Virtual Conference Provided a Great Framework on How to Begin Implementing SASE
I was one of the many people who attended a virtual SASE (Secure Access Service Edge) Cybersummit hosted by Forcepoint yesterday, and based upon the virtual attendees’ reactions and their intense engagement, I’d say it was an unqualified success. Well done Forcepoint and all of those who supported the event!
The SASE security construct, popularized by Gartner’s 2019 “The Future of Network Security is in the Cloud” report, is an acronym that everybody in the networking space will be very familiar with soon – if they are not already. Why? Because it offers a pragmatic approach to securing the modern enterprise network. Today, as a result of digital transformation efforts, that network is defined by apps, data, and users that are all spread across many locations.
SASE highlights the need to shift the security focus to the user identity and/or the identity of the device accessing data and applications, instead of depending on the traditional data center perimeter. SASE-inspired solutions define a set of integrated, cloud-delivered security capabilities that can enforce access and use policies at the user/device edge – the new policy enforcement point.
The format of the event was great and I hope that other virtual event organizers take notice. Content was shared in a handful of 30-minute sessions, each building off the previous one. This provided a valuable pragmatic blueprint for how attendees can plan and implement their SASE journeys. John Peterson -- JP, to his friends -- Ericom’s Chief Product Officer, co-presented one of the sessions. He highlighted how Ericom’s Remote Browser Isolation (RBI) service, Ericom Shield, integrates with Forcepoint’s Web and Email Security gateways to provide a key SASE capability, securing users’ interactions with the web and protecting them from phishing attacks.
JP covered how Ericom’s RBI prevents ransomware, advanced web threats, and phishing attacks from reaching user endpoints by executing active web content in a remote, isolated container. He showed that when users browse to a malicious site or click a URL embedded in a phishing email, they are kept completely safe since no web content is ever executed directly on their device. An interactive rendering of the website is sent to a device's browser, providing a safe, fully natural, and seamless browsing experience. He also discussed how, for additional phishing protection, websites launched from URLs in emails can be rendered in read-only mode to prevent users from entering credentials.
We’re thrilled to be able to include a short version of JP’s presentation for those of you who could not be there.
I enjoyed all of the presentations and discussions, but I wanted to give special mention to the Keynote by Ramin Beheshti, Group Chief Product and Technology Officer at Dow Jones. The perspectives shared during the Fireside Chat by Carrie Staugler, Insider Threat Manager at PayPal, and in the other sessions by Kimberly Finnigan Zink, Global Information Security Compliance Officer, GlobalFoundries, and Elie Abouzeid, DentaQuest Vice President, Information Security also provided valuable insights regarding the benefits that organizations are seeing from implementing the SASE security framework.
It’s clear that Forcepoint is becoming a SASE leader. By building out a powerful platform, based on a mix of organic and partner-provided solutions, it is providing organizations with a full set of integrated SASE capabilities. I’m excited about Ericom’s partnership with a thought leader in the rapidly growing SASE cybersecurity community and the impact that it affords us on improving the security outcomes of our joint customers.