Velieve that the SASE model
Posted: Mon Feb 10, 2025 9:31 am
Of course, we must not forget that this change in the nature of network use also means that organizations need to develop network infrastructure and security systems. This is why there is now an increasing focus on security at the network edge. SASE (Secure Access Service Edge) architectures were developed to provide mobile and remote workers with fast, reliable and secure access to cloud applications.
At the same time, they increase IT agility. I will become the next favorite, and in the future, we will see increasing interpenetration of SASE and SD-WAN. In the future, in addition to the implementation of SASE, we will, of course, see the use of 5G with SD-WAN technology. Moreover, with the deployment of digital transformation, automation, intelligence and analytics will increasingly penetrate the network.
Security Tales: Domestic Ransomware
Vladimir Bezmaly | 06/23/2021
- Bob, you have a guest!
- To me? Captain, are you sure you're not mistaken?
— To you!
- Hello, Bob! I have a problem. The captain said that you are the only one who can help me. A month ago, I received an email with a threat from a stranger. I don’t know who is threatening me, I thought, who knows who I managed to cross, and forgot about him. Maybe some intruder decided to blackmail me. But now hackers claim that they are watching not only me, but also my family and threatening them.
— What did they demand of you? Did you keep the letter?
- Of course, I saved and brought my laptop here. Initially, the "group" demanded $130,000 from me, threatening to publish my personal photos. My email was hacked, and the password and the mobile phone georgia mobile database associated with it were changed.
- It's good that you brought your laptop. Don't tell anyone that you were here. Including your family. There's no need to worry them. We'll figure it out.
Two days passed.
- Captain, what a strange case you've given me.
- What's strange, Bob?
- Yes, the letters came from one IP address and that was... The victim's address! That is, they were sent from the same laptop.
At the same time, they increase IT agility. I will become the next favorite, and in the future, we will see increasing interpenetration of SASE and SD-WAN. In the future, in addition to the implementation of SASE, we will, of course, see the use of 5G with SD-WAN technology. Moreover, with the deployment of digital transformation, automation, intelligence and analytics will increasingly penetrate the network.
Security Tales: Domestic Ransomware
Vladimir Bezmaly | 06/23/2021
- Bob, you have a guest!
- To me? Captain, are you sure you're not mistaken?
— To you!
- Hello, Bob! I have a problem. The captain said that you are the only one who can help me. A month ago, I received an email with a threat from a stranger. I don’t know who is threatening me, I thought, who knows who I managed to cross, and forgot about him. Maybe some intruder decided to blackmail me. But now hackers claim that they are watching not only me, but also my family and threatening them.
— What did they demand of you? Did you keep the letter?
- Of course, I saved and brought my laptop here. Initially, the "group" demanded $130,000 from me, threatening to publish my personal photos. My email was hacked, and the password and the mobile phone georgia mobile database associated with it were changed.
- It's good that you brought your laptop. Don't tell anyone that you were here. Including your family. There's no need to worry them. We'll figure it out.
Two days passed.
- Captain, what a strange case you've given me.
- What's strange, Bob?
- Yes, the letters came from one IP address and that was... The victim's address! That is, they were sent from the same laptop.