SASE

SASE | News, how-tos, features, reviews, and videos

virtual network security picture id1208405529

Access control setting on a virtual display [authentication/privileges]

Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks

A risk-based approach restricts access to specific resources and capabilities within applications.

An IT technician works on laptop in data center, with other IT staff in the background.

Windstream Enterprise launches managed SASE with Cato Networks

The bundling of Cato's SASE technology with Windstream Enterprise’s managed services is designed to enable the deployment of a wide range of networking and security capabilities across locations, users, and applications.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands cradle an abstract, virtual security matrix.

Forcepoint One combines zero trust and SASE under a single umbrella

Forcepoint introduces a single security platform as an alternative to a best-of-breed approach.

staffing the hybrid cloud public private cloud clouds

The 3 biggest challenges of SASE in hybrid cloud environments

Tool sprawl, inadequate cooperation between network and security teams, or lack of trust can derail SASE adoption in hybrid cloud environments.

CSO  >  Right and wrong buttons and question marks

6 zero trust myths and misconceptions

If you’ve fallen for one of these myths, you may need to rethink your zero trust strategy.

tc constantin
video

Get up to speed on SASE: What's driving demand and how providers' capabilities differ

As enterprises build up their mobile, edge and cloud deployments, they're being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and...

spot edgecomputing cso by 4 pm production shutterstock 2400x1600 primary 3

Securing the edge: 4 trends to watch

The global COVID-19 pandemic exacerbated some of the security risks associated with the move to a more distributed computing model. Here are 4 ways security organizations are responding as edge computing threats evolve.

basics / building a foundation / how-to / process / steps / stacking blocks

5 steps toward real zero trust security

Looking to advance in your zero trust journey? These steps will keep your strategy on track.

vcmar sase
video

WAN evolution: From SD-WAN to Secure Access Service Edge (SASE)

Join IDC analysts Brandon Butler and Christopher Rodriguez as they talk with Network World’s Ann Bednarz about the SASE model for streamlining network access and improving security. Deployed as a cloud service, it blends SD-WAN’s...

SD-WAN  >  The concept of a visual transition from hardware cables to software code.

5 things CISOs want to hear about SASE at the RSA Conference

Organizations are planning for secure access service edge (SASE) but have questions on how to get from their current state to converged, cloud-delivered networking and security. They’ll be looking for answers at RSA.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

SASE is coming, but adoption will be slow (especially for large enterprises)

Smaller organizations eye SASE to provide secure access to applications. Lack of maturity, existing security and digital transformation investments give large enterprises pause on SASE.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

Load More
You Might Also Like
BrandPosts
Learn more