{"id":623132,"date":"2023-03-29T09:49:30","date_gmt":"2023-03-29T14:49:30","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/03\/29\/why-sase-will-benefit-from-faster-consolidation-of-networking-and-security\/"},"modified":"2023-03-29T09:49:30","modified_gmt":"2023-03-29T14:49:30","slug":"why-sase-will-benefit-from-faster-consolidation-of-networking-and-security","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/03\/29\/why-sase-will-benefit-from-faster-consolidation-of-networking-and-security\/","title":{"rendered":"Why SASE will benefit from faster consolidation of networking and security"},"content":{"rendered":"<div>\n<section>\n<p><time title=\"2023-03-28T17:37:00+00:00\" datetime=\"2023-03-28T17:37:00+00:00\">March 28, 2023 10:37 AM<\/time>\n\t\t\t<\/p>\n<\/section>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"374\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2022\/11\/9-Why-Edge-Computing-Needs-Zero-Trust-Designed-In.jpg?fit=750%2C374&#038;strip=all\" alt=\"9 Why Edge Computing Needs Zero Trust Designed In\"><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div id=\"primary\" role=\"main\">\n<article id=\"post-2865715\">\n<div>\n<div id=\"boilerplate_2682874\">\n<p><em>Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success<\/em>. <em><a href=\"https:\/\/avolio.swapcard.com\/Transform2023\/registrations\/Start?utm_source=vb&#038;utm_medium=boiler&#038;utm_content=landingpage&#038;utm_campaign=T23_BoilerPlates\">Learn More<\/a><\/em><\/p>\n<hr>\n<\/div>\n<p>Seventy-five percent of enterprises are pursuing vendor consolidation, up from <a href=\"https:\/\/www.gartner.com\/document\/4123699?ref=solrAll&#038;refval=361721034\">29%<\/a> just three years ago, with <a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/secure-access-service-edge-sase\">secure access service edge (SASE)<\/a> experiencing significant upside growth as a result. SASE is also proving effective at improving enterprise security postures by providing <a href=\"https:\/\/venturebeat.com\/security\/getting-results-from-your-zero-trust-initiatives-in-2023\/\">zero trust network access (ZTNA)<\/a> at scale.<\/p>\n<p>CIOs tell VentureBeat SASE is getting traction because of its potential to streamline consolidation plans while factoring in ZTNA to the endpoint and identities.\u00a0<\/p>\n<p>\u201cIf I have five different agents, five different vendors on an endpoint, for example, that\u2019s much overhead support to manage, especially when I have all these exceptional cases like remote users and suppliers. So number one is consolidate,\u201d <a href=\"https:\/\/www.linkedin.com\/in\/kapilraina\/\">Kapil Raina<\/a>, vice president of zero trust, identity, and data security marketing at <a href=\"https:\/\/www.crowdstrike.com\/\">CrowdStrike<\/a>, told VentureBeat during a recent interview.<\/p>\n<h2 id=\"h-nearly-all-cybersecurity-leaders-have-consolidating-tech-stacks-on-their-roadmaps\">Nearly all cybersecurity leaders have consolidating tech stacks on their roadmaps\u00a0\u00a0<\/h2>\n<p>Leading cybersecurity providers, including <a href=\"https:\/\/www.crowdstrike.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CrowdStrike<\/a>, <a href=\"https:\/\/www.cisco.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco<\/a>, <a href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fortinet<\/a>, <a href=\"https:\/\/www.paloaltonetworks.com\/\">Palo <\/a><a href=\"https:\/\/www.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Alto<\/a><a href=\"https:\/\/www.paloaltonetworks.com\/\"> Networks<\/a>, <a href=\"https:\/\/www.vmware.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">VMware<\/a> and <a href=\"https:\/\/www.zscaler.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Zscaler<\/a>, are fast-tracking product roadmaps to turn consolidation into a growth opportunity. Nearly every CISO VentureBeat spoke with mentions consolidation as one of their top three goals for 2023.<\/p>\n<p><html><body><\/p>\n<div id=\"boilerplate_2803147\">\n<h3>Event<\/h3>\n<div>\n<p><span>Transform 2023<\/span><\/p>\n<div id=\"gm0a52976\">\n<p>Join us in San Francisco on July 11-12, where top executives will share how they have integrated and optimized AI investments for success and avoided common pitfalls.