Governance & Risk Management , Insider Threat , Zero Trust

How Organizations Can Leverage SASE

Zscaler's Lee Dolsen on the Benefits and Challenges
How Organizations Can Leverage SASE

The secure access service edge model, or SASE, treats identity as the new perimeter, says Lee Dolsen Singapore-based chief architect for Zscaler in the Asia Pacific region, who offers implementation insights.

"We leverage identity to provide access to applications with an appropriate level of security based on the context of the user and the device and where they are coming from," Dolsen explains in an interview with Information Security Media Group.

SASE uses a proxy-based architecture, rather than a firewall-based architecture, Dolsen says. "A proxy-based architecture is a full gateway coming from the user as a client to the proxy. The proxy then has the ability to do comprehensive inspection and control and initiates another session onto the server."

In this interview (see audio link below photo), Dolsen also discusses:

  • How SASE works and what architectural changes are required;
  • Why SASE implementation is critical in the current environment;
  • How SASE can be applied when there are multiple vendors involved.

Dolsen, chief architect for Zscaler's Asia Pacific business, has more than 20 years of experience in the IT industry, focusing on various aspects of internet security and content delivery.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.