iTnews
  • Home
  • Videos
  • Partner Content
Partner Content

SASE can reduce vendor sprawl, minimise costs and enhance network security

By Staff Writer
May 20 2024 9:34AM

Vendor and tool sprawl is a significant problem for security teams with Gartner finding that enterprises have dozens of different security solutions in place to counter the threats and risks they face.

Australia is also facing a significant skills shortage in cybersecurity with AustCyber forecasting a shortfall of 17,000 works by 2026.


Robert Nobilo, the solutions lead for secure networking at Fortinet, says deploying, managing and monitoring so many tools demands a different approach.

“With so many different security tools, managing, patching and tuning them can become extremely complex. Also, the lack of native integration to get a complete view of network security is driving organisations towards consolidation,” he says.

Integrating those tools can be very difficult, with many organisations opting for centralisation where the data from different tools is aggregated into a central repository. And while artificial intelligence (AI) is often touted as a solution to the challenge of finding threats and attacks from within all that data, it’s not a silver bullet.

“AI is only as good as the information that goes into the large language models,” says Nobilo. “Finding the right resources to enrich the AI is one of the biggest challenges that we’re facing and the skills shortage we’re seeing impacts AI experts as well as cybersecurity.”

The shift towards cloud and hybrid cloud, hybrid and remote teams, and distributed networks has often been secured by adopting point solutions for each change to the network and user environment. Consolidating the number of tools by looking for a platform that can provide the same or better security than five or more separate applications or services removes complexity and reduces the burden on security teams

Secure Access Service Edge (SASE) provides a platform that can support organisations as they seek to consolidate their security stack so they can minimise costs while enhancing security and enforcing consistent policies across the entire network.

Nobilo says there are three key steps organisations need to take to start the journey towards SASE and platform consolidation.  

“Start by looking at your renewal schedules. Then look at your top priority projects. Is it WAN optimisation? Is it Zero Trust Network Access (ZTNA)? Are you looking at secure internet access? And finally focus on resourcing. Without the resources or the project plans in place to roll a SASE out, you're not going to have a successful deployment.”

SASE gives organisations a way to consolidate the number of different security tools they must maintain and monitor. SASE simplifies and enhances network security while reducing costs and ensuring consistent policies across the entire security stack.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
cyber securitypartner contentsasesecuritysoftwarestate of security 2024

Related Articles

  • ChatGPT still not meeting European data accuracy standards ChatGPT still not meeting European data accuracy standards
  • eSafety and foreign regulators to sync content bans and oversight schemes eSafety and foreign regulators to sync content bans and oversight schemes
  • Automic CIO scratches itch for weekly security improvements Automic CIO scratches itch for weekly security improvements
  • Home Affairs' ICT modernisation needs backed by another review Home Affairs' ICT modernisation needs backed by another review

Partner Content

Why you should use the cloud to secure your cloud
Partner Content Why you should use the cloud to secure your cloud
Working “out in the open” with a psychological safety net
Partner Content Working “out in the open” with a psychological safety net
State of Security 2024
State of Security 2024
Securing the Future: Identity Takes Centre Stage in Business Operations
Partner Content Securing the Future: Identity Takes Centre Stage in Business Operations

Sponsored Whitepapers

Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Gain an independent witness with body-worn cameras
Trust Imperative 4.0
Trust Imperative 4.0
Centralized Remote Connectivity for State & Local Government
Centralized Remote Connectivity for State & Local Government
Global Employee Experience Trends Report
Global Employee Experience Trends Report
Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney

IoT and AI data revolution: 40+ experts to lay out how organisations can accelerate productivity and sustainability at IoT Impact in Sydney

AI is a force multiplier in the fight against cybercriminals

AI is a force multiplier in the fight against cybercriminals

SASE can reduce vendor sprawl, minimise costs and enhance network security

SASE can reduce vendor sprawl, minimise costs and enhance network security

LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing

LISTEN: Building a Sustainable Future: OVHcloud's Vision for Eco-Friendly Cloud Computing

Digital Nation

Health tech startup Kismet raises $4m in pre-seed funding
Health tech startup Kismet raises $4m in pre-seed funding
State of Security 2023
State of Security 2023
How eBay uses interaction analytics to improve CX
How eBay uses interaction analytics to improve CX
COVER STORY: What AI regulation might look like in Australia
COVER STORY: What AI regulation might look like in Australia
More than half of loyalty members concerned about their data
More than half of loyalty members concerned about their data
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.