SlideShare a Scribd company logo
1 of 38
Download to read offline
Strategies for Building a Migration Plan
SASE Network Transformation
Succeeding with SASE
David McClure
Technical Product
Marketing Manager
What We’ll Cover
Succeeding with SASE
Overview:
● Understanding SASE
● SASE Platform Migration considerations
● Cloudflare One
● Roadmap for Migration
Three major priorities across all business segments
Understanding SASE Driving Forces
Understanding SASE
SASE should be less complicated than many vendors are
making it
Succeeding with SASE
Secure access service edge defined
SASE is best described as a convergence of network and security capabilities into a single
platform that enables organizations to provide both security and accessibility for their
users and data. It should achieve this regardless of location, while maintaining visibility
and control, and reducing complexity.
Understanding SASE SASE Defined
Enterprise Networks were built for 2010
Understanding SASE Driving Forces
MPLS/
Leased
MPLS/
Leased
How we work changed, but the network did not
Understanding SASE Driving Forces
Network-as-
a-Service
SASE ZT Edge
Software
Defined
Perimeter
SDP
Zero Trust →
Adaptive
Trust
Zero Trust
ZTNA
Cloud native and software defined, centralized
policy enforcement, a single management and
data plane, robust visibility and logging
On-premise technologies shifted to a public
cloud, a portfolio of disparate acquisitions
The Industry has recognized this evolution
Understanding SASE
Secure access service edge components
5 Key Technologies:
● Zero Trust Network Access (ZTNA
● Secure Web Gateway (SWG
● Firewall-as-a-Service (FWaaS
● Cloud Access Security Broker (CASB
● Network-as-a-Service (NaaS
Understanding SASE SASE Defined
SASE Platform Migration
What should you look for when evaluating SASE platforms &
solutions?
Succeeding with SASE
Secure access service edge
Gartner, describing SASE in “The Future of Network Security is in the
Cloud”:
“Digital business transformation inverts network and security service
design patterns, shifting the focal point to the identity of the user
and/or device — not the data center. Security and risk management
leaders need a converged, cloud-delivered, secure access service
edge to address this shift.”
SASE Platform Migration
Secure access service edge
What to look for:
1. Current capabilities
2. High level of innovation
3. Integrated platform
4. Robust edge network
5. Scalable pricing model
SASE Platform Migration
Cloudflare One
A purpose-built platform designed to deliver on the promise
Network Transformation with a Secure Access Service Edge
Cloudflare One: Overview
Cloudflare One: Underlying Network
Every
Cloudflare
service
Runs over
every
Cloudflare
server
In every
Cloudflare
data center
Across 200
cities in
100
countries
15
25M
200
76B
99%
51 Tbps
Cloudflare One: Connect and secure applications and users
Encrypt user traffic  Regardless of your users’
location, all traffic from their device is encrypted and
sent privately to the nearest endpoint.
Build and enforce policies  Enforce device
authentication, enabling you to build user-specific
policies.
Audit device and user traffic  Audit specific user and
device traffic for detailed tracing in case of a breach or
audit.
Block web-based threats  Protect against known and
unknown threats by blocking known threats and
isolating unknown threats with Browser Isolation.
Provide granular access controls  Create granular
role-based access rules to internal and SaaS apps,
including MFA enforcement.
Secure remote workers with Cloudflare One
Cloudflare One: Secure your corporate network
Our battle tested network stack. In front of your corporate network.
17
DDoS Protection
Near-Instant TTM
IP Firewall Traffic
acceleration
