The SASE solution to network and security’s complicated relationship status

Bob Gilbert, VP, Security Cloud GTM Strategy and Chief Evangelist, Netskope, discusses the complicated relationship between network and security, and how Secure Access Service Edge (SASE) can mitigate against this friction.
Bob Gilbert, VP, Security Cloud GTM Strategy and Chief Evangelist, Netskope, discusses the complicated relationship between network and security, and how Secure Access Service Edge (SASE) can mitigate can ease this struggle.

If our friends Security and Networking were on Facebook, they would probably both list their relationship status as “It’s Complicated.” Sometimes everything’s great, but now and then, things can get a little weird, unclear, or uncomfortable.

At many organisations, there has traditionally been a barrier between the security and networking teams. Each team has its own objectives, and at times, those objectives can be at cross-purposes. Enforcing security affects the networking team’s ability to do its job and serve user demands. At the same time, the needs and expectations of networking also directly impact the security team. This friction can cause networking and security to butt heads. This conflict can cost companies real money and put digital transformation projects at risk.

Over the last year, that friction has generated some extra heat. With networking teams scrambling to support remote workforces during the COVID-19 pandemic, security teams were tasked with the dual responsibilities of helping enable business continuity while also protecting their organisations from opportunistic attacks. Unfortunately, this heightened state of tension in the networking/security relationship isn’t going away.

Different teams with different needs

Organisations traditionally task the networking team with providing the connectivity so end users can access the resources they need. However, to keep users happy and business productive, the network has to be reliably available and fast.

At the same time, the security team needs to protect the company’s data. To do that, security has traditionally needed to implement heavy-handed controls that can impact a user’s access to resources. The traditional process of filtering network traffic for threats and enforcing access controls typically meant that users would experience slow performance or being blocked entirely from accessing an application or file. If security blocks access to a resource in the name of protecting the organisation, that obstruction may then cause problems for the networking team tasked with giving the user the access they need to do their job.

This complicated situation is really the root of the problem, and it’s been a long-standing issue between networking and security teams. They’ve been making it work for years for the sake of the company, but no one’s feeling the love.

SASE brings networking and security together

Technology may solve the issue. Thanks to the Secure Access Service Edge (SASE), things are finally getting much less complicated for security and networking. From a technology standpoint, SASE merges a modern set of security capabilities cloud-delivered with a modern set of networking capabilities. As a result, networking and security technologies are transforming to serve better a world where there will be more applications, users, and data outside the corporate network than inside it.

SASE is about a technology shift that’s already in progress. But there’s another side to this story. Digital transformation means that users expect to work from everywhere, on their own devices, with unfettered access to what they need. To that end, SASE is also playing the part of “marriage counsellor” for networking and security, bringing both teams together with the common objective of providing fast and secure access for any user on any device accessing any internet resource.

SASE establishes a set of requirements where the network and security architectures can evolve to better serve both sides, making both teams happier. The relationship status has suddenly changed, and they’re able to work together more harmoniously than ever before.

Bringing the magic back: allow is the new block

The ultimate end-state with SASE is that security doesn’t get in the way anymore. It’s actually integrated. It doesn’t impact the experience of the user or slow things down. And it doesn’t get in the way like the firewalls and secure web gateways (SWGs) of old, blocking access to everything just in case.

Instead of blocking everything that potentially poses a risk, security can now be very prescriptive and precise. SASE only blocks access based on actual risks as defined by granular, policy-based controls. It doesn’t arbitrarily deny access to benign or simply unknown access just to be safe, which has notoriously caused problems at many organisations. With a SASE architecture, allow is the new block.

On the networking side, security has historically been forced into their architecture. Because security was a mandatory requirement, the network team had to reroute traffic through the security appliances located in the data centre. But this sort of “hairpinning” of all network traffic creates a security bottleneck that significantly degrades user performance.

With SASE, users are allowed to go directly to where they want to go. A “direct-to-net” network architecture is enabled by security being implemented at the network edge, as close to the user as possible.

Equal partners build a lasting relationship

Some companies are already adopting SASE, modernising their architecture, and building a better relationship between teams. But as with anything, there are always going to be laggards. For example, some organisations are slow to adopt because they can’t get out of their own way. Or there’s the slow, bureaucratic process of regulations evolving. And for some bigger enterprises (like large, monolithic financial institutions), it’s going to take a more measured and gradual adoption process before they will be comfortable with letting go of blocking access to everything as a general rule.

For security, SASE is like using a scalpel rather than a sledgehammer. Organisations can immediately go from coarse “block everything” security to fine-grained controls. Zero Trust is another area that’s also evolving as part of this. Zero Trust traditionally meant “don’t trust anybody,” but in the SASE era, the Zero Trust concept has evolved to be something more adaptive. The emergence of artificial intelligence (AI) and machine learning (ML) capabilities is a part of this, making access control and data protection more intelligent and automated.

READ MORE:

But the reason SASE will win out is that it wasn’t designed to favour security over networking, or vice versa. SASE is a more simplified and elegant umbrella architecture. It provides fast and secure access for any user, anywhere, on any device, to anything they might need. From a security perspective, it’s moving the visibility, control, and inspection point as close to the user as you can. Wherever they go, the system follows them. And the network becomes a very important part of that because you’re no longer dealing with entities that are residing in one physical location. They’re everywhere now, so the network itself plays just as important a role as security does. And that equal value in the partnership between network and security is something that’s been missing for a very long time.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.

Best of tech to meet at VivaTech in May

Viva Technology • 10th April 2024

A veritable crossroads for business and innovation, VivaTech once again promises to show why it has become an unmissable stop on the international business calendar. With its expanding global reach and emphasis on crucial themes like AI, sustainable tech, and mobility, VivaTech stands as the premier destination for decoding emerging trends and assessing their economic...

Enabling “Farm to Fork” efficiency between supermarkets & producers

Neil Baker • 03rd April 2024

Today, consumers across the UK are facing a cost of living crisis. As a result, many retailers and supermarkets are striving to keep their costs down, so that they can avoid passing these onto shoppers. Within this, one area that is increasingly under scrutiny for many organisations surrounds how to improve supply chain efficiency. This...

Addressing Regulatory Compliance in Government-Owned, Single-Use Devices

Nadav Avni • 26th March 2024

Corporate-owned single-use (COSU) devices, also known as dedicated devices, make work easier for businesses and many government agencies. They’re powerful smart devices that fulfil a single purpose. Think smart tablets used for inventory tracking, information kiosks, ATMs, or digital displays. But, in a government setting, these devices fall under strict regulatory compliance standards.

Advantages of Cloud-based CAD Solutions for Modern Designers

Marius Marcus • 22nd March 2024

Say goodbye to the days of clunky desktop software chaining us to specific desks. Instead, we’re stepping into a new era fueled by cloud CAD solutions. These game-changing tools not only offer designers unmatched flexibility but also foster collaboration and efficiency like never before!