Sase For Dummies
Sase For Dummies
Sase For Dummies
by Lawrence Miller
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Secure Access Service Edge (SASE) For Dummies®, Palo Alto
Networks Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2020 by John Wiley & Sons, Inc., Hoboken, New Jersey
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
the prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of John
Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be
used without written permission. All other trademarks are the property of their respective owners.
John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For
Dummies book for your business or organization, please contact our Business Development
Department in the U.S. at 877-409-4177, contact info@dummies.biz, or visit www.wiley.com/
go/custompub. For information about licensing the For Dummies brand for products or services,
contact BrandedRights&Licenses@Wiley.com.
ISBN 978-1-119-69602-5 (pbk); ISBN 978-1-119-69608-7 (ebk)
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the
following:
Project Editor: Elizabeth Kuball Production Editor:
Associate Publisher: Katie Mohr Tamilmani Varadharaj
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 5: Ten Benefits of SASE................................................................. 47
Complete Visibility across Hybrid Environments............................ 47
Control of Users, Data, and Apps...................................................... 48
Monitoring and Reporting.................................................................. 48
Less Complexity................................................................................... 49
Consistent Data Protection Everywhere........................................... 49
Reducing Costs.................................................................................... 50
Lower Administrative Time and Effort.............................................. 50
Reducing Need for Integration.......................................................... 50
Better Network Performance and Reliability................................... 51
Greater Agility...................................................................................... 51
GLOSSARY........................................................................................................... 53
iv Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
W
ith increasing numbers of mobile users, branch offices,
data, and services located outside the protections of
traditional network security appliances, organizations
are struggling to keep pace and ensure the security, privacy,
and integrity of their networks and, more important, their
customers.
Introduction 1
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
About This Book
Secure Access Service Edge (SASE) For Dummies consists of five
chapters that explore the following:
Foolish Assumptions
It’s been said that most assumptions have outlived their useless-
ness, but I assume a few things nonetheless!
2 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Icons Used in This Book
Throughout this book, I occasionally use special icons to call
attention to important information. Here’s what to expect:
These alerts point out the stuff your mother warned you about
(well, probably not), but they do offer practical advice to help you
avoid potentially costly or frustrating mistakes.
Introduction 3
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding the role of the cloud in
digital transformation strategies
Chapter 1
The Evolution of
Networking
I
n this chapter, you learn how cloud and mobile computing
trends have changed enterprise networking and how a secure
access service edge (SASE, pronounced “sassy”) can help
your organization address its modern networking and security
requirements.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The 2019 RightScale State of the Cloud Report from Flexera found
that public cloud adoption among organizations has grown to
91 percent and companies now run a majority of their workloads
in the cloud (38 percent of their workloads run in public cloud and
41 percent run in private cloud). Companies are also using SaaS,
PaaS, and IaaS offerings from multiple cloud providers — nearly
five clouds on average.
At the same time, public Wi-Fi hotspots are now available prac-
tically everywhere. This ubiquitous connectivity enables users to
work on their laptops, tablets, and smartphones from practically
anywhere.
6 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
THE TOP FIVE MOBILE
SECURITY THREATS
Mobile devices have emerged in recent years as the leading platform
for cybercrime and cybersecurity threats against organizations.
However, organizations are still working on ways to protect these
mobile devices, especially because they often contain a mixture of
business and personal data and operate both on and off the enter-
prise network.
(continued)
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
(continued)
8 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
exponentially and essentially put the final nail in the MPLS cof-
fin. Organizations began to provision direct Internet access (DIA)
connections, such as broadband, for their branch offices from
local Internet service providers (ISPs) to alleviate some of this
congestion.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Lack of integration and interoperability: To address the
loss of visibility and control, many organizations deploy
firewalls, intrusion prevention systems (IPSs), web content
filters, data loss prevention (DLP), and other point security
solutions in their remote offices. These solutions often come
from different vendors and have only limited or no integra-
tion capabilities. This makes it more difficult for security
teams to correlate events and implement a cohesive
enterprise security strategy.
»» Management complexity: Different security solutions from
different vendors means different management interfaces,
different operating systems, and different remote administra-
tion tools — multiplied by the number of different remote
locations that you need to manage. This management complex-
ity challenge is exponentially more difficult on the security side
(compared to the networking side), because of the volume and
types of security information that must be analyzed on a daily
basis from these different tools.
