CISCO

SECURE ACCESS SERVICE EDGE (SASE)

Innovate together

CISCO SASE – EVERYTHING WORTH KNOWING

Network Transformation Directions for Secure Hybrid Work Based on Cisco SASE

What options do large domestic enterprises have if they commit to hybrid working but do not want to compromise on their usual security level and, in fact, want to enhance it?

The solution is CISCO SASE – the future of network security! The SASE architecture combines network and security functions in the cloud to connect users to the necessary applications and data, wherever they live and wherever they are.

SASE allows you to:

Seamlessly connect remote workers, even to cloud-based applications (beyond on-premise and hybrid applications), with the necessary and adequate security level.

Control access simply, centrally, and with unified rule enforcement.

Align network and security functions to meet the broad requirements of multicloud needs.

Consolidate into a single partner to simplify operations and effectively eliminate gaps.

    How to Provide an Effective Response to Cyber Attacks Targeting Your Company?

    How to Provide an Effective Response to Cyber Attacks Targeting Your Company?

    According to PwC’s 2021 annual global CEO survey, 47% of CEOs are extremely concerned about cyberattacks. This marks a significant increase compared to previous years and continues to grow annually, highlighting the growing recognition of cyberattacks as business operational risks.

    In the digital world, which presents new challenges, every company must find the right balance between efficiency and security. This is where CISCO Secure Access Service Edge (SASE) comes into play – a revolutionary solution that combines networking and security functions into a unified, cloud-based service.

    During the COVID-19 pandemic, workplace digital transformation drastically accelerated. Remote work, hybrid office environments, and the shift to cloud services all demand that companies rethink their network architecture and security protocols.

    CISCO SASE offers a solution to this, with numerous benefits, including:

    Global Availability: The cloud-based architecture enables users to access the network from anywhere, on any device.

    Security: Integrated tools for data loss prevention, network security, and secure web access provide protection against threats.

    Scalability: Cloud-based services are easily scalable with the growth of the company.

    Cost Efficiency: Integrated networking and security functions reduce infrastructure and maintenance costs.

    Case studies show that companies using SASE are better able to handle network security challenges while also increasing workforce productivity.

    CISCO SASE allows companies to gain an advantage in the digital world while maintaining their security.

    Company leaders and IT professionals should consider SASE as a key tool for future growth. Let the experts at Ace Network Zrt. help you leverage the benefits offered by CISCO SASE. Contact us today!

    CISCO SASE ACADEMY

    Learn more about CISCO SASE security solutions and sign up for the 5-part CISCO SASE Academy!

    CISCO SASE – CASE STUDY

    CISCO SASE IN THE HUNGARIAN PUBLIC SERVICE SECTOR

    2024.03.27.

    THE PROBLEM

    Our client, a utility service provider in Hungary, faced the issue of overloading services built around the centralized internet exit. As a result, they required a larger-scale resource expansion in this segment.

    They approached us with the request to review the existing environment, taking into account their future changing user needs and available technologies. They asked us to suggest solutions, possibly involving architectural changes, that would better meet the challenges of the coming years.

    THE ENVIRONMENT

    The client is open to new, innovative technologies. They are using Cisco SD-WAN solutions to connect their sites, as well as cloud-based DNS monitoring and protection.

    In recent years, hybrid work has gained more emphasis within the company, and there is also a shift from using on-prem applications to adopting cloud services.

    Along with these changes, they place significant importance on IT security, with a particular focus on stringent security solutions optimized for the requirements of the on-prem environment.

    THE SOLUTION

    Due to the environment described above and the client’s level of maturity, the SASE (Secure Access Service Edge) solution quickly became a focus. This solution allows us to combine the security model located at the edge of the cloud with SD-WAN solutions.

    With the SD-WAN solution, it becomes possible to prioritize traffic going towards internet and cloud-based applications at the sites, where the SASE layer provides controlled access, whether it’s to cloud applications, on-prem applications, or even internet access, for remote or home office work.

    As a result, we significantly reduce the load on the security solutions built around the central site’s internet exit, such as firewalls protecting the internet exit, SSL decryption, web proxies, DLP protection, and other security systems.

    The biggest challenge is maintaining a consistent security level, where we need to apply SASE integration with the same strength as the current security solutions used in the on-prem environment.

    This is particularly challenging with the web proxy, as we need to ensure the same service, regardless of whether the user is using SASE or on-prem resources.

    This can be resolved with the hybrid Cisco Secure Web Gateway integration, where the cloud-based Cisco Secure Web Gateway can work in conjunction with the on-prem web proxy solution, ensuring consistent user management, logging, and reporting.

    CISCO SASE – VIDEO LIBRARY

    CISCO SASE - BLOG

    Securing the Modern Hyper-Distributed Network: Perspectives from the 2023 Gartner Magic Quadrant™ for SD-WAN

    Vikas Butaney

    A typical day’s tasks for today’s modern worker are frequently distributed across multiple devices, applications, and locations. They could be working from home, analyzing CRM dashboards, and later, they might be at a coffee shop reviewing slides for an upcoming customer meeting. Perhaps they then head into the office for team meetings, followed by catching up with emails and messages on the commute home.

    For a networking and security leader, a typical day looks very different. Those individuals need to ensure that the WAN is delivering a superior app performance connecting users to applications wherever they are. They also need to know if an untrusted device is being used to access confidential CRM dashboards. How is network traffic being secured outside the office? How are apps and services being accessed and secured?

    Multiply these security concerns by the number of employees at numerous office locations, and then factor in technology-led business transformation initiatives, and we start to understand the complexity facing IT to secure and connect hyper-distributed users and resources everywhere.