• Skip to primary navigation
  • Skip to content

NetMotion Software

  • SOLUTIONS
    • Zero trust access
    • Experience monitoring
    • Enterprise VPN
    • SASE
  • PLATFORM
    • NetMotion cloud
    • How it works
    • Devices & deployment
    • Analytics & visibility
    • Policy controls
  • COMPANY
    • About
    • Customers
    • Careers
    • News
    • Management
    • Contact
  • SECTORS
    • Legal
    • Finance
    • Public safety
    • Healthcare
    • Transport
    • Utilities
  • PARTNERS
    • Alliances
    • Resellers
    • Network operators
  • INSIGHTS
    • Blog
    • Reports
    • Analysts
    • Case studies
    • Webinars
    • Videos
  • DEMO
  • SUPPORT
  • EN

Products/Solutions

Inside NetMotion: A security engineer’s view of SASE

September 3, 2021

By: Jose Navarro | September 3, 2021

SASE. It sounds good, doesn’t it? Fresh, nice, and very futuristic. Who wouldn’t want to be part of the SASE world? But what is SASE? 33% of IT leaders cannot confidently describe SASE, so let’s change that.

The term SASE was first coined in 2019 by Gartner’s leading security analysts Neil MacDonald, Lawrence Orans and Joe Skorupa. It refers to Secure Access Service Edge and signifies a shift from conventional data center networking and security service stacks into cloud-enabled architectures that move user and endpoint identity to the edge.

Making sense of SASE

As one of NetMotion’s EMEA security engineers, I wanted to share my thoughts about SASE, and the adoption of this framework as more organisations pivot to cloud-based applications and services that cater to their hyper-mobile workforce.

I remember when I first heard the term SASE. It was a journey of discovery that exposed me to new technologies, drivers, challenges, strategies and more. We engineers are always looking for new services, technologies and capabilities that drive business to enhance security and the user experience.

“But SASE can’t be categorized as a capability, a feature or a checkbox that can be turned on in security infrastructure devices. It’s a framework composed of multiple capabilities to embrace the current digital business transformation.”

– Jose Navarro, Security Engineer

Some of those capabilities include SD-WAN, SWG, CASB, NGFW and ZTNA. A lot of acronyms, for sure. As a security engineer it can sometimes be a daunting task to discuss how new technologies and capabilities may fit into an existing security and network posture, and ultimately how these can adapt to mid- and long-term business goals.


The forecast is cloudy
The cloud has become a huge buzzword but most organizations aren't ready to go 100% cloud. For most, a hybrid
View
Best practices in legal IT: Andrew Black, Muckle LLP
For many organizations, 2020 was an enormous catalyst for digital transformation. What normally would have taken several years was compressed
View
The future of network security is in the cloud
The shift to cloud and everything-as-a-service has been underway for more than a decade, but the global pandemic of 2020
View
What is zero trust? Uncovering zero trust network myths
What is zero-trust: Network security has become an increasingly hot topic during the past year. What network security myths are
View
Attracting and retaining the best talent: what IT can do to help
As businesses re-open, attracting and retaining talent will depend more than ever on the IT team's influence. Here's how they
View
Improve Microsoft Cloud Services with seamless security and employee experience enhancements
As users and consumers of data, most of us are so accustomed to having immediate access to the content, apps
View
How well do IT pros really understand Zero Trust?
Adopting SASE is the right thing to do, but it's hard to know where to begin. Zero Trust may be
View
NetMotion & Zebra announce official validation of joint solution for distributed workforces
NetMotion has achieved Zebra validation, making our platform an even better choice for any organization looking to improve productivity, connectivity
View
Microsoft365: new data reveals the number one priority in IT and the challenges with implementation
As companies consider a new hybrid working environment, how does M365 fit into the picture with SASE, zero trust and
View
The Australian workforce needs to be more secure than ever before
At NetMotion, our SDP, VPN and Experience monitoring technologies are improving lives of remote workers everywhere, and trusted by more
View
1 2 3 Next »

There are a lot of variables to consider, too, such as the number of consoles required to manage the security posture, issues with configuration complexity, skillsets, scalability, speed, and visibility. Taking this view is especially important when one of the goals is to eliminate work that could be considered unnecessary.

A cloud-based world

SASE was born to address the numerous problems caused by relying on network security architectures being at the center of connectivity in a data center. Legacy applications cannot efficiently support newer networking ideologies and use cases, such as the presence of increasingly dynamic cloud environments, hosting platforms such as AWS/Azure/GCP, productivity platforms such as Office 365, powerhouse CRM applications like Salesforce and other SaaS type offerings. The impact of remote working also cannot be ignored, as it drives a growing number of enterprises to adopt distributed data.

When it comes to SASE security, the exact same concepts exist as before. So, on a high level, it’s still all about confidentiality, integrity and availability of data, the ‘CIA’ triad. All information security vulnerabilities, exploits, and attacks pertain to one or more of the three components of this triad. In practice, this means protecting devices, users, applications, workloads, and data itself from issues.

The million-dollar question

And here comes the $1 million question we all need to ask – if we move to a more mobile architecture, embracing a cloud strategy and digitalisation of services – how do we protect business now that the threats are also more distributed and dynamic? And how do we secure our employees when they can be located anywhere, on any network?

The answer starts 25 years ago.

“Security has always been based on trust. It’s the fundamental principle that helps customers reduce risk.”

– Jose Navarro, Security Engineer

Firewalls came about because of the need for trust. First it was trust in IP addresses, resulting in a firewall to segment the network. Next came a need to trust files, leading to the use of software-based antivirus tools. Then trust in URLs, applications, packet content, workload, users, etc. Over the years, the need for trust grew, and has continued to grow. Many customers are now using various solutions from different vendors to establish trust, and many times even this effort is not helping.

