Cybersecurity Field Guide #3.5:
How to Effectively Implement and Operationalize SASE
In Optiv’s first SASE Field Guide (#3.0), we provided a high-level explanation for the Secure Access Service Edge (SASE) concept and critical considerations. With this SASE Field Guide (#3.5), – the next in the SASE series – we provide detailed guidance about where and how to start your SASE journey.
Click here to view other guides in the series.
Take a Look Inside
In this field guide, we break Secure Access Service Edge (SASE) program creation into digestible pieces. You’ll dig deeper into how to prepare, plan, design, implement, operate and optimize your custom program. Remember, SASE is not something that most organizations will deploy all at once. Instead, it is more of an “as-needed” approach -- with one component rolled out at a time. The reason? SASE is not a single technology but a collection of them. And your SASE program will mature over time based on how required components are deployed to satisfy business needs and address risks. Take a look.
SASE: So Many Parts. Where to Start?
First, to determine if a SASE approach is right for your organization, you must have a full understanding of where organizational assets live and from where users will connect.
If most assets and users reside in a traditional network environment, you may not gain many benefits from SASE.
But, if 50% or more of your accessible assets live in the cloud or many of your users are remote, then a SASE approach should be investigated.
Additionally, if your organization has many branch offices that need connectivity to the HQ, each other, and the Internet, then a SASE approach may be beneficial.
Optiv Field Guide Library
CYBERSECURITY FIELD GUIDE #1
CYBERSECURITY FIELD GUIDE #2
CYBERSECURITY FIELD GUIDE #3
CYBERSECURITY FIELD GUIDE #3.5
CYBERSECURITY FIELD GUIDE #4
CYBERSECURITY FIELD GUIDE #5
CYBERSECURITY FIELD GUIDE #6