www.aryaka.com
Open in
urlscan Pro
185.114.78.99
Public Scan
Submitted URL: https://go.aryaka.com/NDc3LVdOTC04MzYAAAGPI7ifGPefcjqh7-s8TUzg7QCLJbzWc7a_K6Jp9QG7OFPON51FSg_D-26j0rolYevJhG7dTSA=
Effective URL: https://www.aryaka.com/blog/choosing-the-unified-sase-provider/?utm_source=marketo&utm_medium=email&utm_campaign=FY24_A...
Submission: On November 01 via manual from SG — Scanned from SG
Effective URL: https://www.aryaka.com/blog/choosing-the-unified-sase-provider/?utm_source=marketo&utm_medium=email&utm_campaign=FY24_A...
Submission: On November 01 via manual from SG — Scanned from SG
Form analysis
2 forms found in the DOMGET https://www.aryaka.com
<form role="search" method="get" id="aryakasearch" class="aryakasearch" action="https://www.aryaka.com"> <input type="search" aria-label="Search" value="" autocomplete="off" name="s" id="search"> <button
type="submit"><i class="fa fa-search"></i></button> </form>
<form id="mktoForm_3667"></form>
Text Content
Webinar: Your future in connectivity awaits. Embrace it with Aryaka Register Now >> X * Blog * Resources * Customers * Customer Login * 1-888-692-7925 * * Solutions * Managed Solutions * Managed SASE * Managed SD-WAN * Multi-Cloud Networking * Remote VPNaaS (Private Access) * Secure Web Gateway * Last Mile Services * CDN The Total Economic ImpactTM of Aryaka Download Study * Use Cases * Hybrid workplace * Secure Internet Access (SWG) * Multi Cloud Connectivity * MPLS to SD-WAN Migration * Application Performance * MS 365 and SFDC Performance * UCaaS Performance * China Connectivity Unified SASE: Considerations for Single-Vendor SASE Download Report * Resources * Blog * Customer Login * Customers * Partners Aryaka Accelerate Global Partner Program Learn More * Channel Partners * Accelerate Partner program * Become a Partner * Partner Portal Log in * Technology Partners * Reseller Partner program * Contact Channel Team * Company Where Do I Start With SASE Evaluations: SD-WAN, SSE, Single-Vendor SASE, or Managed SASE? Download Report * About Us * Leadership * Investors * Press Releases * Blog * In the News * Dreamers and Doers Podcast * Events & Webinars * Careers * Academy Get SASE in 15 is a series of talks on everything SASE and beyond Watch Now * SD-WAN Academy * SD-WAN Definition * SD-WAN Features * SD-WAN Architecture * SD-WAN Deployment Models * SD-WAN Vendors * SASE Academy * SASE Definition * Why SASE? * SASE Architecture * SASE Deployment * SASE Benefits * SASE Certifications * SASE Vendor * Aryaka SASE * Contact Us « Back to Blog CHOOSING THE UNIFIED SASE PROVIDER: THE EXECUTION ISOLATION FACTOR By Srini Addepalli | October 2, 2023 SHARED PROCESSES FOR PACKET-LEVEL SECURITY TECHNOLOGIES Networking and security technologies at the packet level, such as stateful inspection firewalls, IPSEC, and load balancing, impose lower computational demands in terms of the number of CPU cycles required for each packet. Furthermore, the processing per packet is highly consistent, simplifying performance prediction. In today’s landscape, security functions (e.g., FWaaS) are delivered as services by service providers who deploy these functions in the Cloud/Points of Presence (PoPs). To cater to multiple tenants, the underlying security technology implementations leverage a Virtual Routing and Forwarding (VRF) tenancy model. Under this model, traffic from multiple tenants traverses the same security device or container/process, effectively addressing challenges related to overlapping IP addresses among tenants. Tenant traffic is identified either through tunnel interfaces or other mechanisms, and specific configurations tailored to each tenant, such as tenant-specific security policies, are then applied accordingly. To mitigate any potential “noisy neighbor” issues, packet rate limiting is applied at the ingress on a per-tenant basis. This strategy guarantees that the security performance of each individual tenant remains unaffected by the activities of other potentially problematic tenants. Given the consistent per-packet processing, rate limiting proves effective in ensuring equitable processing treatment for all tenants. Another significant concern for organizations is the potential leakage of sensitive data resulting from the exploitation of vulnerabilities within shared processes or containers by malicious packets from other tenants. One argument often presented by security