SlideShare une entreprise Scribd logo
Secure Access
Service Edge
(SASE)
JOURNEY TO THE CLOUD IS
NOT OPTIONAL
Digital
Transformation
Apps
Everywhere
Remote
Users
THE EVOLUTION OF CLOUD
Complexity
1990s 2000s 2010s
CHALLENGES
Inconsistent
Security
Poor User
Experience
Management
Complexity
WHAT IS SASE
SASE
Networking Security
2021 SASE Trends Survey, ESG 2021 State of the Cloud Report, Flexera 2021 Gartner Magic Quadrant for
WAN Edge Infrastructure
Market trends for SASE
WHAT DOES SASE DO
● Converges networking and security services into one
unified, cloud-delivered solution
● Provides secure access capabilities to a variety of
distributed users, locations and cloud-based services
● Delivers on-demand services and policy enforcements
SASE USE CASES
OUR UNIQUE APPROACH
Next-Generation
Firewall
Prisma Access Panorama
Prisma SD-WAN
Secure Access
Service Edge (SASE)
Centralized
Management
Physical or
Virtual Firewall
a
HOW DOES PRISMA SASE WORK
Network as a Service Layer
Protects All App
Traffic
Complete, Best-in-
Class Security
Exceptional User
Experience
Mobile
Home
Branch/Retail
Autonomous Digital Experience Management (ADEM)
Security as a Service Layer
FWaaS CASB ZTNA Cloud SWG
SD-WAN
Segment-wise insights Auto-remediation
SaaS Public Cloud
Internet HQ/Data Center
Prisma Access
Prisma SD-WAN
(Formerly CloudGenix)
HIGH AVAILABILITY WITH CLOUD
SCALABILITY
Cloud-native architecture
designed on AWS & GCP
Built on biggest
backbones for global
accessibility
Multi-cloud design
ensures high performance
Retail Bank Enterprise
DATA
PLANE 1
DATA
PLANE 2
DATA
PLANE 3
Retail Bank Enterprise
COMMINGLED DATA
PLANE
Prevents other customers from
affecting your performance
One customer could adversely affect
all customers
PRISMA ACCESS OTHER SOLUTIONS
DATA PLANE ISOLATION FOR
SECURITY & PERFORMANCE
ADEM
IDENTIFY & REMEDIATE
AUTOMATE FINDING ISSUES AND RESOLVE THEM QUICKLY
VALUE OF PRISMA SASE
Unified Product Reduces
Security Risk
Provides Best User
Experience
FRAGMENTED SOLUTIONS IMPACT
SECURITY OUTCOMES
Separate products have disjointed management, disconnected policies, and scattered data
ZTNA 1.0 SWG CASB FW
Management
Policy
Data
COMPETITIVE LANDSCAPE
Zscaler
Cisco
NetSkope
VMWare
Fortinet
COMMON TERMS
Building Credibility
● Remote Access VPN
○ Most organizations have a remote access VPN used to access apps at HQ or the internal data center
○ Users typically disconnect from the VPN when they aren’t using internal apps
○ Users access cloud apps through HQ/datacenter
● Proxy / Secure Web Gateway (SWG)
○ Used to control and inspect web browsing, especially when user is not connected to VPN
○ Web browser connects to a proxy/SWG and does not secure non-web traffic
○ Creates problems with inconsistent security and management
● Off-Premise (Off-Prem)
○ Users and resources that are located outside of corporate network
● Zero-Trust Network Access (ZTNA)
○ Not to be confused with zero-trust, ZTNA is a technology category that focuses on denying access to
applications by default
○ It limits users to seeing and accessing only what they “need to know” after verifying their identity
WHAT TO ASK
● Where are you on your cloud journey?
○ As you move apps to the cloud, how are you enabling high-performance and
secure access to them?
● What percentage of your employees are remote now?
○ Has COVID changed your remote workforce strategy?
● How many branch locations do you have?
○ What does is your WAN Architecture look like, and do you know your WAN TCO?
WHY SELL PRISMA SASE
$15Bby 2025
Total Addressable Market
(TAM)
40%by 2024
Of Enterprises
Strategies to Adopt
SASE
42%by 2024
Compound Annual
Growth Rate
(CAGR)
76% of Global Office Workers Want to Continue Working from
Home post-COVID-19
WANT TO KNOW MORE
SASE for Dummies Gartner’s SASE Report
Help Me Sell - Prisma Access Help Me Sell - Prisma SASE
Technical Resources SASE Learning Path
Thank you
paloaltonetworks.com

