Cybersecurity Field Guide #3.5:

How to Effectively Implement and Operationalize SASE

 


Image
SASE 3.5 Feild Guide Image
November 18, 2020

In Optiv’s first SASE Field Guide (#3.0), we provided a high-level explanation for the Secure Access Service Edge (SASE) concept and critical considerations. With this SASE Field Guide (#3.5), – the next in the SASE series – we provide detailed guidance about where and how to start your SASE journey.

 

Click here to view other guides in the series.

SASE: So Many Parts. Where to Start?

 

First, to determine if a SASE approach is right for your organization, you must have a full understanding of where organizational assets live and from where users will connect.

 

If most assets and users reside in a traditional network environment, you may not gain many benefits from SASE.

 

But, if 50% or more of your accessible assets live in the cloud or many of your users are remote, then a SASE approach should be investigated.

 

Additionally, if your organization has many branch offices that need connectivity to the HQ, each other, and the Internet, then a SASE approach may be beneficial.

Image
SASE 3.5 Field Guide Illustration

SASE Areas Covered

Optiv Field Guide Library

Image
Field Guide #1 Library Thumbnail

CYBERSECURITY FIELD GUIDE #1

Image
Field Guide #2 Library Thumbnail

CYBERSECURITY FIELD GUIDE #2

Image
Field Guide #3 Library Thumbnail

CYBERSECURITY FIELD GUIDE #3

Image
Field Guide #3.5 Library Thumbnail

CYBERSECURITY FIELD GUIDE #3.5

Image
Field Guide #4 Library Thumbnail

CYBERSECURITY FIELD GUIDE #4

Image
Field Guide #5 Library Thumbnail

CYBERSECURITY FIELD GUIDE #5

Image
Field Guide #6 Library Thumbnail

CYBERSECURITY FIELD GUIDE #6