Book Image

Diving into Secure Access Service Edge

By : Jeremiah
Book Image

Diving into Secure Access Service Edge

By: Jeremiah

Overview of this book

The SASE concept was coined by Gartner after seeing a pattern emerge in cloud and SD-WAN projects where full security integration was needed. The market behavior lately has sparked something like a "space race" for all technology manufacturers and cloud service providers to offer a "SASE" solution. The current training available in the market is minimal and manufacturer-oriented, with new services being released every few weeks. Professional architects and engineers trying to implement SASE need to take a manufacturer-neutral approach. This guide provides a foundation for understanding SASE, but it also has a lasting impact because it not only addresses the problems that existed at the time of publication, but also provides a continual learning approach to successfully lead in a market that evolves every few weeks. Technology teams need a tool that provides a model to keep up with new information as it becomes available and stay ahead of market hype. With this book, you’ll learn about crucial models for SASE success in designing, building, deploying, and supporting operations to ensure the most positive user experience (UX). In addition to SASE, you’ll gain insight into SD-WAN design, DevOps, zero trust, and next-generation technical education methods.
Table of Contents (28 chapters)
1
Part 1 – SASE Market Perspective
7
Part 2 – SASE Technical Perspective
15
Part 3 – SASE Success Perspective
20
Part 4 – SASE Bonus Perspective
Appendix: SASE Terms

Case Examples

In this section, we will outline Use Cases examples for a common frame of reference when developing specific Use Cases. There are no exhaustive lists of Use Cases as no such thing is possible. SASE will continue to evolve for decades, including more services.

Each Use Case definition is simplistic by design and should only be used as an ideation or starting point for you to develop a Use Case template.

SD-WAN – Software-Defined Wide Area Network:

  • What: Secure site-to-site, site-to-cloud, or site-to-internet communications that replace routing or a router with a physical appliance, VNF, or CNF running software-defined networks.
  • Who: Systems, offices, home offices, data centers, partner sites, Cloud Service Providers (CSP), or other physical and virtual locations that are needed to take part in a private network.
  • Where: Anywhere in the world.
  • How: Endpoint-to-endpoint encryption using TLS or IPSEC tunneling with dynamic tunneling over both...