Cloudflare One improves network
performance and security while
reducing cost and complexity.
SASE Migration Roadmap
Planning implementation steps 3, 6, & 12 months out
Succeeding with SASE
● 8,000 Employees
● Financial Services
● 3 Global Data Centers
Equinix hosted) moving
to Azure for Cloud
● 2 HQ  Chicago and
Brussels
● 42 Branch Offices
● Move more to Cloud
● Reduce overall cost
● Secure remote workers
MPLS
SDWAN
SDWAN
SWG
SWG
VPN
M
PLS
MPLS
1 to 3 Months - Zero Trust
and Remote Worker
Security
Step One
● First step in SASE
transformation
● Replaces VPN use cases
● Improves security
● Moves SWG/FWaaS to
the edge
● Eliminates backhauling
● Better user experience
MPLS
SDWAN
SDWAN
SWG
SWG
VPN
M
PLS
MPLS
MPLS
SWG
MPLS
SWG
M
PLS
SDWAN
SDWAN
VPN
● First step in cloud
transformation
● Replaces VPN use cases
● Improves security
● Moves SWG/FWaaS to
the edge
● Eliminates backhauling
● Better user experience
ZTNA
RBI | SWG
FWaaS | CASB
SWG
MPLS
SDWAN
SDWAN
MPLS
SWG
M
PLS
MPLS
SDWAN
SDWAN
SWG
SWG
M
PLS
SWG
MPLS
ZTNA
RBI | SWG
FWaaS | CASB
● First step in cloud
transformation
● Replaces VPN use cases
● Improves security
● Moves SWG/FWaaS to
the edge
● Eliminates backhauling
● Better user experience
3 to 6 Months - Branch
Offices
Step 2
● Leverages same ZT
architecture
● Eliminates need for firewall
and security appliances
onsite
● Improves and streamlines
global security
● Reduces costs
SWG
MPLS
SDWAN
SDWAN
MPLS
SWG
M
PLS
MPLS
SDWAN
SDWAN
SWG
SWG
M
PLS
SWG
MPLS
ZTNA
RBI | SWG
FWaaS | CASB
● Leverages same ZT
architecture
● Eliminates need for firewall
and security appliances
onsite
● Improves and streamlines
global security
● Reduces costs
ZTNA | SWG
FWaaS | CASB
MPLS
SWG
MPLS
SWG
M
PLS
SDWAN
SDWAN
● Leverages same ZT
architecture
● Eliminates need for firewall
and security appliances
onsite
● Improves and streamlines
global security
● Reduces costs
MPLS
SWG
MPLS
SWG
M
PLS
ZTNA
RBI | SWG
FWaaS | CASB
6 to 12 Months - Protect
your corporate network
Step 3
Cloudflare Network
Interconnect
● Move DDoS protection to
the edge
● Improves security
● Reduces need for onsite
appliances for DDoS
● Directly peer DC’s to
Cloudflare
● Improve performance
and reliability
MPLS
SWG
MPLS
SWG
M
PLS
Cloudflare rack
Customer rack
ZTNA
RBI | SWG
FWaaS | CASB
● Move more applications to
Cloud to reduce DC
footprint
● Apply consistent cloud
security policies across all
traffic
Cloudflare Network
Interconnect
MPLS
SWG
MPLS
SWG
M
PLS
Cloudflare rack
Customer rack
CNI
ZTNA
RBI | SWG
FWaaS | CASB
● Move more applications to
Cloud to reduce DC
footprint
● Apply consistent cloud
security policies across all
traffic
SWG
MPLS
SWG
CNI
ZTNA
RBI | SWG
FWaaS | CASB
● Eliminate need for security
appliances in HQ and DC
locations
● Apply consistent cloud
security policies across all
traffic
● Single pane of glass to
view all activity globally
● Reduce cost and
complexity of network
performance and security
SWG
MPLS
SWG
CNI
ZTNA
RBI | SWG
FWaaS | CASB
● Eliminate need for security
appliances in HQ and DC
locations
● Apply consistent cloud
security policies across all
traffic
● Single pane of glass to
view all activity globally
● Reduce cost and
complexity of network
performance and security
MPLS
CNI
CNI
ZTNA
RBI | SWG
FWaaS | CASB
Three major priorities across all business segments
Succeeding with SASE Defining Success
Questions?
Succeeding with SASE
Next Steps:
Succeeding with SASE
1. Read more about Cloudflare One:
cloudflare.com/cloudflare-one/
2. Set up a Cloudflare for Teams account (Zero Trust and Remote
Worker Security): dash.cloudflare.com/sign-up/teams
3. View the Cloudflare SASE Whitepaper:
Cloudflare SASE Whitepaper
Thank you
Succeeding with SASE
Be sure to check out the links in the Handouts
section.
David McClure
dmcclure@cloudflare.com