service providers is that the processing on a per-packet basis is straightforward, reducing the likelihood of vulnerabilities and corresponding exploitation. It is indeed true that packet-level security technologies are simpler, and this argument has some validity. Both challenges mentioned earlier, namely the “noisy neighbor” problem and “shared resource vulnerabilities,” may not pose significant issues for packet-level security technologies that utilize shared processes. However, we believe that these challenges can be more pronounced and substantial for SASE (Secure Access Service Edge) or SSE (Secure Service Edge) security technologies. DISTINGUISHING SASE/SSE SECURITY FROM PACKET-LEVEL SECURITY TECHNOLOGIES AND CHALLENGES SASE/SSE (Secure Access Service Edge/Secure Service Edge) security technologies transcend traditional packet-level security, offering a comprehensive suite of features: * Comprehensive Security Functions: SASE/SSE encompasses a wide array of security functions, including IDPS (Intrusion Detection and Prevention), DNS Security, SWG (Secure Web Gateway), ZTNA (Zero Trust Network Access), CASB (Cloud Access Security Broker) with IP/URL/Domain/File reputation firewall, access control with deep traffic-level attributes such as URI, request headers, response headers, Anti-Malware, and DLP (Data Leak Prevention). Zero Trust Networking (ZTN) in SASE/SSE is fundamental, ensuring access only upon user authentication and authorization, with granular control over application resources while considering identity and device context. * Deep Content Inspection: The core of SASE/SSE security lies in deep content inspection. Utilizing proxies that manage client connections, initiate server connections, decrypt streams, extract relevant data from traffic, perform security functions, and prevent the transmission of malicious content. Now, let’s delve into the execution differences between SASE/SSE and packet-level security technologies: * Shift from Per-Packet to Session-Based Processing: In the context of SASE/SSE, security execution no longer operates at the per-packet level but rather at the level of traffic session streams. Unlike per-packet technologies, there is variability in the number of compute cycles used in SASE/SSE security processing across tenants, for the following reasons: * Security functions applied to the traffic stream can vary among tenants. * Even when similar security functions are applied, the nature of the data being exchanged can necessitate more intensive processing. For example, consider scenarios involving Anti-Malware and DLP, which require extracting text from various file types, decompressing transferred files, untarring file collections, and more. Some tenants may transfer compressed files, resulting in extensive processing, impacting throughput and latency for other tenants. Noise generated by a particular tenant, whether due to infection or high business traffic during a significant event, can affect other tenants’ traffic performance. * Complex Security Processing: SASE/SSE security processing is inherently intricate, often incorporating various libraries, including third-party and open-source components. These encompass functions such as OIDC (OpenID Connect) clients, Kerberos clients, SAMLv2 clients for authentication, complex policy engines for enforcement, SDKs from threat intelligence providers, data extraction , JSON/XML decoding, base64 decoding, data decompression engines, and text extraction via open-source projects like Tika, among others for data level security such as Anti-Malware and DLP. This complexity increases the attack surface for potential exploitation. Although SASE/SSE providers prioritize swiftly addressing vulnerabilities, a time gap may exist between exploitation and resolution. When shared processes are employed for multiple tenants, attackers can potentially exploit vulnerabilities and access sensitive information from not only the intended tenant but also all tenants’ data sharing that execution context. * Bring your own Security Function: While SASE/SSE services offer comprehensive security features out of the box, they also provide organizations with the flexibility to introduce their custom security functions using Lua modules or WebAssembly (WASM) modules. However, in such cases, shared processes pose significant challenges, as they can