Edgeconnect and SASE Presentation
Edgeconnect and SASE Presentation
This is a sample
Network Access Security
title
withslide
Aruba SASE
Speaker name and
Iman Manarul title
Arifin
Month DD, 20YY
November 2023
Confidential | Authorized
COMPLETE CAMPUS LEADER : 17x WIRED/WIRELESS and 6x SDWAN
CONSECUTIVE GARTNER LEADER
HPE (Aruba) Positioned as a Leader in the Gartner Magic Quadrant for SD-WAN
ZTNA SWG
CASB DEM
EdgeConnect EdgeConnect
EdgeConnect Lite Atmos ZTNA EdgeConnect SD-Branch SD-WAN
Micro Branch
Mobile Devices and End Users Branch, Campus, Cloud and Datacenter
MPLS 8 5 4 2 99.5%
44 hours downtime per year
8 7 6 5 4 3 2 1 Silver Peak Live View monitors network underlay
and application overlay performance in real time
INTERNET 7 6 3 1
98.0%
EdgeConnect
175 hours downtime per year
Application name
DNS/URL • Quality of service
Application-driven
Addresses policy • Availability & SLA objective
Ports • Segmentation
…. • Breakout vs. backhaul
• Security policy
Role • Routing policy
Device type • Optimization policy
From Context-driven
Clearpass Username policy • WAN Policy
Security
• To SASE
posture
….
The SDWAN Solution with Detail User/Device Identity and Role
Visibility/Policy
Identity Role
jhendricks Dev
camera2209 Camera
camera2247 Camera
General Identity
jhendricks Dev
spingkerton Dev
fnowitzki Dev
User/Device jhendricks
jhendricks Dev
Role Dev
spingkerton Dev
Group ENGINEERING fnowitzki Dev
Domain SPEAK jhendricks Dev
MAC 00:00:00:a1:2b:cc spingkerton Dev
OS Windows10 fnowitzki Dev
Posture HEALTHY spingkerton Dev
• Detailed identity information for every single flow showed in real time and historical
• Enables new reports based on identity, role, security posture
• Proactive Monitoring and Troubleshooting before problem might arise
EDGE SECURITY : ANATOMY OF A VPN-BASED
RANSOMWARE ATTACK
Firewall ACLs
User-1
Internet Firewall
User-2
VPNS EXPOSE IPs VPNs EXTEND NETWORK ACCESS VPNs GIVE OVER PRIVILEGED ACCESS
VPNs are like beacons, looking to be found. Unknown users from unknown devices are extended Once on the network, users can move laterally. In the event
Consequentially, IPs are exposed creating an attack surface network access, increasing attack surface. of a breach, cybercriminals can do a lot of damage due to
to be exploited. lack of segmentation.
Firewall ACLs
User Internet
THE INVISIBLE NETWORK APPLICATION ACCESS, NEVER NETWORK GRANULAR LEAST PRIVILEGE ACCESS
ACCESS
Inside-out connections make apps completely invisible and never Remote users only receive access to authorized applications App-to-user connections provide built-in app segmentation
exposed to the internet. without placing user or device on the corporate network. without complex network segmentation. One-to-one connections
make lateral movement impossible for unauthorized users.
Public Cloud
Benefits
• Visibility into all user traffic
Identity Provider
• Flexible policy assignment
• Simple for admins & users
SaaS
• SaaS application control
17
BUILT ON A THREE TIER CLOUD ARCHITECTURE
Main Cluster
Caching
• Traffic is never backhauled
TIER 2- Cloud providers & local hosting services because of Atmos cloud
architecture | +350 edges
Local PoPs
350 Edge
Locations
• Users receive continuous access
even if networks change
Block access
from risky
destinations
Define access to
internal and external
apps in a single
policy
Leverage rich
devices posture
for context
Use app tags to
simplify
management
Securely enable
developer workflows
App Discovery
ZTNA CASB
Zero Trust Network Access Cloud Access Security Broker
• Secure access to applications • Access private SaaS applications
hosted in private cloud/ DC • Data loss prevention
• Least privilege access • Monitor & block
• Agent or agentless upload/download from SaaS
• VPN replacement
SWG
Secure Web Gateway DEM
• Protect against malicious web Digital Experience Monitoring
traffic • Monitor user performance
• Provide URL and DNS • Troubleshoot user access issues
filtering for all traffic
21
One policy to easily control access to all apps
24
PREVENTING DATA LOSS/BREACH WITH AXIS DLP
25
AND ENSURE A GREAT USER EXPERIENCE TOO
26
Connect & Secure
Hybrid
Secure Third- Secure Access to
Workforce Party Access Cloud & Web
28
Customer Reference
• Apps hosted in IaaS, DC & • Unable to provide secure access • NVIDIA has very sensitive lab
SaaS to contractors to build business environments with highly P&C
Proble • 30K+ users accessing via a mix critical applications research facilities
m of EVP, VPN and VDI • Challenge brokering access • Lacked visibility into unmanaged
connections users and devices, user behaviour
between networks due to M&A
of hotel properties and access control
• Axis agentless ZTNA third • Axis was able to set up remote • Axis agentless ZTNA improved user
party access solution reduced access for their HR application experience for 3rd parties
cost 5-10x per user while in less than 30mins • Accelerated access to private apps
Impact accelerating the time to across geographically distributed
provision access • During Covid, ZTNA agent & network
agentless was rolled out to • Looking at full VPN replacement in
10K+ employees / contractors Phase 2
29
THANK
YOU