More Related Content

What's hot

Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust ModelYash
 
Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialAlibaba Cloud
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
Moving to the cloud: cloud strategies and roadmaps
Moving to the cloud: cloud strategies and roadmapsMoving to the cloud: cloud strategies and roadmaps
Moving to the cloud: cloud strategies and roadmapsJisc
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)Ahmed Banafa
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareCloudflare
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architectureHybrid IT Europe
 

What's hot (20)

Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Multi Cloud Architecture Approach
Multi Cloud Architecture ApproachMulti Cloud Architecture Approach
Multi Cloud Architecture Approach
 
Zero Trust Model
Zero Trust ModelZero Trust Model
Zero Trust Model
 
Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is Essential
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Moving to the cloud: cloud strategies and roadmaps
Moving to the cloud: cloud strategies and roadmapsMoving to the cloud: cloud strategies and roadmaps
Moving to the cloud: cloud strategies and roadmaps
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
What is zero trust model (ztm)
What is zero trust model (ztm)What is zero trust model (ztm)
What is zero trust model (ztm)
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Close your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with CloudflareClose your security gaps and get 100% of your traffic protected with Cloudflare
Close your security gaps and get 100% of your traffic protected with Cloudflare
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 

Similar to Succeeding with Secure Access Service Edge (SASE)

We are Net3 Technology
We are Net3 TechnologyWe are Net3 Technology
We are Net3 TechnologyKate Bissinger
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCiaran Roche
 
A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...National Retail Federation
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraZscaler
 
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...Amazon Web Services
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
Cloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesCloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesQBurst
 
Contrail SD-WAN: Secure, Automated Multicloud and Multi-site SD-Branch Connec...
Contrail SD-WAN: Secure, Automated Multicloud and Multi-site SD-Branch Connec...Contrail SD-WAN: Secure, Automated Multicloud and Multi-site SD-Branch Connec...
Contrail SD-WAN: Secure, Automated Multicloud and Multi-site SD-Branch Connec...James Kelly
 
Vmware vcloud nfv sdwan
Vmware vcloud nfv   sdwanVmware vcloud nfv   sdwan
Vmware vcloud nfv sdwanVersos
 
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Interoute
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'OpenStack Korea Community
 
Inteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivityInteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivityMarketingArrowECS_CZ
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
 
1cloudstar cloud connect azure
1cloudstar cloud connect azure1cloudstar cloud connect azure
1cloudstar cloud connect azure1CloudStar
 
Cloudamize Platform Training for Azure.pptx
Cloudamize Platform Training for Azure.pptxCloudamize Platform Training for Azure.pptx
Cloudamize Platform Training for Azure.pptxSasikumarPalanivel3
 

Similar to Succeeding with Secure Access Service Edge (SASE) (20)

We are Net3 Technology
We are Net3 TechnologyWe are Net3 Technology
We are Net3 Technology
 
Cloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran RocheCloud Networking Presentation - WAN Summit - Ciaran Roche
Cloud Networking Presentation - WAN Summit - Ciaran Roche
 
A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...A new way to connect and protect retail networks with secure enterprise SD-WA...
A new way to connect and protect retail networks with secure enterprise SD-WA...
 
Rethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation EraRethinking Cybersecurity for the Digital Transformation Era
Rethinking Cybersecurity for the Digital Transformation Era
 
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
Innovate - How AsiaPac is helping Customers to Build a Restricted Cloud Envir...
 