potentially lead to data exfiltration from other tenants if not managed carefully. Addressing this concern becomes more complex when shared processes are employed, and there may always be potential ways to circumvent these controls. In summary, SASE/SSE security offers a comprehensive security framework beyond packet-level security, but it introduces complexities and challenges related to variable compute usage, intricate processing, and shared resources. Maintaining robust security in such environments is critical to safeguard against performance challenges AND data breaches & privacy violations. SEEK SASE/SSE SOLUTIONS THAT OFFER EXECUTION ISOLATION Organizations undoubtedly value the rationale behind SASE/SSE providers employing shared processes for multiple tenants. This approach efficiently utilizes compute resources among tenants, contributing to sustainability and cost-effectiveness. Service providers can, in turn, pass on these cost savings to their customers. However, certain industry segments are reluctant to accept the security risks associated with multi-tenancy architecture and shared processes. Some organizations may anticipate future needs for a more risk-averse approach. In such cases, organizations should seek SASE/SSE services that offer flexibility, providing options for both shared processes and dedicated processes/containers. Dedicated execution contexts with dedicated processes/containers for traffic processing, can effectively address the challenges outlined in the previous section: * Performance Isolation: Achieving deterministic performance becomes feasible without concerns about disruptive “noisy tenants.” With a dedicated execution context, it is relatively straightforward to allocate dedicated compute resources to individual tenants. One can also configure resource caps from noisy neighbors using up all resources in the compute nodes. * Security Isolation: A dedicated execution context ensures that any malicious intent or insider threats attempting to exploit SASE/SSE services of one tenant will not lead to data leakage for tenants that opt for dedicated execution contexts. * Worry free ‘Bring your own security function’: A dedicated execution context unquestionably ensures that Lua scripts/WASM modules are exclusively executed within dedicated processes. Consequently, any processing or data exfiltration challenges are confined to the tenant bringing their custom security functions, providing peace of mind for other tenants in this regard, if service providers enable this feature only for dedicated processes. ANTICIPATING FUTURE NEEDS: THE IMPORTANCE OF CONFIDENTIAL COMPUTING As we look ahead, some organizations are becoming increasingly aware of the growing importance of confidential computing. This awareness is particularly relevant in the context of TLS inspection and the management of numerous sensitive data, including secrets and passwords, within SASE/SSE services. A recurring concern revolves around the possibility that personnel with access to the server infrastructure, including service provider staff, might gain unauthorized access to the memory of processes and containers. Additionally, even attackers who manage to exploit server operating systems may potentially breach the memory of these containers and processes. This concern becomes more pronounced in situations where services are available in multiple Points of Presence (POPs) across different countries with varying levels of legal definitions and implementations. Modern processors, such as those equipped with Intel Trust Domain Extensions (TDx), offer advanced features for trusted execution. These technologies play a crucial role in ensuring that even infrastructure administrators or attackers with elevated privileges cannot decipher the memory content, as it remains securely encrypted by TDx hardware. SASE/SSE providers that offer dedicated execution contexts are better positioned to provide this essential confidentiality feature compared to others. Therefore, organizations are strongly advised to consider providers that offer the flexibility of both shared processes and dedicated execution contexts. This flexibility will help future-proof their risk mitigation strategies and ensure the highest level of data security in evolving landscapes. * CTO INSIGHTS BLOG The Aryaka CTO Insights blog series provides thought leadership