»» Networking
• Software-defined wide area networks (SD-WANs)
• Virtual private networks (VPNs)
• Zero Trust network access (ZTNA)
• Quality of service (QoS)
»» Security
• Firewall as a service (FWaaS)
• Domain Name System (DNS) security
10 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
• Threat prevention
• Secure web gateway (SWG)
• Data loss prevention (DLP)
• Cloud access security broker (CASB)
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Full visibility and control: SASE provides full visibility and
control with cloud-delivered capabilities including FWaaS,
SWG, DLP, and SaaS security via CASB functionality.
»» Less complexity: All management functions for the cloud
service can be centrally managed in the cloud from an
intuitive single-pane-of-glass management interface. This
means network and security teams no longer need to learn,
configure, and manage multiple systems from different
vendors.
12 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Enabling mobile and remote users
Chapter 2
SASE Use Cases
I n this chapter, you learn about some of the most common use
cases today for a secure access service edge (SASE).
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The limitations of traditional
remote access VPNs
Remote access VPNs are primarily built to do one thing: Allow
users outside the perimeter firewall to access resources inside the
corporate network.
14 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 2-2: Traditional remote-access VPN backhauling traffic to reach
the cloud.
Unsatisfactory compromises
To compensate for the networking problems with remote-access
VPN, IT teams typically introduce a number of compromises with
certain security implications:
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Web proxy/secure web gateway: To compensate for
scenarios when users are not connected to the VPN, many
organizations have tried alternative network security
measures, such as using a proxy for the web browser when
users are off-network. However, by definition, a web proxy
doesn’t fully inspect network traffic. Even worse, the traffic
inspection the proxy does perform will be fundamentally
different from the inspection that’s happening at headquar-
ters, with inconsistent results depending on users’ locations.
FIGURE 2-3: Easy access to the connectivity layer, wherever your users are.
16 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
For managed devices:
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The challenges of traditional
branch/retail networking
The traditional standard for branch/retail networking uses an
MPLS circuit between each remote site and headquarters in a
hub-and-spoke topology. This makes sense when the remote
site largely uses applications hosted in an internal data center or
when bandwidth requirements are not very high. For example, a
company that sells machine parts may host an inventory applica-
tion in its internal data center, and stores across the region might
query the database to get real-time information on warehouse
inventory. The application does not require significant band-
width, but the connection must be reliable because any downtime
or performance issues could lead to lost business.
Many applications have now moved out of the internal data center
and into the public cloud. As a result, hub-and-spoke networking
is no longer ideal because traffic passes over the MPLS connec-
tion, egresses the perimeter firewall, connects to the cloud-based
host, and follows the reverse path back to the user. The MPLS
link is a bottleneck because the traffic makes an unnecessary trip
to headquarters over a relatively slow connection and adds cost
and complexity associated with the additional MPLS resources
required to hairpin traffic.
18 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Augmenting MPLS with direct
Internet access
As organizations embark on their cloud journey, traditional con-
nectivity options of private links from branch to data center just
don’t work. Many organizations augment their private links with
Internet connections for direct cloud access. Providing branch
locations with direct Internet connections requires IT teams to
consider many factors. Plenty of options are available, with most
major cities having a range of providers for low-cost, high-speed
business-class Internet. However, the top speed of the service is
typically not the sole concern. Businesses need to consider the
reliability and security of the service as well, and those issues
aren’t always easy to address.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A modern architecture for
branch transformation
Branch offices need access to all applications, including those
in the data center; on the Internet; in SaaS applications; and in
public clouds. In other words, the proper architecture should
optimize access to all applications, wherever the applications or
the users are located.
20 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Defining the need for SD-WANs
»» Implementing ZTNA
Chapter 3
SASE Networking
Capabilities
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Software-defined WAN (SD-WAN) allows enterprises to lev-
erage a wide combination of WAN transport services including
MPLS, Long-Term Evolution (LTE), and commodity broadband,
to securely connect branches and users to applications both in
the cloud and data center.
22 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
SD-WAN offers geographically distributed organizations and
companies with multiple branches a number of benefits, including
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 3-1: Efficient SD-WAN traffic routing.
