{"id":4772,"date":"2019-11-12T17:00:00","date_gmt":"2019-11-12T14:00:00","guid":{"rendered":"http:\/\/34.90.35.0\/index.php\/is-casb-alone-enough-long-live-sase\/"},"modified":"2019-11-12T17:00:00","modified_gmt":"2019-11-12T14:00:00","slug":"is-casb-alone-enough-long-live-sase","status":"publish","type":"post","link":"https:\/\/www.ideus.com.tr\/index.php\/is-casb-alone-enough-long-live-sase\/","title":{"rendered":"Is CASB Alone Enough? Long Live SASE"},"content":{"rendered":"<div>\n<p><b>Author: Matthew Chiodi, CSO Public Cloud\u00a0<\/b><\/p>\n<p><i><span style=\"font-weight: 400;\">Applications moving to the cloud and increased user mobility are changing the way networking and network security services must be delivered. Palo Alto Networks founder and CTO Nir Zuk believes that the future of network security is in the cloud, and has been driving this change for the past few years, with the Prisma Access product, the industry\u2019s most comprehensive SASE. In this ongoing series, Palo Alto Networks thought leaders explore the core tenets of an integrated, effective SASE solution, and more broadly, its implementation and implications.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">One of the most common questions I hear from organizations of all sizes is, \u201cMy users are accessing cloud apps, but I have no idea as to the scale or the type of data. Is a cloud access security broker (CASB) the only solution to address this?\u201d A well-intentioned question for sure, but somewhat shortsighted. <\/span><b>Organizations must understand that the rapid adoption of software as a service (SaaS) in the enterprise has radically shifted not only risk but access patterns.<\/b><span style=\"font-weight: 400;\"> While in the past, CASB was the only choice, SASE platforms are now challenging that historical dominance.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><b>SaaS Adoption Introduces Security Risks<\/b><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-saas\"><span style=\"font-weight: 400;\">SaaS<\/span><\/a><span style=\"font-weight: 400;\"> applications offer companies, employees and customers many benefits. However, for each positive, there is also a negative.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Pros<\/b><\/td>\n<td><b>Cons<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Quick deployment \u2013 As a software solution, the installation and configuration of SaaS apps are quick and painless. By utilizing the cloud, the apps are easily accessible to all users.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Anyone with a credit card can start using almost any cloud service. They are typically set up without IT and security oversight. Users are able to access the application from every coffee shop and any device.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Simple maintenance<\/span> <span style=\"font-weight: 400;\">\u2013 Instead of having your IT department manually upgrade the app, that responsibility falls to the SaaS vendors, saving you IT resources.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Maintenance isn\u2019t always for increasing uptime. SaaS vendors do an amazing job releasing new features and functionality, but this frequent pace of change also makes it difficult for IT and security teams to keep tabs on configurations and risk.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Scalable \u2013 Since SaaS apps live in the cloud, they are scalable, no matter how small or large your organization is. <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-branch-office-network-security\"><span style=\"font-weight: 400;\">Remote users<\/span><\/a><span style=\"font-weight: 400;\"> are able to access the apps no matter their location.\u00a0<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Most tier-1 SaaS apps are designed to be infinitely scalable in theory. The downside is that unsanctioned apps will grow virally in your organization and the SaaS provider will gladly pass along the bill. Finance won\u2019t be happy.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Given the ease of use, the volume and sensitivity of data being transferred, stored and shared in these cloud environments continue to increase. Simultaneously, users are constantly moving to different physical locations, using multiple devices, operating systems and application versions to access the data they need.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a result, some undesirable security tradeoffs have emerged. The most common thorn in the flesh? <\/span><b>A loss of insight into who is accessing and using these applications and data, plus \u2013 thanks to the advent of bring your own device (BYOD) \u2013 lack of awareness around the devices being used to gain access.<\/b><\/p>\n<p>\u00a0<\/p>\n<p><b>The Cloud Demands More<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In a cloud-driven world, security needs to be unified, consistent and delivered from the cloud that it\u2019s chartered to protect.