Cloud Migration - CCS Technologies (P) Ltd.
Cloud Migration - CCS Technologies (P) Ltd.Cloud Migration - CCS Technologies (P) Ltd.
Cloud Migration - CCS Technologies (P) Ltd.
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Cloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best PracticesCloud Migration Strategy and Best Practices
Cloud Migration Strategy and Best Practices
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
 
Enterprise Cloud Transformation
Enterprise Cloud TransformationEnterprise Cloud Transformation
Enterprise Cloud Transformation
 
Orange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakoutOrange Business Live 2013 cloud breakout
Orange Business Live 2013 cloud breakout
 
Contrail SD-WAN: Secure, Automated Multicloud and Multi-site SD-Branch Connec...
Contrail SD-WAN: Secure, Automated Multicloud and Multi-site SD-Branch Connec...Contrail SD-WAN: Secure, Automated Multicloud and Multi-site SD-Branch Connec...
Contrail SD-WAN: Secure, Automated Multicloud and Multi-site SD-Branch Connec...
 
Vmware vcloud nfv sdwan
Vmware vcloud nfv   sdwanVmware vcloud nfv   sdwan
Vmware vcloud nfv sdwan
 
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
 
Inteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivityInteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivity
 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
 
1cloudstar cloud connect azure
1cloudstar cloud connect azure1cloudstar cloud connect azure
1cloudstar cloud connect azure
 
Cloudamize Platform Training for Azure.pptx
Cloudamize Platform Training for Azure.pptxCloudamize Platform Training for Azure.pptx
Cloudamize Platform Training for Azure.pptx
 

More from Cloudflare

Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceCloudflare
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarCloudflare
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...Cloudflare
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Cloudflare
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataCloudflare
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondCloudflare
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cloudflare
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersCloudflare
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksCloudflare
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaCloudflare
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?Cloudflare
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cloudflare
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsCloudflare
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformationCloudflare
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cloudflare
 
Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflare
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaCloudflare
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 

More from Cloudflare (20)

Why you should replace your d do s hardware appliance
Why you should replace your d do s hardware applianceWhy you should replace your d do s hardware appliance
Why you should replace your d do s hardware appliance
 
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable WebinarDon't Let Bots Ruin Your Holiday Business - Snackable Webinar
Don't Let Bots Ruin Your Holiday Business - Snackable Webinar
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
 
Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...Network Transformation: What it is, and how it’s helping companies stay secur...
Network Transformation: What it is, and how it’s helping companies stay secur...
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Application layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare dataApplication layer attack trends through the lens of Cloudflare data
Application layer attack trends through the lens of Cloudflare data
 
Recent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respondRecent DDoS attack trends, and how you should respond
Recent DDoS attack trends, and how you should respond
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS AttacksKentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
Kentik and Cloudflare Partner to Mitigate Advanced DDoS Attacks
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?It’s 9AM... Do you know what’s happening on your network?
It’s 9AM... Do you know what’s happening on your network?
 
Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)Cyber security fundamentals (simplified chinese)
Cyber security fundamentals (simplified chinese)
 
Bring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teamsBring speed and security to the intranet with cloudflare for teams
Bring speed and security to the intranet with cloudflare for teams
 
Accelerate your digital transformation
Accelerate your digital transformationAccelerate your digital transformation
Accelerate your digital transformation
 
Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)Cyber security fundamentals (Cantonese)
Cyber security fundamentals (Cantonese)
 
Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策Cloudflareのソリューションを使用して悪意のあるBot対策
Cloudflareのソリューションを使用して悪意のあるBot対策
 
Stopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South AfricaStopping DDoS Attacks In South Africa
Stopping DDoS Attacks In South Africa
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 

Recently uploaded

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 

Recently uploaded (20)

SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 

Succeeding with Secure Access Service Edge (SASE)