Contenu connexe

Tendances

Presentation NetScaler SD-WAN
Presentation NetScaler SD-WANPresentation NetScaler SD-WAN
Presentation NetScaler SD-WAN
Michelle Guerrero Montalvo
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
Zscaler
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
Maganathin Veeraragaloo
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
Toshal Dudhwala
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
Hybrid IT Europe
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
Robb Boyd
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
itnewsafrica
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
JoniGarcia9
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
AlgoSec
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
Alberto Rivai
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise Management Associates
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
Cisco Canada
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
Zscaler
 
MPLS, SD-WAN and Cloud Network: The path to a better, secure and more afforda...
MPLS, SD-WAN and Cloud Network: The path to a better, secure and more afforda...MPLS, SD-WAN and Cloud Network: The path to a better, secure and more afforda...
MPLS, SD-WAN and Cloud Network: The path to a better, secure and more afforda...
CatoNetworks
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
Maticmind
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 
China Telecom Americas: SD-WAN Overview
China Telecom Americas:  SD-WAN OverviewChina Telecom Americas:  SD-WAN Overview
China Telecom Americas: SD-WAN Overview
Vlad Sinayuk
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
Atanas Gergiminov
 

Tendances (20)

Presentation NetScaler SD-WAN
Presentation NetScaler SD-WANPresentation NetScaler SD-WAN
Presentation NetScaler SD-WAN
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Multi cloud security architecture
Multi cloud security architecture Multi cloud security architecture
Multi cloud security architecture
 
Enterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WANEnterprise WAN Evolution with SD-WAN
Enterprise WAN Evolution with SD-WAN
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Extending Security to EVERY Edge
Extending Security to EVERY EdgeExtending Security to EVERY Edge
Extending Security to EVERY Edge
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
 
5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice5 Steps to a Zero Trust Network - From Theory to Practice
5 Steps to a Zero Trust Network - From Theory to Practice
 
Palo Alto Networks CASB
Palo Alto Networks CASBPalo Alto Networks CASB
Palo Alto Networks CASB
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
SD-WAN plus cloud security
SD-WAN plus cloud securitySD-WAN plus cloud security
SD-WAN plus cloud security
 
MPLS, SD-WAN and Cloud Network: The path to a better, secure and more afforda...
MPLS, SD-WAN and Cloud Network: The path to a better, secure and more afforda...MPLS, SD-WAN and Cloud Network: The path to a better, secure and more afforda...
MPLS, SD-WAN and Cloud Network: The path to a better, secure and more afforda...
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
China Telecom Americas: SD-WAN Overview
China Telecom Americas:  SD-WAN OverviewChina Telecom Americas:  SD-WAN Overview
China Telecom Americas: SD-WAN Overview
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 

Similaire à palo-alto-networks-sase-overview-deck.pptx

SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
bayusch
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
QOS Networks
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
Sangfor Technologies USA
 
SD-WAN PROTOCOLS
SD-WAN PROTOCOLSSD-WAN PROTOCOLS
SD-WAN PROTOCOLS
bilal anjum
 
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdfrsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
Richard Smiraldi
 
Net foundry two page platform overview+use cases
Net foundry two page platform overview+use casesNet foundry two page platform overview+use cases
Net foundry two page platform overview+use cases
Stefan Johansson
 
Net foundry two page platform overview with use cases
Net foundry two page platform overview with use casesNet foundry two page platform overview with use cases
Net foundry two page platform overview with use cases
Stefan Johansson
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Ciaran Roche
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
Robb Boyd
 
SD WAN
SD WANSD WAN
SD WAN
Bri Molina
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
 
2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market
QOS Networks
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
Cisco Canada
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network final
AlgoSec
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
Tata Tele Business Services
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
Selena829218
 
How to Secure Multi-Cloud through SD-WAN
How to Secure Multi-Cloud through SD-WANHow to Secure Multi-Cloud through SD-WAN
How to Secure Multi-Cloud through SD-WAN
Digital Carbon
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Angel Villar Garea
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
MuhammadSajidAbdulga
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
ThousandEyes
 

Similaire à palo-alto-networks-sase-overview-deck.pptx (20)

SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
Sangfor SSL VPN Brochure
Sangfor SSL VPN BrochureSangfor SSL VPN Brochure
Sangfor SSL VPN Brochure
 
SD-WAN PROTOCOLS
SD-WAN PROTOCOLSSD-WAN PROTOCOLS
SD-WAN PROTOCOLS
 
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdfrsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
 