24 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Virtual Private Network
A VPN uses a public network, such as the Internet, to enable
remote users and sites to connect securely to the corporate net-
work. Two types of VPNs are a remote-access VPN and a site-to-
site VPN. Corporate networks are sometimes built on site-to-site
VPNs, where the local area network (LAN) of each location can be
connected to the data center via a secure WAN on which company
resources can be shared. Remote-access VPNs allow individual
users to connect to the corporate network remotely.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A SASE solution encompasses VPN services and enhances the
capabilities to operate in a cloud-based infrastructure in order to
securely route traffic to public cloud services including SaaS, plat-
form as a service (PaaS), and infrastructure as a service (IaaS), as
well as Internet and private cloud apps and services. In an IPSec
VPN example, you can create a site-to-site connection to a cloud-
based infrastructure from any IPSec-compatible device located at
a branch or retail location via a branch router, wireless access
point, SD-WAN edge device, or firewall (see Figure 3-3). Mobile
users employ an always-on IPSec or SSL VPN connection between
their endpoint or mobile device, and a SASE solution ensures con-
sistent traffic encryption and threat prevention.
26 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Zero Trust Network Access
As shown in Figure 3-4, companies still lack the necessary security
protections and policies needed to adequately protect their users
and data. Zero Trust network access (ZTNA) is a key part of the
Zero Trust philosophy of “never trust, always verify,” developed
by Forrester Research. ZTNA requires users who want to connect
to the cloud to authenticate and have their traffic inspected up
through Layer 7 via a gateway prior to gaining access to the appli-
cations they need. This provides an IT admin with the ability to
identify users and create policies to restrict access, minimize data
loss, and quickly mitigate any issues or threats that may arise.
Many ZTNA products are based on micro-perimeter architectures,
which do not provide content inspection, thus creating a discrep-
ancy in the types of protection available for each application. In
terms of consistent protection, the organization must build addi-
tional controls on top of the ZTNA model and establish inspection
for all traffic across all applications.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Layer 7 inspection and control are imperative to Zero Trust.
SASE builds upon the key principles of ZTNA and applies them
across all the other services within a SASE solution. By identi-
fying users, devices, and applications, no matter where they’re
connecting from, policy creation and management is simplified.
SASE removes the complexity of connecting to a gateway, by
incorporating the networking services into a single unified cloud
infrastructure.
28 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Quality of Service
As organizations transition from MPLS to SD-WAN using direct
Internet access (DIA) links, they’re finding that the service quality
varies. Quality of service (QoS) establishes bandwidth allocation
assigned to particular apps and services. Businesses rely on QoS to
ensure that their critical apps and services (for example, medical
equipment or credit card processing services) perform adequately.
If these systems were to get bogged down due to a lack of availa-
ble bandwidth caused by network congestion (for example, non-
business-related streaming video), this would severely impact
business operations and sales (as shown in Figure 3-5).
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 3-6: Bandwidth with QoS control.
30 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Deploying a next-generation firewall “as
a service”
Chapter 4
SASE Security
Capabilities
Firewall as a Service
Firewalls were originally designed to protect on-site company
networks, but as more companies moved their applications and
data to the cloud, firewalls had to evolve. Now, firewall as a ser-
vice (FWaaS) enables firewalls to be delivered as a cloud service.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
applications and data hosted on third-party infrastructure, they
quickly discovered they no longer had clearly defined network
perimeters.
They also found that because many of their applications and data
were now being run and managed on third-party infrastructure,
they no longer had full visibility into, or control over, their entire
networks. This problem was further exacerbated by the prolif-
eration of third-party point products that had to be separately
managed.
32 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A SASE solution should enable FWaaS capabilities in order to pro-
vide the protection of a next-generation firewall by implement-
ing network security policy in the cloud. It’s important to ensure
your SASE solution doesn’t only provide basic port blocking or
minimal firewall protections. You need the capabilities of a next-
generation firewall, as well as cloud-based security services, such
as threat prevention services and Domain Name System (DNS)
security.
FIGURE 4-1: DNS attacks are prevalent and result in costly damage and
application downtime for organizations.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
DNS is a massive and often overlooked attack surface present in
every organization. According to the Palo Alto Networks Unit 42
threat research team, almost 80 percent of malware uses DNS
to initiate command-and-control (C2) communications (see the
“DNS-based attacks: OilRig” sidebar in this chapter). Unfortu-
nately, security teams often lack basic visibility into how threats
use DNS to maintain control of infected devices. Adversaries take
advantage of the ubiquitous nature of DNS to abuse it at multiple
points of an attack, including reliable C2.
