Governance & Risk Management , Insider Threat , Zero Trust
How Organizations Can Leverage SASE
Zscaler's Lee Dolsen on the Benefits and ChallengesThe secure access service edge model, or SASE, treats identity as the new perimeter, says Lee Dolsen Singapore-based chief architect for Zscaler in the Asia Pacific region, who offers implementation insights.
"We leverage identity to provide access to applications with an appropriate level of security based on the context of the user and the device and where they are coming from," Dolsen explains in an interview with Information Security Media Group.
SASE uses a proxy-based architecture, rather than a firewall-based architecture, Dolsen says. "A proxy-based architecture is a full gateway coming from the user as a client to the proxy. The proxy then has the ability to do comprehensive inspection and control and initiates another session onto the server."
In this interview (see audio link below photo), Dolsen also discusses:
- How SASE works and what architectural changes are required;
- Why SASE implementation is critical in the current environment;
- How SASE can be applied when there are multiple vendors involved.
Dolsen, chief architect for Zscaler's Asia Pacific business, has more than 20 years of experience in the IT industry, focusing on various aspects of internet security and content delivery.