Net foundry two page platform overview+use cases
Net foundry two page platform overview+use casesNet foundry two page platform overview+use cases
Net foundry two page platform overview+use cases
 
Net foundry two page platform overview with use cases
Net foundry two page platform overview with use casesNet foundry two page platform overview with use cases
Net foundry two page platform overview with use cases
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
 
TechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN SecurityTechWiseTV Workshop: SD-WAN Security
TechWiseTV Workshop: SD-WAN Security
 
SD WAN
SD WANSD WAN
SD WAN
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
 
2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market2021 Predictions and Trends for the SD-WAN and Edge Market
2021 Predictions and Trends for the SD-WAN and Edge Market
 
Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
SDN's managing security across the virtual network final
SDN's managing security across the virtual network finalSDN's managing security across the virtual network final
SDN's managing security across the virtual network final
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
 
Draft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | SlideshareDraft Juniper Experience First Networking | Slideshare
Draft Juniper Experience First Networking | Slideshare
 
How to Secure Multi-Cloud through SD-WAN
How to Secure Multi-Cloud through SD-WANHow to Secure Multi-Cloud through SD-WAN
How to Secure Multi-Cloud through SD-WAN
 
Gigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX DeploymentsGigamon Pervasive Visibility into SDDC/NSX Deployments
Gigamon Pervasive Visibility into SDDC/NSX Deployments
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
06_08_emea_how_to_evaluate_rollout_and_operationalize_your_sdwan_projects_web...
 

Dernier

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
architagupta876
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 

Dernier (20)

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
AI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptxAI assisted telemedicine KIOSK for Rural India.pptx
AI assisted telemedicine KIOSK for Rural India.pptx
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 

palo-alto-networks-sase-overview-deck.pptx

  • 2. JOURNEY TO THE CLOUD IS NOT OPTIONAL Digital Transformation Apps Everywhere Remote Users
  • 3. THE EVOLUTION OF CLOUD Complexity 1990s 2000s 2010s
  • 6. 2021 SASE Trends Survey, ESG 2021 State of the Cloud Report, Flexera 2021 Gartner Magic Quadrant for WAN Edge Infrastructure Market trends for SASE
  • 7. WHAT DOES SASE DO ● Converges networking and security services into one unified, cloud-delivered solution ● Provides secure access capabilities to a variety of distributed users, locations and cloud-based services ● Delivers on-demand services and policy enforcements
  • 9. OUR UNIQUE APPROACH Next-Generation Firewall Prisma Access Panorama Prisma SD-WAN Secure Access Service Edge (SASE) Centralized Management Physical or Virtual Firewall
  • 10. a HOW DOES PRISMA SASE WORK Network as a Service Layer Protects All App Traffic Complete, Best-in- Class Security Exceptional User Experience Mobile Home Branch/Retail Autonomous Digital Experience Management (ADEM) Security as a Service Layer FWaaS CASB ZTNA Cloud SWG SD-WAN Segment-wise insights Auto-remediation SaaS Public Cloud Internet HQ/Data Center Prisma Access Prisma SD-WAN (Formerly CloudGenix)
  • 11. HIGH AVAILABILITY WITH CLOUD SCALABILITY Cloud-native architecture designed on AWS & GCP Built on biggest backbones for global accessibility Multi-cloud design ensures high performance
  • 12. Retail Bank Enterprise DATA PLANE 1 DATA PLANE 2 DATA PLANE 3 Retail Bank Enterprise COMMINGLED DATA PLANE Prevents other customers from affecting your performance One customer could adversely affect all customers PRISMA ACCESS OTHER SOLUTIONS DATA PLANE ISOLATION FOR SECURITY & PERFORMANCE
  • 13. ADEM IDENTIFY & REMEDIATE AUTOMATE FINDING ISSUES AND RESOLVE THEM QUICKLY
  • 14. VALUE OF PRISMA SASE Unified Product Reduces Security Risk Provides Best User Experience
  • 15. FRAGMENTED SOLUTIONS IMPACT SECURITY OUTCOMES Separate products have disjointed management, disconnected policies, and scattered data ZTNA 1.0 SWG CASB FW Management Policy Data
  • 17. COMMON TERMS Building Credibility ● Remote Access VPN ○ Most organizations have a remote access VPN used to access apps at HQ or the internal data center ○ Users typically disconnect from the VPN when they aren’t using internal apps ○ Users access cloud apps through HQ/datacenter ● Proxy / Secure Web Gateway (SWG) ○ Used to control and inspect web browsing, especially when user is not connected to VPN ○ Web browser connects to a proxy/SWG and does not secure non-web traffic ○ Creates problems with inconsistent security and management ● Off-Premise (Off-Prem) ○ Users and resources that are located outside of corporate network ● Zero-Trust Network Access (ZTNA) ○ Not to be confused with zero-trust, ZTNA is a technology category that focuses on denying access to applications by default ○ It limits users to seeing and accessing only what they “need to know” after verifying their identity
  • 18. WHAT TO ASK ● Where are you on your cloud journey? ○ As you move apps to the cloud, how are you enabling high-performance and secure access to them? ● What percentage of your employees are remote now? ○ Has COVID changed your remote workforce strategy? ● How many branch locations do you have? ○ What does is your WAN Architecture look like, and do you know your WAN TCO?
  • 19. WHY SELL PRISMA SASE $15Bby 2025 Total Addressable Market (TAM) 40%by 2024 Of Enterprises Strategies to Adopt SASE 42%by 2024 Compound Annual Growth Rate (CAGR) 76% of Global Office Workers Want to Continue Working from Home post-COVID-19
  • 20. WANT TO KNOW MORE SASE for Dummies Gartner’s SASE Report Help Me Sell - Prisma Access Help Me Sell - Prisma SASE Technical Resources SASE Learning Path

