Why CISOs Need Cloud to Secure the Network

November 12, 2019

Contributor: Manasi Sakpal

CISOs need a new way to secure networks.

Martha, a salesperson, prides herself on being an “always on the move” digital worker. She often accesses sensitive data on her managed device at airport lounges while she gears up for the next meeting. She also surfs the internet, checks her social media updates and updates her personal blog.

This type of connected employee, while a boon to the organization, can be a nightmare to the chief information security officer (CISO). Martha is not only exposing critical data to unknown networks while using WiFi services in public spaces, she is also exposing her company's network to possible threat exposures through external websites. In a modern cloud-centric digital business, the need to access information anywhere and everywhere is a top priority.

“ Due to the recent shifts in the technology landscape, the adoption rate for SASE offerings is as low as 1%”

“Secure access service edge, or SASE, supports the need for dynamic secure access,” says Lawrence Orans, Vice President Analyst, Gartner. “It delivers services and policy enforcements on demand, independent of location or the entity requesting the service.”

“SASE is in the early stages of development and its evolution is driven by the pace of digital transformation of businesses, mobile workforces and adoption of edge computing,” says Orans. “It offers security and network professionals the opportunity to completely rethink and redesign network architectures over the next decade.” Due to the recent shifts in the technology landscape, the adoption rate for SASE offerings is as low as 1%, Before implementing SASE, security and risk management professionals must consider a few specific actions:

  1. Be a part of planning meetings. Include network security services when building the IT architecture of the organization. Create a strong business case based on the network security requirements and capabilities and support vendor recommendations with independent research findings to select the most appropriate security capabilities.
  2. Consider short-term opportunities. Consider investing in small-scale projects. Start with specific digital-business-enabled projects and build on them as the requirements of the organization expand or evolve. Invest in precise identity and application-aware access for unmanaged devices used by partners or contract employees.
  3. Involve leadership to drive transition. Involve senior IT executives and lead network architects from the evaluation stages to establish buy-in early on in the shift to SASE. The change will require a cultural shift, as non-IT employees may be more comfortable with existing solutions and may resist moving toward SASE. Hence, involvement of leadership to drive a cross-functional change is necessary.
  4. Keep contracts short term. This is an emerging technology, and the licensing models are still in flux. Limit contracts to a maximum of one or two years. This provides the opportunity to test a wider breadth of offerings and eventually select what works best for the organization’s needs.
  5. Avoid one-size-fits-all models. A large vendor may have SASE elements stitched together from multiple acquisitions and partnerships. However, one-size-fits-all solutions will not serve the desired purpose of delivering a single experience for your organization.

Experience Information Technology conferences

Join your peers for the unveiling of the latest insights at Gartner conferences.