Traditional network and network security architectures were designed for an era when the enterprise data center was the physical center of access requirements for users and devices. Now, neither the users nor the applications are located centrally, meaning that this security infrastructure is unable to see, identify or block any remote threats and cannot effectively decrease the attack surface.

In this new, remote working world, bad actors have turned their attention to compromising end-user devices via phishing and social engineering through SMS, calls, WhatsApp, LinkedIn and Facebook. But also through software and protocol vulnerabilities, supply chain attacks and misconfiguration.

Overcoming challenges

The NetMotion platform, now a part of Absolute, is based on Zero Trust, meaning that by default it doesn’t trust any network, device or user without verification.

The platform constantly scans the user, ensuring identity through different authentication methods (NTLM, Radius, RSA, AAD, MFA, etc.), and confirms that the user is requesting access to legitimate data – either cloud-based or on-prem resources – and through an approved application within a specific time, from a secure device using specific network technology.

In fact, there are hundreds of different, dynamic conditions that can be customised by IT administrators. The minute a change occurs, admins can immediately block and enforce security measures, route, isolate or trigger remediation actions.


Ransomware – the scourge of our times
Ransomware attacks have become increasingly popular with cyber gangs with many security experts seeing ransomware as one of the fastest-growing
View
Creating a Cyber Security Culture with former Arsenal F.C IT Director, Christelle Heikkila
Do people know how to make noise about cybersecurity in their own organisation?” Christelle challenged the audience to think of
View
Demand for ZTNA continues its upward trajectory in 2022
Even as work from home mandates are rolled back, most organizations are finding that ‘work from anywhere’ policies are here
View
What does “cyber resilience” mean to Legal IT?
In a nutshell, cyber resilience refers to a company's ability to mitigate damage (damage to systems, processes and reputation)
View
Where are you on the machine learning and artificial intelligence roadmap?
Perhaps it’s time for financial service organisations with a reputation for closed-door mentality to help drive the adoption of AI/ML.
View
Are Brits better at digital collaboration?
UK organisations are twice as likely as their American counterparts to consider collaboration as one of the main benefits of
View
A breach is coming: Bulletproof your firm’s security
We've all seen with some high profile breaches that the ripple effect can be devastating and long lasting. For law
View
The future of network security is in the cloud
The shift to cloud and everything-as-a-service has been underway for more than a decade, but the global pandemic of 2020
View
What is zero trust? Uncovering zero trust network myths
What is zero-trust: Network security has become an increasingly hot topic during the past year. What network security myths are
View
The Australian workforce needs to be more secure than ever before
At NetMotion, our SDP, VPN and Experience monitoring technologies are improving lives of remote workers everywhere, and trusted by more
View
1 2 3 … 5 Next »

Let’s use a hypothetical breach as an example of how Zero Trust works. If malware, spyware, a worm, a trojan, rootkit or APT makes it to a remote device, the Zero Trust platform will isolate it. In the dark, it won’t be able to execute or move laterally through the network.

Because NetMotion lives on the end device and can be managed as a SaaS service or on-prem, we can block traffic even before it comes off the device. This removes the attack surface, making the solution much more efficient from a performance standpoint as well as enabling complete visibility into what’s going on and making it easier to respond to incidents.

– Jose Navarro, Security Engineer, NetMotion

In addition to these security advances, the ability to set QoS parameters improves voice and video, helping users who may be struggling with packet loss due to remote network conditions. We employ error correction protocols and handle up to 30% packet loss that improve user experience.

With so many building blocks, there is no single vendor who can claim to be an expert in all things SASE. For many security professionals the world of ‘SASE’ may seem challenging, but since it’s here to stay my advice would be to embrace it with open arms.


Continue reading…

  • Ransomware – the scourge of our times
  • Creating a Cyber Security Culture with former Arsenal F.C IT Director, Christelle Heikkila
  • Demand for ZTNA continues its upward trajectory in 2022
  • What does “cyber resilience” mean to Legal IT?
  • Where are you on the machine learning and artificial intelligence roadmap?

Meet the secure virtual private network that's purpose-built for mobile workers. Your free evaluation of NetMotion Mobility® starts here.

Keep Reading

Ransomware – the scourge of our times

Security

Creating a Cyber Security Culture with former Arsenal F.C IT Director, Christelle Heikkila

Security

Demand for ZTNA continues its upward trajectory in 2022

Products/Solutions Remote Working Security

  • Customer Portal
  • Knowledge Base
  • Support and Services
  • Training
  • Support Plans
  • Professional Services
  • Release updates
  • Security Advisories
  • Support Advisories
  • Supported Systems
  • Disclosure policy


Jose Navarro
Jose Navarro

Try the software for 30 days, for free


Get Started
  • SASE
  • Company
  • Sectors
  • Partners
  • Resources

Secure remote access, without sacrificing on experience.

LinkedIn Twitter instagram youtube Email
  • SASE
    • ZTNA
    • DEM
    • VPN
    • SD-WAN
    • SWG
    • FWaaS
    • CASB
  • Company
    • Customers
    • Careers
    • News
    • Management
    • Privacy
    • Legal
    • Manage preferences
  • Sectors
    • Law firms
    • Finance
    • Public safety
    • Healthcare
    • Transport
    • Utilities
  • Partners
    • Alliances
    • Resellers
    • Verizon
    • AT&T
    • Telstra
    • Rogers
    • Microsoft
  • Resources
    • Blog
    • Reports
    • Analysts
    • Case studies
    • Webinars
    • Videos
    • Support

© 2022 NetMotion Software