Notes de l'éditeur

  1. Gartner published research that described how all of these technologies would begin to converge into what’s known as a Secure Access Service Edge (or SASE, pronounced “sassy”). Their thesis is that “Digital business and edge computing have inverted access requirements, with more users, devices, applications, services and data located outside of an enterprise than inside”. SASE addresses the digital transformation that is underway at organizations and shows us that a cloud delivered security platform is needed to address this shift.
  2. The journey to the cloud presents two fundamental security challenges for organizations - how to enable users to access the public/hybrid cloud securely, and how to secure applications in the cloud. Prisma solves both problems by providing the most comprehensive visibility and security in the industry, protecting users, applications, and data, in all clouds (SaaS, Private, Hybrid Cloud and Public Cloud) regardless of where they are. Digital transformation is accelerating - driven by response to COVID 87% of all enterprises now make use of hybrid cloud (Flexera, 2020) Cloud provides greater business flexibility and agility This has led to apps and data going everywhere - SaaS, Public Cloud, on-prem. The world is hybrid. 87% of enterprises adopting hybrid cloud However, our latest analysis of more than 500 enterprise customers on Prisma Access shows that 53% all remote workforce threats are for non-web apps (non HTTP or HTTPS protocols). Work from anywhere - The future of work is remote 76% of global workers want to continue working from home (2020 Global Workplace Analytics Study) 48% of employees will work remotely at least some of the time in the post-pandemic world, compared to 30% before (2020 Gartner)
  3. Organizations have been forced to adopt an array of point products to handle different network and security requirements, such as secure web gateways, application firewalls, secure VPN remote access, SD-WAN, etc. For every product, there’s a policy and interface to manage, as well as its own set of logs. This is creating an administrative burden that introduces cost, complexity and gaps in security posture.
  4. Existing network approaches and technologies simply no longer provide the levels of security and access control digital organizations need. These organizations demand immediate, uninterrupted access for their users, no matter where they are located. With an increase in remote users and software-as-a-service (SaaS) applications, data moving from the data center to cloud services, and more traffic going to public cloud services and branch offices than back to the data center, the need for a new approach for network security has risen. Inconsistent Security: Users connecting from unsecured or unmanaged devices are granted the same access as users physically at HQ Implementing uniform policies across different vendors and products is extremely difficult and most organizations don’t do it Poor User Experience: Remote users experience latency when connecting to resources via VPN Backhauling of traffic to a central HQ for firewall and network security inspection causes additional connectivity issues Management Complexity: MPLS and site to site VPN management is difficult to manage and configure Scaling operations with hardware firewall, router, and switch deployments is time consuming Most vendor solutions lack required breadth and depth of functionality with integration across all components, a single management plane, and unified data model and data lake.
  5. Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept that Gartner described in the August 2019 report The Future of Network Security in the Cloud. SASE is the convergence of wide area networking, or WAN, and network security services like CASB, FWaaS and Zero Trust, into a single, cloud-delivered service model. According to Gartner, “SASE capabilities are delivered as a service based upon the identity of the entity, real-time context, enterprise security/compliance policies and continuous assessment of risk/trust throughout the sessions. Identities of entities can be associated with people, groups of people (branch offices), devices, applications, services, IoT systems or edge computing locations.” By removing multiple point products and adopting a single cloud-delivered SASE solution, organizations can reduce complexity while saving significant technical, human, and financial resources.
  6. Three fundamental shifts are driving the need for network transformation in the enterprise - hybrid work, cloud and digital transformation, and branch transformation. Hybrid Workforce has become the new normal and a requirement for many organizations due to the pandemic. Research indicates that organizations expect 62% of their employees to work in a remote or hybrid manner even after COVID-19 mandates are lifted (ESG Research Report, 2021 SASE Trends Survey, July 2021). As a result, most organizations are planning to support a model where the majority of employees can work fluidly between corporate offices, branch offices, home offices, or on the road. Cloud and Digital initiatives are driving organizations to invest more in SaaS and other public cloud services. Cloud adoption enables companies to be more agile, efficient and flexible, indicative of why 92% of all enterprises are now adopting a multi-cloud strategy (Flexera, 2021). Branch Transformation is well underway, driven by new hybrid work and digital transformation initiatives. Organizations are fundamentally changing the branch -- leveraging them as collaboration hubs rather than primary places of work -- while retailers are transforming the way they engage in-store with customers. This trend is fueling the demand for WAN transformation from legacy MPLS to SD-WAN and SASE. According to Gartner, by 2024 more than 60% of software-defined, wide-area network (SD-WAN) customers will have implemented a secure access service edge (SASE) architecture, compared with about 35% in 2020.