<\/p>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/avolio.swapcard.com\/Transform2023\/registrations\/Start?utm_source=vb&#038;utm_medium=incontent&#038;utm_content=landingpage&#038;utm_campaign=T23_incontent\"><br \/>\n                Register Now            <\/a>\n                        <\/p>\n<\/div>\n<p><\/body><\/p>\n<p>That\u2019s a point not lost on <a href=\"https:\/\/venturebeat.com\/security\/what-is-cybersecurity-definition-importance-threats-and-best-practices\/\">cybersecurity<\/a> industry leaders. <a href=\"https:\/\/go.cynet.com\/2022_ciso_survey\">Cynet\u2019s <\/a><a href=\"https:\/\/go.cynet.com\/2022_ciso_survey\" target=\"_blank\" rel=\"noreferrer noopener\">2022<\/a><a href=\"https:\/\/go.cynet.com\/2022_ciso_survey\"> survey of CISOs<\/a>\u00a0found that nearly all have consolidation on their roadmaps, up from 61% in 2021. CISOs believe consolidating their tech stacks will help them avoid missing threats (57%) and reduce the need to find qualified security specialists (56%) while streamlining the process of correlating and visualizing findings across their threat landscape (46%).<\/p>\n<p>At <a href=\"https:\/\/venturebeat.com\/security\/at-ignite-22-cybersecurity-conference-palo-alto-networks-looks-to-capitalize-on-consolidation\/\">Palo Alto Networks\u2019 Ignite \u201922 conference<\/a> last year, Nikesh Arora, Palo Alto Networks chairman and CEO, shared the company\u2019s vision for consolidation \u2014 and it\u2019s core to the company\u2019s strategy.<img loading=\"lazy\" decoding=\"async\" alt=\"Zero Trust Network Access (ZTNA)\" width=\"624\" height=\"329\" src=\"https:\/\/lh4.googleusercontent.com\/qfvKVVspUYS3Y8_JLqDdZnvv6yyklOpiIwPSl1YuoSgbI_E9A23F4KkptUB1_zpBNC-Noy_fmzHQrEdvH2Agy0vaI5lqxCIma05FzDlxwDG39E7j_OAbtQbzKZJuicIJOTzOMdJ9e-jdxvKhpLMfoA?is-pending-load=1\" ><\/p>\n<p>Nikesh added that \u201ccustomers are actually onto it. They want the consolidation because right now, customers are going through the three biggest transformations ever: They\u2019re going to network security transformation, they\u2019re going through a cloud transformation, and [though] many of them don\u2019t know [it] \u2026 they\u2019re about to go to a security operations center (SOC) transformation.\u201d Ignite \u201922 showed Palo Alto Networks doubling its R&#038;D and DevOps teams fast-tracking <a href=\"https:\/\/www.paloaltonetworks.com\/sase\" target=\"_blank\" rel=\"noreferrer noopener\">Prisma<\/a><a href=\"https:\/\/www.paloaltonetworks.com\/sase\"> SASE<\/a> with new AI-based enhancements.<\/p>\n<figure><img decoding=\"async\" data-lazy-fallback=\"1\" loading=\"lazy\" width=\"1432\" height=\"755\" alt   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase2.jpg?w=1432&#038;strip=all 1432w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase2.jpg?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase2.jpg?w=768&#038;strip=all 768w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase2.jpg?w=800&#038;strip=all 800w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase2.jpg?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase2.jpg?w=750&#038;strip=all 750w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase2.jpg?w=578&#038;strip=all 578w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase2.jpg?w=930&#038;strip=all 930w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase2.jpg?resize=1432%2C755&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>With a common policy framework and single-pane-of-glass management, Prisma Access is designed to secure hybrid workforces while also providing enterprises with a clear path to consolidating network and security tech stacks, which is what CIOs and CISOs are looking for. Source: <a href=\"https:\/\/www.paloaltonetworks.com\/sase\">Palo Alto Networks <\/a><a href=\"https:\/\/www.paloaltonetworks.com\/sase\" target=\"_blank\" rel=\"noreferrer noopener\">Prisma<\/a><a href=\"https:\/\/www.paloaltonetworks.com\/sase\"> SASE Overview<\/a><\/figcaption><\/figure>\n<h2><strong>SASE grows when network and security tech stacks consolidate\u00a0<\/strong><\/h2>\n<p>Legacy network architectures can\u2019t keep up with cloud-based workloads, and their perimeter-based security is proving to be too much of a liability, CIOs and CISOs tell VentureBeat anonymously. The risk levels rise to become board-level concerns that give CISOs the type of internal visibility they don\u2019t want. In addition, the legacy network architectures are renowned for poor user experiences and wide security gaps. Esmond Kane, CISO of Steward Health, <a href=\"https:\/\/cdn2.hubspot.net\/hubfs\/4023447\/CISO%20Survival%20Guide%20CI.