for network, security, and SASE topics. For Aryaka product specifications refer to Aryaka Datasheets. Our Related Services * Managed SASE Our Use Cases * Hybrid Workplace * Secure Internet Access (SWG) * Multi Cloud Connectivity * MPLS to SD-WAN Migration * Application Performance * MS 365 And SFDC Performance * UCaaS Performance * China Connectivity Top Guides on SASE * SASE Guide for Business Top Webinar on SASE * Cutting Through the SASE Confusion * Enterprise Networks at an Inflection Point: The Motivations for SASE * Managed Multi-Cloud Connectivity and SASE * Demystifying SASE Adoption * Fully Managed SASE for Better TCO – Check Point & Aryaka * Re-Defining Hybrid Workplace with SASE and a Cloud-First Solution * Re-Defining VPN with SASE and a Cloud-First Solution * Which SASE is right for you? Top Solution Briefs on SASE * Next Generation Security with Check Point * Industrial Grade Security — Zscaler & Aryaka * Next Generation Security with Palo Alto Networks Top Whitepapers on SASE * The Top 5 Trends in Enterprise Networking * Why SD-WAN & SASE over MPLS And Business-Class Internet * SASE (Secure Access Service Edge) Planning & Design Guide * Unified SASE: Considerations for Single-Vendor SASE About the author Srini Addepalli Srini Addepalli is a security and Edge computing expert with 25+ years of experience. Srini has multiple patents in networking and security technologies. He holds a BE (Hons) degree in Electrical and Electronics Engineering from BITS, Pilani in India. Previous Post CTO INSIGHTS * Choosing the Unified SASE Provider: The Execution Isolation Factor * Thwart Security Risks with Comprehensive IDPS in Unified SASE * Make Security Simple: Streamline Policies in Unified SASE * Unified SASE empowers Observability with Precision * Today’s ZTNA is not enough for diverse applications * Unlocking the Potential: The Crucial Role of Reputation in a SASE Architecture * Role of DNS-level security for SASE * Identity Broker * Convergence of various kinds of proxies for SASE * Unified SASE role Cyber Threat Hunting * Realizing Identity-aware SASE * Evolution of SASE Architecture * Securing the Data – SASE, CNAPP and CSMA roles * Deciphering SASE, Unified SASE and Universal SASE POPULAR POSTS * Aryaka Security Service Edge Enables an Intelligent Hybrid Edge * 2023 Enterprise Network Transformation Report * User-to-Cloud Workloads and SASE: Why the Internet Isn’t Good Enough * Identity Broker * SASE and the (sometimes) futility of predictions * Decoding the different flavors of Zero Trust * Trust and transparency matter more than ever in a world of uncertainty * Remote or Not Remote? That’s Actually NOT the Question SUBSCRIBE AND STAY UP TO SPEED! FOLLOW US ON: * * * * 2023 Enterprise Network Transformation Report Download Report >> Unified SASE Whitepaper Download Whitepaper >> Where Do I Start With SASE Evaluations: SD-WAN, SSE, Single-Vendor SASE, or Managed SASE? A Gartner® Emerging Tech Report Download Report >> * Use Cases * Hybrid Workplace * Secure Internet Access (SWG) * Multi Cloud Connectivity * MPLS to SD-WAN Migration * Application Performance * MS 365 and SFDC Performance * UCaaS Performance * China Connectivity * Managed Solutions * Managed SASE * Managed SD-WAN * Multi-Cloud Networking * Remote VPNaaS (Private Access) * Secure Web Gateway * Last mile services * CDN * Resources * SD-WAN * What is SD-WAN * SASE * Case Study * Data Sheets * Infographics * Reports * Solution Briefs * Videos * Webinars * Whitepapers * Podcasts * Company * About Us * Aryaka Leadership * Investors * Press Releases * In the News * Awards & Recognition * Brand Guidelines & Logos * Customers * Events & Webinars * Newsletters * Careers * Partners * Channel Partners * Accelerate Partner program * Partner Login * Technology Partners * Partner Newsletters © COPYRIGHT 2015-2023 ARYAKA NETWORKS,INC. ALL RIGHTS RESERVED. * Terms & Conditions * Privacy Policy & DATA AGREEMENT * Security & compliance STAY CONNECTED WITH US: * * * * * Aryaka, the Aryaka logo, MyAryaka, Aryaka SmartCONNECT, Aryaka SmartCDN, Aryaka SmartOptimize, Aryaka SmartCloud, Aryaka SmartSecure, Aryaka SmartInsights, and Aryaka SmartManage are trademarks or registered trademarks of Aryaka Networks, Inc. in the U.S. and/or other countries. All other trademarks are the property of their respective owners. X THE TOTAL ECONOMIC IMPACTTM OF ARYAKA Download Study