Cybersecurity Field Guide #3.5:

How to Effectively Implement and Operationalize SASE

 


Image
SASE 3.5 Feild Guide Image
November 18, 2020

In Optiv’s first SASE Field Guide (#3.0), we provided a high-level explanation for the Secure Access Service Edge (SASE) concept and critical considerations. With this SASE Field Guide (#3.5), – the next in the SASE series – we provide detailed guidance about where and how to start your SASE journey.

 

Click here to view other guides in the series.

SASE: So Many Parts. Where to Start?

 

First, to determine if a SASE approach is right for your organization, you must have a full understanding of where organizational assets live and from where users will connect.

 

If most assets and users reside in a traditional network environment, you may not gain many benefits from SASE.

 

But, if 50% or more of your accessible assets live in the cloud or many of your users are remote, then a SASE approach should be investigated.

 

Additionally, if your organization has many branch offices that need connectivity to the HQ, each other, and the Internet, then a SASE approach may be beneficial.

Image
SASE 3.5 Field Guide Illustration

SASE Areas Covered

Field Guide Library

Field Guide 01 Thumbnail Image

 

CYBERSECURITY

FIELD GUIDE #1

 

What to Do When Everything Changes  

 

Field Guide 02 Thumbnail Image

 

CYBERSECURITY

FIELD GUIDE #2

 

How to Survive an Attack  

 

Field Guide 03 Thumbnail Image

 

CYBERSECURITY

FIELD GUIDE #3

 

Get SASE to Accelerate Your Digital Transformation  

 

Field Guide 3.5 Thumbnail Image

 

CYBERSECURITY

FIELD GUIDE #3.5

 

How to Effectively Implement and Operationalize SASE  

 

2020-4.0-FieldGuide_Thumbnail-Image_600x776_Rounded-Corners

 

CYBERSECURITY

FIELD GUIDE #4

 

Best Practices for Automated Vulnerability Remediation  

 

Field-Guides_Digital-Image_template_2020-copyThumbnail-Image_600x776_Rounded-Corners_1

 

CYBERSECURITY

FIELD GUIDE #5

 

Ransomware: Yesterday, Today, Tomorrow