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">advises<\/a>: \u201cUnderstand that \u2014 at its core \u2014 SASE is <a href=\"https:\/\/venturebeat.com\/zero-trust-the-new-security-paradigm\/\">zero trust<\/a>. We\u2019re talking about identity, authentication, access control and privilege. Start there and then build out.\u201d\u00a0<\/p>\n<p><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/secure-access-service-edge-sase\">Gartner\u2019s definition <\/a><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/secure-access-service-edge-sase\" target=\"_blank\" rel=\"noreferrer noopener\">of<\/a><a href=\"https:\/\/www.gartner.com\/en\/information-technology\/glossary\/secure-access-service-edge-sase\"> SASE<\/a> says that \u201csecure access service edge (SASE) delivers converged network and security-as-a-service capabilities, including SD-WAN, SWG, CASB, NGFW and zero trust network access (ZTNA). SASE supports branch offices, remote workers, and on-premises secure access use cases.<\/p>\n<p>\u201cSASE is primarily delivered as a service and enables zero trust access based on the identity of the device or entity, combined with real-time context and security and compliance policies.\u201d<\/p>\n<h2>Foundations of SASE<\/h2>\n<p>Gartner developed the SASE framework in response to a growing number of client inquiries about adapting existing networking and cybersecurity infrastructure to better support digitally driven ventures.<\/p>\n<p>Enterprises are on the hunt for every opportunity to consolidate tech stacks further. Given SASE\u2019s highly integrated nature, the platform delivers the opportunities CIOs and CISOs need. Combining network-as-a-service and network-security-as-a-service to deliver SASE is why the platform is capitalizing on consolidation so effectively today.<\/p>\n<figure><img decoding=\"async\" data-lazy-fallback=\"1\" loading=\"lazy\" width=\"743\" height=\"565\" alt   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase1.png?resize=743%2C565&#038;strip=all?w=743&#038;strip=all 743w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase1.png?resize=743%2C565&#038;strip=all?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase1.png?resize=743%2C565&#038;strip=all?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase1.png?resize=743%2C565&#038;strip=all?w=578&#038;strip=all 578w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase1.png?resize=743%2C565&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>Integrating network-as-a-service and network-security-as-a-service into a unified SASE platform provides real-time data and insights and defines every identity as a security perimeter. Unifying networks and security also strengthens ZTNA, which can scale across every customer, employee, supplier and service endpoint. Source: <a href=\"https:\/\/www.gartner.com\/document\/3956841?ref=solrAll&#038;refval=361856573\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner, The Future of Network Security Is in the Cloud, August 30, 2019<\/a><\/figcaption><\/figure>\n<p>To become more competitive in SASE without committing all available DevOps and R&#038;D resources to it, nearly all major cybersecurity vendors rely on joint ventures, mergers and acquisitions to get into the market quickly. Cisco\u2019s acquisition of Portshift, Palo Alto Networks\u2019 acquisition of CloudGenix, Fortinet\u2019s acquisition of OPAQ, Ivanti\u2019s acquisition of MobileIron and PulseSecure, Check Point Software Technologies\u2019 acquisition of Odo Security, ZScaler\u2019s acquisition of Edgewise Networks and Absolute Software\u2019s acquisition of NetMotion are just a few of the mergers designed to increase SASE vendors\u2019 competitiveness.\u00a0<\/p>\n<p>\u201cOne of the key trends emerging from the pandemic has been the broad rethinking of how to provide network and security services to distributed workforces,\u201d writes Garrett Bekker, senior research analyst, security at 451 Research, part of S&#038;P Global Market Intelligence, in the 451 Research note titled \u201c<a href=\"https:\/\/www.netmotionsoftware.com\/wp-content\/uploads\/451_Reprint_AbsoluteNetMotion_12MAY2021.pdf\">Another day, another SASE fueled deal as Absolute picks up NetMotion<\/a>.\u201d Garrett continues, \u201cthis shift in thinking, in turn, has fueled interest in zero-trust network access (ZTNA) and secure access service edge.