34 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
DNS security protects users by detecting and blocking malicious
domains while neutralizing threats. A SASE solution embraces
DNS security features by providing consistent security across the
network and users, no matter their location, with advanced capa-
bilities that include enabling organizations to:
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Your SASE solution should provide DNS security delivered within
the cloud environment as part of the network access. DNS secu-
rity should be built in, rather than bolted on, to the solution your
branch offices and mobile users use to connect to the Internet.
The DNS security provided in your SASE solution should lever-
age a combination of predictive analytics, machine learning, and
automation to combat threats in DNS traffic.
Threat Prevention
The dynamic nature of public cloud usage and user mobility
requires security teams to adapt and embrace a new approach to
threat prevention. According to respondents in a recent ESG sur-
vey, threat detection and response is more difficult today than
ever before because:
Within a SASE solution, all these point products and services are
integrated into a single cloud platform. This provides simpli-
fied management and oversight of all threats and vulnerabilities
across your network and cloud environments.
36 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Stopping exploits and malware by using the latest threat intel-
ligence is crucial to protecting your employees and data. Your
SASE solution should incorporate threat prevention tools into
its service so you can react quickly and effectively to remediate
threats. Be sure to check the quality of threat intelligence that is
being provided by the vendor. The vendor should be gathering and
sharing data from various sources, including customers, vendors,
and other relevant thought leaders, to provide continuous protec-
tion from unknown threats.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Source: Google Transparency Safe Browsing Report
SWG is just one of the many security services that a SASE solu-
tion must provide. As organizations grow and add more and more
remote users, coverage and protection becomes more difficult.
A SASE solution moves SWG into the cloud, providing protection
in the cloud through a unified platform for complete visibility and
control over the entire network.
38 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A SASE solution includes the same security services in an SWG,
allowing organizations to control access to the web and enforce
security policies that protect users from hostile websites. Remem-
ber that SWG is just one service of the SASE solution. Other secu-
rity services like FWaaS, DNS security, threat prevention, data
loss prevention (DLP), and cloud access security broker (CASB)
are also necessary.
(continued)
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
(continued)
40 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» SaaS and public cloud providers may offer some data
protection capabilities, which can lead to ineffective and
inconsistent security.
»» The number of data breaches by insider threats continues to
increase.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
cloud-delivered solution centered around the data itself. Policies
are consistently applied to sensitive data at rest, in motion, and
in use, regardless of its location. With SASE, organizations can
finally enable a comprehensive data protection solution that relies
on a scalable and simple architecture and allows effective machine
learning by leveraging access to all the organization’s traffic
and data.
SaaS apps can be deployed quickly. Anyone with a credit card can start using
As a software solution, the almost any cloud service. Cloud services are
installation and configuration of typically set up without IT and security
SaaS apps are quick and painless. By oversight. Users are able to access the
utilizing the cloud, the apps are application from anywhere and on any
easily accessible directly to all users. device — secure or not.
42 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Pros Cons
They’re simple to maintain. Instead Maintenance isn’t always for the purpose
of having your IT department of increasing uptime. SaaS vendors do
manually upgrade the app, that an amazing job releasing new features
responsibility falls to the SaaS and functionality, but this frequent
vendors, saving you IT resources. pace of change also makes it difficult
for IT and security teams to keep tabs
on configurations and risk.
Because SaaS apps live in the cloud, Most Tier 1 SaaS apps are designed to be
they’re scalable, no matter the size infinitely scalable in theory. The downside
of your organization, and remote is that unsanctioned apps will grow virally
users can access SaaS apps no in your organization.
matter their location.
Given the ease of use inherent to SaaS apps, the volume and sen-
sitivity of data being transferred, stored, and shared in SaaS cloud
environments continues to increase. Simultaneously, users are
constantly moving to different physical locations, using multiple
devices, operating systems, and application versions to access the
data they need.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
sensitive data resides, enforce company policies for user access,
and protect their data from threat actors. CASBs are cloud-based
security policy enforcement points that provide a gateway for
your SaaS provider and your employees.