  7. SASE offerings will provide policy-based, software defined secure access from a network fabric in which enterprise security professionals can precisely specify the level of performance, reliability, security, and cost of every network session based on identity and context. SASE securely enables the dynamic access requirements of digital transformation, providing secure access capabilities to a variety of distributed users, locations and cloud-based services. Enterprise demand for cloud-based SASE capabilities, and market competition and consolidation, will redefine enterprise network and network security architectures and reshape the competitive landscape.
  8. Mobile Users - The #1 strategic priority for CIOs, post-COVID - …a typical employer can save about $11,000/year for every person who works remotely half of the time. Securing mobile users with traditional types of network security can be a challenge, especially when users work in areas where you don’t have IT staff or it’s cost-prohibitive to have IT staff in many locations. With the number of applications and workloads moving to the cloud, they need secure access to cloud applications and the Internet as well. Using cloud applications over remote-access VPN can hurt the user experience, and as a result, end users tend to avoid using remote-access VPN whenever possible. Branch & SD-WAN - SASE provides Significant cost-savings and ROI, enabling digital transformation Cloud adoption is affecting branch and retail networking strategies. With the growing number of applications in the cloud, it doesn’t make sense to carry all of an enterprise network’s traffic back to headquarters over expensive multiprotocol label switching (MPLS) connections. As a result, many organizations are adopting new strategies to redesign their wide area networks (WANs) to enable branch offices and retail stores to go directly to the cloud. With the drive to reduce the IT footprint at the branch in order to cut operational costs and reduce complexity, organizations are also looking for ways to reduce the amount of hardware that needs to be physically installed and managed at each location.
  9. Best-in-class security meets best-in-class SD-WAN, delivered from the cloud, with these suite of products Our PA-series Next-Generation Firewall hardware appliances are designed for simplicity, automation, and integration. As you are moving to the cloud, we believe a Secure Access Service Edge (SASE) is the right approach. Prisma Access + Prisma SD-WAN is our (SASE) solution for branch offices, retail locations and mobile users. With the addition of Prisma SD-WAN, customers can leverage machine learning and automation to simplify management, enable app-defined SD-WAN policies and implement a secure, cloud-delivered branch. Panorama gives you a single place to manage all of your Palo Alto Networks Next-Generation Firewalls.
  10. Prisma Access delivers the security and Prisma SD-WAN the networking that organizations need in a Secure Access Service Edge architecture designed for all traffic, all applications, and all users. Rather than creating single purpose technology overlays that are normally associated with point products, our SASE solution uses a common cloud-based infrastructure that delivers multiple types of security services, including advanced threat prevention, web filtering, sandboxing, DNS security, credential theft prevention, DLP and next-generation firewall policies based on user-to-application, and host information profile. The combination is the most comprehensive SASE solution in the industry. Our SASE solution provides: Protection for All App Traffic: Access to all apps and secures against all threats, not just web-based apps and threats, reducing the risk of a data breach. Complete, Best-in-class Security: Industry-leading capabilities converged into a single cloud-delivered platform, providing more security coverage than any other solution. Exceptional User Experience: Massively scalable network with ultra-low latency, backed by industry-leading SLAs, ensuring the best digital experience possible for end-users.
  11. A cloud-native architecture designed on the biggest backbones and across a multi-cloud manner ensures a high availability We take advantage of the highest performing, most available public cloud providers such as Google and AWS - and we have a private instance across their private back bones, with access to their private fiber and load balanced across their global backbones to deliver very high performance everywhere. What this allows our customers is to do is globally have their users, their branch offices, their applications, data centers, cloud locations, SaaS applications all come together on the back of this extremely powerful solution.