  • 1. Strategies for Building a Migration Plan SASE Network Transformation Succeeding with SASE David McClure Technical Product Marketing Manager
  • 2. What We’ll Cover Succeeding with SASE Overview: ● Understanding SASE ● SASE Platform Migration considerations ● Cloudflare One ● Roadmap for Migration
  • 3. Three major priorities across all business segments Understanding SASE Driving Forces
  • 4. Understanding SASE SASE should be less complicated than many vendors are making it Succeeding with SASE
  • 5. Secure access service edge defined SASE is best described as a convergence of network and security capabilities into a single platform that enables organizations to provide both security and accessibility for their users and data. It should achieve this regardless of location, while maintaining visibility and control, and reducing complexity. Understanding SASE SASE Defined
  • 6. Enterprise Networks were built for 2010 Understanding SASE Driving Forces
  • 7. MPLS/ Leased MPLS/ Leased How we work changed, but the network did not Understanding SASE Driving Forces
  • 8. Network-as- a-Service SASE ZT Edge Software Defined Perimeter SDP Zero Trust → Adaptive Trust Zero Trust ZTNA Cloud native and software defined, centralized policy enforcement, a single management and data plane, robust visibility and logging On-premise technologies shifted to a public cloud, a portfolio of disparate acquisitions The Industry has recognized this evolution Understanding SASE
  • 9. Secure access service edge components 5 Key Technologies: ● Zero Trust Network Access (ZTNA ● Secure Web Gateway (SWG ● Firewall-as-a-Service (FWaaS ● Cloud Access Security Broker (CASB ● Network-as-a-Service (NaaS Understanding SASE SASE Defined
  • 10. SASE Platform Migration What should you look for when evaluating SASE platforms & solutions? Succeeding with SASE
  • 11. Secure access service edge Gartner, describing SASE in “The Future of Network Security is in the Cloud”: “Digital business transformation inverts network and security service design patterns, shifting the focal point to the identity of the user and/or device — not the data center. Security and risk management leaders need a converged, cloud-delivered, secure access service edge to address this shift.” SASE Platform Migration
  • 12. Secure access service edge What to look for: 1. Current capabilities 2. High level of innovation 3. Integrated platform 4. Robust edge network 5. Scalable pricing model SASE Platform Migration
  • 13. Cloudflare One A purpose-built platform designed to deliver on the promise Network Transformation with a Secure Access Service Edge
  • 15. Cloudflare One: Underlying Network Every Cloudflare service Runs over every Cloudflare server In every Cloudflare data center Across 200 cities in 100 countries 15 25M 200 76B 99% 51 Tbps
  • 16. Cloudflare One: Connect and secure applications and users Encrypt user traffic  Regardless of your users’ location, all traffic from their device is encrypted and sent privately to the nearest endpoint. Build and enforce policies  Enforce device authentication, enabling you to build user-specific policies. Audit device and user traffic  Audit specific user and device traffic for detailed tracing in case of a breach or audit. Block web-based threats  Protect against known and unknown threats by blocking known threats and isolating unknown threats with Browser Isolation. Provide granular access controls  Create granular role-based access rules to internal and SaaS apps, including MFA enforcement. Secure remote workers with Cloudflare One
  • 17. Cloudflare One: Secure your corporate network Our battle tested network stack. In front of your corporate network. 17 DDoS Protection Near-Instant TTM IP Firewall Traffic acceleration
  • 18. Cloudflare One improves network performance and security while reducing cost and complexity.