<\/span><span style=\"font-weight: 400;\"> To that end, <\/span><span style=\"font-weight: 400;\">Gartner has proposed a new model for networking and network security in the cloud, known as the \u201csecure access service edge,\u201d or <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-sase\"><span style=\"font-weight: 400;\">SASE<\/span><\/a><span style=\"font-weight: 400;\"> (pronounced \u201csassy\u201d). In Gartner\u2019s words:<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">\u201cThe secure access service edge is an emerging offering combining comprehensive WAN capabilities with comprehensive network security functions to support the dynamic secure access needs of digital enterprises.\u201d\u00a0<\/span><\/i><\/p>\n<p><a href=\"https:\/\/blog.paloaltonetworks.com\/2019\/11\/cloud-next-generation-network-securit\"><b>Prisma Access<\/b><\/a><b> is Palo Alto Networks SASE solution.<\/b><span style=\"font-weight: 400;\"> It delivers networking and network security from the cloud, providing a fabric to connect all users and networks to its cloud-delivered infrastructure. This provides consistent network connectivity to data and apps, both at headquarters and in the cloud, and applies policy-based security services to users and devices, no matter their location.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our multi-mode CASB solution, Prisma SaaS, integrates seamlessly with Prisma Access, enabling businesses to implement security that combines inline security, API security and contextual controls to determine access to sensitive information. These controls are implemented together in an integrated manner and applied throughout all cloud application policies.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><b>So Is CASB Enough?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-casb\"><span style=\"font-weight: 400;\">legacy CASB-centric way<\/span><\/a><span style=\"font-weight: 400;\"> to secure SaaS applications uses a standalone proxy designed to perform a limited amount of inline inspection capabilities. There are <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/more-effective-cloud-security-approach-NGFW-for-inline-CASB\"><span style=\"font-weight: 400;\">different deployment modes <\/span><\/a><span style=\"font-weight: 400;\">by which a CASB can deliver its functions, including network inline, SAML proxy, agent and API (introspection). And while CASB can also be used for API-based controls, it\u2019s often with a limited set of ties to contextual policies on which specific users or devices have access to particular data. Despite multiple options for deployment, <\/span><span style=\"font-weight: 400;\">there are shortcomings with traditional implementation methods and many enterprise CASB projects have struggled to get off the ground because of it.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><b>Secure SaaS Requires SASE!<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Effectively securing SaaS, and digital business transformation as a whole, requires a <\/span><a href=\"http:\/\/start.paloaltonetworks.com\/10-tenets-SASE\"><span style=\"font-weight: 400;\">SASE solution<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><b>Attempting to address cloud security challenges with point solutions unwittingly reduces risk clarity by increasing operational complexity. <\/b><span style=\"font-weight: 400;\">SASE simplifies both networking and security, replacing conventional point products. Firewalls, proxies, secure web gateways, remote access VPNs, CASBs, DNS security and so on are unified into one cloud-based infrastructure. This provides simplified management, visibility and near-complete risk clarity over your entire global network.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more, <\/span><span style=\"font-weight: 400;\">download the Gartner Report: <\/span><a href=\"http:\/\/go.paloaltonetworks.com\/sasegartner\"><span style=\"font-weight: 400;\">The Future of Network Security is in the Cloud<\/span><\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.paloaltonetworks.com\/2019\/11\/cloud-casb-sase\/\">Is CASB Alone Enough? Long Live SASE<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.paloaltonetworks.com\/\">Palo Alto Networks Blog<\/a>.<\/p>\n<p><img loading=\"lazy\" src=\"http:\/\/feeds.feedburner.com\/~r\/PaloAltoNetworks\/~4\/a18sZ70p1sA\" height=\"1\" width=\"1\" alt=\"\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Author: Matthew Chiodi, CSO Public Cloud\u00a0 Applications moving to the cloud and increased user mobility are changing the way networking and network security services must be delivered. Palo Alto Networks founder and CTO Nir Zuk believes that the future of network security is in the cloud, and has been driving this change for the past<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":""},"categories":[24],"tags":[141,33,29,27,34],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/4772"}],"collection":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/comments?post=4772"}],"version-history":[{"count":0,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/posts\/4772\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/media?parent=4772"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/categories?post=4772"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ideus.com.tr\/index.php\/wp-json\/wp\/v2\/tags?post=4772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}