Vai al contenuto principale
|
0 minuti di lettura

5 Steps to SASE: Controlling Access to Applications without the Pain of VPNs

Get a Demo of Forcepoint Solutions
  • Jim Fulton

Part of our ongoing series about SASE. Follow the hashtag #5steps2sase on Twitter and LinkedIn.
 

In our first installment about the 5 Steps to SASE, we looked at one of the most common ways that organizations begin using SASE: protecting remote workers as they use the web and cloud. This week’s session looks at the second most-common use case: controlling access to applications without the use of VPNs.

To gain some real-world perspective, I'll chat with Vince Spina, Senior Vice President of Solutions Engineering at Forcepoint.  Vince runs a global team that works with customers of all sizes, from multi-national enterprises to mid-market businesses, helping them understand what SASE is and how it could help them transform how they do business.

In step 2, we'll discuss the shift to a hybrid workforce in 2021 and the way it is changing how organizations keep their people—and their data—connected and safe. In particular, we looked at the role of Zero Trust Network Access (ZTNA) in SASE and why it's quickly replacing VPNs as the preferred way to provide access to line-of-business applications.

#5steps2sase - Step 2 image

No slides, just a good conversation. We hope you enjoy it as well.

  • Jim Fulton

    Jim Fulton

    Jim Fulton serves as VP Product Marketing & Analyst Relations, focused on SASE, SSE and Zero Trust data security. He has been delivering enterprise access and security products for more than 20 years and holds a degree in Computer Science from MIT.

    Leggi più articoli di Jim Fulton

    Nell'articolo

    X-Labs

    Get insight, analysis & news straight to your inbox

    Al Punto

    Sicurezza Informatica

    Un podcast che copre le ultime tendenze e argomenti nel mondo della sicurezza informatica

    Ascolta Ora