  • 19. SASE Migration Roadmap Planning implementation steps 3, 6, & 12 months out Succeeding with SASE
  • 20. ● 8,000 Employees ● Financial Services ● 3 Global Data Centers Equinix hosted) moving to Azure for Cloud ● 2 HQ  Chicago and Brussels ● 42 Branch Offices ● Move more to Cloud ● Reduce overall cost ● Secure remote workers MPLS SDWAN SDWAN SWG SWG VPN M PLS MPLS
  • 21. 1 to 3 Months - Zero Trust and Remote Worker Security Step One
  • 22. ● First step in SASE transformation ● Replaces VPN use cases ● Improves security ● Moves SWG/FWaaS to the edge ● Eliminates backhauling ● Better user experience MPLS SDWAN SDWAN SWG SWG VPN M PLS MPLS
  • 23. MPLS SWG MPLS SWG M PLS SDWAN SDWAN VPN ● First step in cloud transformation ● Replaces VPN use cases ● Improves security ● Moves SWG/FWaaS to the edge ● Eliminates backhauling ● Better user experience ZTNA RBI | SWG FWaaS | CASB
  • 24. SWG MPLS SDWAN SDWAN MPLS SWG M PLS MPLS SDWAN SDWAN SWG SWG M PLS SWG MPLS ZTNA RBI | SWG FWaaS | CASB ● First step in cloud transformation ● Replaces VPN use cases ● Improves security ● Moves SWG/FWaaS to the edge ● Eliminates backhauling ● Better user experience
  • 25. 3 to 6 Months - Branch Offices Step 2
  • 26. ● Leverages same ZT architecture ● Eliminates need for firewall and security appliances onsite ● Improves and streamlines global security ● Reduces costs SWG MPLS SDWAN SDWAN MPLS SWG M PLS MPLS SDWAN SDWAN SWG SWG M PLS SWG MPLS ZTNA RBI | SWG FWaaS | CASB
  • 27. ● Leverages same ZT architecture ● Eliminates need for firewall and security appliances onsite ● Improves and streamlines global security ● Reduces costs ZTNA | SWG FWaaS | CASB MPLS SWG MPLS SWG M PLS SDWAN SDWAN
  • 28. ● Leverages same ZT architecture ● Eliminates need for firewall and security appliances onsite ● Improves and streamlines global security ● Reduces costs MPLS SWG MPLS SWG M PLS ZTNA RBI | SWG FWaaS | CASB
  • 29. 6 to 12 Months - Protect your corporate network Step 3
  • 30. Cloudflare Network Interconnect ● Move DDoS protection to the edge ● Improves security ● Reduces need for onsite appliances for DDoS ● Directly peer DC’s to Cloudflare ● Improve performance and reliability MPLS SWG MPLS SWG M PLS Cloudflare rack Customer rack ZTNA RBI | SWG FWaaS | CASB
  • 31. ● Move more applications to Cloud to reduce DC footprint ● Apply consistent cloud security policies across all traffic Cloudflare Network Interconnect MPLS SWG MPLS SWG M PLS Cloudflare rack Customer rack CNI ZTNA RBI | SWG FWaaS | CASB
  • 32. ● Move more applications to Cloud to reduce DC footprint ● Apply consistent cloud security policies across all traffic SWG MPLS SWG CNI ZTNA RBI | SWG FWaaS | CASB
  • 33. ● Eliminate need for security appliances in HQ and DC locations ● Apply consistent cloud security policies across all traffic ● Single pane of glass to view all activity globally ● Reduce cost and complexity of network performance and security SWG MPLS SWG CNI ZTNA RBI | SWG FWaaS | CASB
  • 34. ● Eliminate need for security appliances in HQ and DC locations ● Apply consistent cloud security policies across all traffic ● Single pane of glass to view all activity globally ● Reduce cost and complexity of network performance and security MPLS CNI CNI ZTNA RBI | SWG FWaaS | CASB
  • 35. Three major priorities across all business segments Succeeding with SASE Defining Success
  • 37. Next Steps: Succeeding with SASE 1. Read more about Cloudflare One: cloudflare.com/cloudflare-one/ 2. Set up a Cloudflare for Teams account (Zero Trust and Remote Worker Security): dash.cloudflare.com/sign-up/teams 3. View the Cloudflare SASE Whitepaper: Cloudflare SASE Whitepaper
  • 38. Thank you Succeeding with SASE Be sure to check out the links in the Handouts section. David McClure dmcclure@cloudflare.com