Implementing SASE: Essential StepsExperts Offer Insights on How to Get Started With Deployment
The adoption of the Secure Access Service Edge, or SASE, model is being driven by numerous factors, including the need to bring down administrative costs and to effectively manage network security, according to a panel of experts who offer implementation advice.
See Also: Top 50 Security Threats
"SASE brings down the administrative cost, particularly as employees connect from anywhere," says Yask Sharma, CISO at Indian Oil Corp. Ltd.
To effectively implement the SASE model, an organization must develop a thorough understanding of how to manage network and identity security in a new way, says Sridhar Sidhu, senior vice president and head of information security services group at Wells Fargo Enterprise Global Services - India.
To enhance security, some organizations are expanding use of the SASE framework to the devices of users working at home, says Rishi Rajpal, vice president, global security at Concentrix.
This panel discussion was held at Information Security Media Group’s recent Cybersecurity Summit: India & SAARC.
In this video: the three experts address:
- Various scenarios for deploying SASE;
- Ensuring contextual access to identity in real time;
- Using a subscription-based model for improved security.
As CISO at Indian Oil Co., Sharma is responsible for maintaining cybersecurity operations, infrastructure and governance. He has more than two decades of experience.
Sidhu, senior vice president and head of information security services group at Wells Fargo Enterprise Global Services - India, holds certifications in IT risk management and IT governance.
Rajpal is vice president, global security at Concentrix. He has more than 20 years of global experience and deep expertise in information security with a specialization in risk management, security tools, and technologies, compliance, and privacy.