»» SaaS visibility
• Discovery of shadow IT
• App discovery
• App usage reporting
• App risk assessment
• Configuration assessment
»» Control and compliance
• App access control
• Data discovery and classification
• Compliance reporting and remediation
• Unmanaged device access control
»» SaaS protection
• Threat protection
• Data protection
44 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
• Encryption
• Rights management
• User anomaly detection
• Workflow integration
A SASE solution should incorporate both in-line and API-based
SaaS controls for governance, access controls, and data protec-
tion. Also called a multi-mode CASB, the combination of in-line
and API-based SaaS security capabilities provide superior visi-
bility, management, security, and zero-day protection against
emerging threats.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Getting full visibility and control of users,
data, and apps
Chapter 5
Ten Benefits of SASE
H
ere are ten important business and technical benefits
of deploying secure access service edge (SASE) in your
organization.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Control of Users, Data, and Apps
Users are increasingly leveraging a variety of applications —
including SaaS applications from multiple devices and locations —
for work-related (as well as personal) purposes. Many applications,
such as instant messaging (IM), peer-to-peer (P2P) file sharing,
and Voice over Internet Protocol (VoIP), are capable of operating
on nonstandard ports or hopping ports. Some of these applications
are sanctioned by the organization, others are tolerated, and oth-
ers are unsanctioned. Users are increasingly savvy enough to force
applications to run over nonstandard ports through protocols such
as Remote Desktop Protocol (RDP) and Secure Shell (SSH), regard-
less of the organization’s policy regarding various applications
(sanctioned, tolerated, unsanctioned).
48 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Less Complexity
SASE enables your business to simplify networking and security by
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Reducing Costs
Organizations may choose to invest in commodity point network-
ing and security products. Although this may initially seem to be a
less expensive solution, administrative costs will quickly grow out
of control as limited networking and security staff resources must
learn different management consoles and operating systems —
many of which will potentially have very limited remote manage-
ment capabilities.
50 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Better Network Performance
and Reliability
SASE helps organizations improve network performance and reli-
ability for all users and locations by delivering SD-WAN capabili-
ties that enable multiple links from different sources — including
MPLS, broadband, Long-Term Evolution (LTE), satellite, and
more — to be load balanced, aggregated, and or configured for
failover. This helps reduce congestion and latency associated with
backhauling Internet traffic across MPLS connections or routing
traffic across a connection that is experiencing high utilization or
performance issues.
Greater Agility
Instead of waiting months for MPLS links to be installed, organi-
zations can rapidly connect branch locations using any available
Internet connection — such as broadband or LTE — from a local
Internet service provider (ISP) with the networking and security
capabilities in SASE.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
acceptable use policy (AUP): An information security policy that
defines appropriate and inappropriate user behavior with respect to
content in applications such as web browsing, email, and mobile
devices.
bring your own device (BYOD): A mobile device policy that permits
employees to use their personal mobile devices in the workplace for
work-related and personal business.
Glossary 53
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
data loss prevention (DLP): A data protection strategy to detect the
unauthorized storage or transmission of sensitive data.
DNS resolver: A server that relays requests for IP addresses to root and
top-level domain servers. See also DNS root server, top-level domain
(TLD), and Domain Name System (DNS).
DNS root server: An authoritative name server for a specific TLD in the
DNS root zone of the Internet. See also top-level domain (TLD) and
Domain Name System (DNS).
54 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Health Insurance Portability and Accountability Act (HIPAA):
U.S. legislation passed in 1996 that, among other things, protects the
confidentiality and privacy of protected health information (PHI). See also
protected health information (PHI).
Internet Protocol (IP): The OSI Layer 3 protocol that’s the basis of the
modern Internet. See also Open Systems Interconnection (OSI) model.
Glossary 55
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
malware: Malicious software or code that typically damages or disables,
takes control of, or steals information from a computer system.
56 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
platform as a service (PaaS): A category of cloud computing services
in which the customer is provided access to a platform for deploying
applications and can manage limited configuration settings, but the
operating system, compute, storage, networking, and underlying
physical cloud infrastructure is maintained by the service provider.
Glossary 57
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
secure web gateway (SWG): A security platform or service that is
designed to maintain visibility in web traffic. Additional functionality may
include web content filtering.
shadow IT: IT applications and services that are acquired by end users
without explicit organizational approval and often without organiza-
tional IT knowledge or support.
top-level domain (TLD): A domain at the highest (root) level of the DNS
of the Internet. Some examples include .com, .edu, .gov, .net, .org,
as well as country code TLDs such as .us and .ca.
58 Secure Access Service Edge (SASE) For Dummies, Palo Alto Networks Special Edition
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
User Datagram Protocol (UDP): A network protocol that doesn’t
guarantee packet delivery or the order of packet delivery over a
network.
Glossary 59
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.