threat hunting is a proactive defense approach to detect threats that evade existing security solutions. Why[...]
Read Post >
Realizing Identity-aware SASE with Identity based Policies
Why Identity awareness in SASE? My previous blog on Deciphering SASE talked about identity awareness in various security components of[...]
Read Post >
Evolution of SASE Architecture
You might have heard about multiple architecture principles in the context of network security in general and SASE in particular.[...]
Read Post >