  12. Data plane isolation ensures a truly enterprise-grade multi-tenant environment without commingling data or having “noisy neighbors” impacting performance We’ve built our solution with enterprise-class multi-tenancy. What this means for you is we isolate every tenants’ and every customers data plane. This provides a more secure cloud environment and prevents other customers from affecting your performance or your data. Of course you’d expect this from any cloud security solution, however in the industry, many leading solutions have shared or commingled data planes. This creates a situation where a “noisy neighbor” that generates a bunch of traffic can adversely impact the performance of all shared customers on that data plane. Likewise, any potential security impact also will adversely impact all customers who are sharing that data plane. A The better approach that ensures the highest performance is an enterprise-class multitenant environment that provides true data plane isolation / dedicated data plane per each customer.
  13. native and pervasive visibility with ADEM that leverages all the deep insights to choreograph itself to deliver truly exceptional user experiences That’s where ADEM comes in. All the visibility that is required is being captured and analyzed so if there is a challenge, IT can identify it instantly and, more importantly remediate the situation. When you take all these three things into account, you can clearly see how Prisma Access is purpose-built and tailored to delivered the best user experiences: A cloud-native architecture designed on the biggest backbones and across a multi-cloud manner ensures a high availability Data plane isolation ensures a truly enterprise-grade multi-tenant environment without commingling data or having “noisy neighbors” impacting performance And native and pervasive visibility with ADEM that leverages all the deep insights to choreograph itself to deliver truly exceptional user experiences
  14. Unified Product Simplify Network Management and Operations Integrated SD-WAN simplifies site to site connectivity and remote user configuration Single pane of glass for role based access control and policy creation through Panorama Reduces security risk with consistent best-in-class network security across your entire enterprise Granular, identity based access control to applications and services, regardless of location Delivers protection to all applications (public cloud, private cloud, SaaS, internet) and protocols Full single pass inspection and detection capabilities including malware, behavior based IDS, exploit detection, DNS security, and data-loss prevention Provides Best User Experience through ADEM Cloud native architecture supports infinite, on-demand scalability Global, high-performance network of over 100 points of presence in 76 countries Industry-leading latency SLAs of less than 10ms. And native and pervasive visibility with ADEM that leverages all the deep insights to choreograph itself to deliver truly exceptional user experiences
  15. Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) Zscaler Internet Access is a secure web gateway built on a proxy architecture with add-ons like firewall and sandboxing to address security use cases. Low starting price for basic package, with expensive add-ons. Does not inspect all traffic. Requires separate Zscaler Private Access for access to public cloud/data center (as an offering in the Software Defined Perimeter market). Cisco AnyConnect and Umbrella Cisco AnyConnect is a traditional remote access VPN. Cisco pitches Umbrella for mobile user protection when the user disconnects from AnyConnect. Solution does not provide consistent security, and the multiple products are not integrated. Pulse Secure Remote access VPN spun off from Juniper. Does not provide comprehensive security. Company is moving to pivot away from remote access VPN to Software Defined Perimeter.
  16. Most organizations utilize remote access VPN for off-prem users that need access to internal applications. When these remote users need access to temporarily connect to the VPN when they need to use an application, and then disconnect to get better performance to internet/cloud. Users lose performance when connected to the VPN, and security teams lose visibility and control when users disconnect.
  17. The #1 strategic priority for CIOs, post-COVID - …a typical employer can save about $11,000/year for every person who works remotely half of the time. Big Revenue: Market to reach $15B by 2024 according to Gartner and 36% CAGR High Growth: Gartner expects that, “by 2024, at least 40% of enterprises will have explicit strategies to adopt SASE, up from less than 1% at year-end 2018.” A SASE architecture identifies users and devices, applies policy-based security, and delivers secure access to the appropriate application or data. This approach allows organizations to apply secure access no matter where their users, applications or devices are located.