\u201d<\/p>\n<h2>SASE\u2019s identity-first design further accelerates consolidation\u00a0\u00a0<\/h2>\n<p>For an SASE architecture to deliver on its full potential of consolidating network and security services to the tech stack level, it must first get real-time network activity monitoring and role-specific ZTNA access privileges right. Knowing in real time what\u2019s happening with every endpoint, asset, database and transaction request to the identity level is core to ZTNA. It is also essential for continually improving ZTNA security for distributed edge devices and locations.\u00a0<\/p>\n<p>ZTNA secures every identity and endpoint, treating each as a security perimeter with multiple digital identities that need constant monitoring and protection.\u00a0<\/p>\n<p>SASE is helping close the gaps between network-as-a-service and network security-as-a-service, improving enterprise networks\u2019 speed, security and scale. ZTNA and its related technologies protect endpoints. The increasing number of identities associated with each endpoint increases the risk of relying on legacy network infrastructure that relies only on perimeter-based protection. This is one place SASE and ZTNA are proving their worth.<\/p>\n<figure><img decoding=\"async\" data-lazy-fallback=\"1\" loading=\"lazy\" width=\"1118\" height=\"690\" alt   data-recalc-dims=\"1\" srcset=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase3.png?w=1118&#038;strip=all 1118w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase3.png?w=300&#038;strip=all 300w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase3.png?w=768&#038;strip=all 768w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase3.png?w=800&#038;strip=all 800w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase3.png?w=400&#038;strip=all 400w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase3.png?w=750&#038;strip=all 750w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase3.png?w=578&#038;strip=all 578w, https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase3.png?w=930&#038;strip=all 930w\" src=\"https:\/\/venturebeat.com\/wp-content\/uploads\/2023\/03\/sase3.png?resize=1118%2C690&#038;is-pending-load=1#038;strip=all\" data-old-srcset=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\"><figcaption>Identities, access credentials and roles are central to SASE, which is supported by the diverse array of technologies depicted in the above circular diagram. Source: <a href=\"https:\/\/www.gartner.com\/document\/3956841?ref=solrAll&#038;refval=361856573\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner, The Future of Network Security Is in the Cloud, August 30, 2019<\/a><\/figcaption><\/figure>\n<p><strong>VentureBeat&#8217;s mission<\/strong> is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. <a href=\"https:\/\/info.venturebeat.com\/website-preference-center.html?utm_source=VBsite&#038;utm_medium=bottomBoilerplate\" data-type=\"URL\" data-id=\"https:\/\/info.venturebeat.com\/website-preference-center.html\">Discover our Briefings.<\/a><\/p>\n<p>\t\t\t\t<\/html><\/div>\n<\/p><\/div>\n<p><a href=\"https:\/\/venturebeat.com\/security\/why-sase-will-benefit-from-faster-consolidation-of-networking-and-security\/\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Louis Columbus<\/p>\n","protected":false},"excerpt":{"rendered":"<p>March 28, 2023 10:37 AM Join top executives in San Francisco on July 11-12, to hear how leaders are integrating and optimizing AI investments for success. Learn More Seventy-five percent of enterprises are pursuing vendor consolidation, up from 29% just three years ago, with secure access service edge (SASE) experiencing significant upside growth as a<\/p>\n","protected":false},"author":1,"featured_media":623133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22962,22297,46],"tags":[],"class_list":{"0":"post-623132","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-benefit","8":"category-faster","9":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/623132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=623132"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/623132\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/623133"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=623132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=623132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=623132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}