Secure Access Service Edge
Connect securely and eliminate perimeter-based legacy solutions
SASE is the convergence of Security-as-a-Service and Network-as-a-Service SASE is an architecture enabled through cloud-based platform Provides the opportunity to rethink the network and security stack. Required to meet the demands of digital business transformation
Reduction in complexity & costs
Increased effectiveness of network and security staff
Improvement in performance & latency
Ease of use & transparency for users
Features of SASE
Liquid’s technologies cloud-based security platform, including integrated CASB, SWG, ZTNA and DLP. a cloud-based security posture must be accessible through a fast, worldwide network of data centres and peering relationships.
Cloud Firewall – Liquid owned MSSP offering consisting of virtual UTM per customer
Cloud Access Security Broker (CASB) – Customer owned device hosted within Liquid DC or at customer premises
Nextgen Secure Web Gateway (SWG) Multi-tenant Vendor options – Netskope and Cisco
Private Access for Zero Trust Network (Zero Trust) – Cisco, Fortinet, Check Point, Sophos and Palo Alto to be provided upon request
Advanced Analytics – Next generation firewall (NGFW), Virtual private networking (VPN), Secure Access Service Edge (SASE), Secure SD-WAN, Zero-Trust
Cloud Firewall – Liquid owned MSSP offering consisting of virtual UTM per customer
Cloud Access Security Broker (CASB) – Customer owned device hosted within Liquid DC or at customer premises9
Nextgen Secure Web Gateway (SWG) Multi-tenant Vendor options – Netskope and Cisco
Private Access for Zero Trust Network (Zero Trust) – Cisco, Fortinet, Check Point, Sophos and Palo Alto to be provided upon request
Advanced Analytics – Next generation firewall (NGFW), Virtual private networking (VPN), Secure Access Service Edge (SASE), Secure SD-WAN, Zero-Trust
Vendors – Netskope a leader and Cisco always popular
The Liquid Intelligent Technologies Solution assists our clients by mitigating:
Unauthorized Access – Unauthorized access by users or devices, e.g. remote endpoints
Unauthorized utilization of Network Protocols, Services, Applications and IPsv – Misuse and compromise via vulnerable or weakly configured network protocols, services, IP’s and applications
Malicious code and malware attacks – Virus attacks, compromise via malicious code website exploits
Intrusion and Brute Force – Intrusions attempts in all it forms including brute force attacks on user credentials
Data Leakage, Shadow IT -Leakage of sensitive data by users, unauthorized utilization of unsanctioned applications in the Cloud
Data Interception – Interception of sensitive information including user passwords