Core Security

How are these core security technologies deployed? Core security technologies must be in place before moving towards a SASE architecture.

Cloud On-Prem Hybrid No Ownership
1. API Gateway
2. Email Gateway (with link sandboxing)
3. Remote Browser Isolation (RBI)
4. Endpoint Detection and Response (EDR)
5. Network Detection and Response (NDR)
6. Extended Detection and Response (XDR)
7. Security Information and Event Manager (SIEM)
8. Security Orchestration Automation and Response
9. Identity as a Service (IDaas)
10. Intelligent User and Entity Behavior Analytics (UEBA)

CNAPP

Cloud Native Application Protection Platform technologies are cloud native and look for misconfigurations in the cloud tenant that could cause security risks. Let us know if you own any of the following.

Ownership No Ownership
1. Cloud Security Posture Management (CSPM)​
2. Cloud Workload Protection Platform (CWPP)​
3. Kubernetes Security Posture Management (KSPM)​
4. Cloud Infrastructure Entitlement Management (CIEM)​
5. SaaS Security Posture Management (SSPM)
6. Security Information and Event Manager (SIEM)​
7. Infrastructure as Code (IaC)​

SD-WAN

Software defined wide area networking (SD-WAN) is a core component of SASE. It is a software-based approach leveraged by SASE to monitor and manage connectivity with dispersed data centers, offices and edges.

Is SD-WAN deployed in your environment?

Cloud
On-Prem
Hybrid
No Ownership

How is SD-WAN deployed in your environment?

  • Cloud
  • On-Prem
  • Hybrid
  • No Ownership
  • Not in environment or unsure

Next Gen-SWG

A cloud access security broker is a cloud service that sits between cloud service users and cloud applications (SaaS applications) to monitor all activity and enforce security policies within the application.

Is Secure Web Gateway deployed in your environment?

Cloud
On-Prem
Hybrid
No Ownership

How is your Secure Web Gateway deployed?

  • Cloud
  • On-Prem
  • Hybrid
  • No Ownership
  • Not in environment or unsure

Cloud Access Security Broker (CASB)

A cloud access security broker is a cloud service that sits between cloud service users and cloud applications (SaaS applications) to monitor all activity and enforce security policies within the application.

Is Cloud Access Security Broker deployed in your environment?

Cloud
On-Prem
Hybrid
No Ownership

How is Cloud Access Security Broker (CASB) deployed in your environment?

  • Cloud
  • On-Prem
  • Hybrid
  • No Ownership
  • Not in environment or unsure

DLP

DLP is a solution that monitors ingress and egress traffic, blocking traffic that contains sensitive information that could lead to a data breach or leak.

Is Data Loss Prevention deployed in your environment?

Cloud
On-Prem
Hybrid
No Ownership

How is Data Loss Prevention (DLP) deployed in your environment?

  • Cloud
  • On-Prem
  • Hybrid
  • No Ownership
  • Not in environment or unsure

Zero Trust

Zero Trust is a core component of the Security Service Edge (SSE) side of a SASE architecture. Through SASE, zero trust becomes flexible and easier to manage.

Is Zero Trust Network Access (ZTNA) deployed in your environment?

Cloud
On-Prem
Hybrid
No Ownership

How is ZTNA deployed in your environment?

  • Cloud
  • On-Prem
  • Hybrid
  • No Ownership
  • Not in environment or unsure

Firewall

Firewalls are instrumental to detecting and preventing network based attacks, how are your firewalls deployed?

Is a firewall deployed in your environment?

Cloud
On-Prem
Hybrid
No Ownership

How is security cloud firewall deployed in your environment?

  • Cloud
  • On-Prem
  • Hybrid
  • No Ownership
  • Not in environment or unsure

I’d like to receive my full SASE report

PDF for Form

Simplify SASE with K logix

Take the next step with your SASE readiness results

SASE Educational Session

Educate yourself, your team, and/or your executives with a customized in-depth SASE/SSE education session. Sessions may be tailored according to your SASE Readiness results, specific focus areas, and more.

SASE Program Session

Receive an in-depth assessment of your current maturity and actionable next steps to achieve a SASE architecture. Address and align to your specific requirements while identifying gaps and how to address them.

SASE Technology Session

Leverage K logix’s agnostic research to determine the best fit SASE technology. Clear the noise of cluttered SASE technologies.