Access Management , Business Email Compromise (BEC) , Cloud Access Security Brokers (CASB)

Advice on Using the SASE Model

Akamai's Siddharth Deshpande on the Essential Steps
Sid Deshpande, director-security strategy, Asia Pacific & Japan, Akamai Technologies

The Secure Access Service Edge – or SASE – model can help CISOs make incremental progress on enhancing security while designing a long-term strategy, says Siddharth Deshpande, director of security strategy for Asia-Pacific and Japan at Akamai Technologies.

See Also: A Strategic Roadmap for Zero Trust Security Implementation

In a video interview with Information Security Media group, Deshpande offers practical recommendations for a SASE rollout. He offers insights on:

  • Choosing the right SASE provider;
  • The relevance of Gartner's “access pattern inversion” strategy;
  • Practical use cases for the SASE model.

As director of security strategy for Akamai's Asia-Pacific and Japan region, Deshpande helps security leaders build a security strategy and select an architecture. Previously, he was a senior director at Gartner, serving as an adviser on security and risk management challenges.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.