B2B Tech Talk with Ingram Micro
B2B Tech Talk with Ingram Micro

Episode · 3 months ago

How iboss Helps Customers Handle SASE Challenges

ABOUT THIS EPISODE

Even before the COVID pandemic began, businesses were trending towards the concept of work from anywhere. SASE platforms came about as a way to meet the changing requirements of these modern workforces.

Shelby Skrhak speaks with Eric Cornelius, Chief Product Officer at iboss, about:

- The philosophy behind a SASE platform

- 5 steps for starting your journey

- What makes iboss SASE products unique

For more information, reach out to Jennifer Coric (jennifer.coric@ingrammicro.com) or visit iboss.com/business.

To join the discussion, follow us on Twitter @IngramTechSol #B2BTechTalk
Listen to this episode and more like it by subscribing to B2B Tech Talk on Spotify, Apple Podcasts, or Stitcher. Or, tune in on our website. 

...you're listening to B to B Tech talkwith ingram Micro, the place to learn about new technology and technologicaladvances before they become mainstream. This episode is sponsored by ingrammicro security, strengthen your security practice. Let's get into it.Welcome to B to B Tech talk with ingram Micro. I'm your host Shelby skirt talkand our guest today is eric Cornelius chief product officer for I boss ericso thrilled to have you here today. Thanks great to be here. So today we'retalking about S. A. S. E. And how I boss meets consumer and customerchallenges related to Sasso technology is is a little bit of a alphabet soupthere. So tell us what S. A. S. E. Is and what's important to understandabout it right now. Sure. So sassy as the industry nomenclature has uspronouncing it stands for secure access...

...service edge, the idea of a sassyplatform, it's one that sort of came to be as a requirement or as a way to meetthe needs of modern businesses who have remotely deployed workforces. Now, alot of people have talked about remote work. A lot of people have tied remotework to the covid pandemic. I don't really believe that it's really thecause it certainly has been a catalyst but we, as an industry have beentrending toward work from anywhere for a long time and I would like to thinkabout this as the modern workforce as opposed to the remote workforce. Yourmodern workforce is largely based on knowledge workers there. They livewherever they travel wherever, but that doesn't negate the need for them toconnect to their resources securely from wherever they're at, whileproviding visibility and control to network and security teams. So thesassy platform came into existence to empower that digital transformation orcloud transformation if you will. Well, you know, there has been a lot of, alot of shift in a lot of change, but...

...you're right, you know, this is justthe modern way that we work covid or no covid, but when you're starting to lookat that sassy journey, there's a lot of things to consider. So in a blog postthat uh that you mentioned, you know, there's a there's basically five stepsthat you should consider when starting that s A S E R. Sassy journey. Can youtalk to us about those five steps and and kind of give us a high level, whatare the most important steps to understand to get started? Certainly,so I think the at the highest level what we need to kind of take stock ofand realizes the gravity of the situation here, we, as an industry areon the verge of what I would describe as a tectonic shift in the waynetworking happens. As a matter of fact, the last day revolutionary shift ofthis magnitude was when we originally designed all of this networking androuting gear and actually started connecting offices together And for thelast 30 plus years we've been building...

...on that same paradigm, more hardware,more boxes, more, more feeds, more speeds, all based out of the officebuilding. And then over time you started to see the cloud apps or appsmoved to the cloud, right? The emergence of cloud apps where now allof a sudden the resources that are employees need are not hosted in theoffice building. And now we've seen the migration of the workers themselvesaway from the office. So now we live in a world where neither the computingresources or the employees are actually in the office And it's called intoquestion the validity of this approach that we've had for the last 30 years ofcan we really maintain this paradigm of having a bunch of hardware stacked upin office buildings? The answer to that is really no. And so again, the firststep is to realize that this is an opportunity to completely re architectto simplify to really gain a lot of the benefits of this more modern approach.And I won't go due to deep into each of the five. I recommend the listenerstake a look at our website, we've got a...

...blog post for each of these steps, alot of great information there that's available. But you know, kind of stepone is take inventory and it's really the opportunity for you to lookinternally introspectively at your network architecture at all thoseappliances you have and ask yourself is this meeting the need. Right? And whatends up invariably what ends up happening over time is we've inheriteda lot of this, just complexity. And you know, I'm a lifelong cyber securitypractitioner, we always say that complexity is the enemy of security andso, you know, in the modern business place, we've got so many differentpieces of hardware from so many different vendors that do so manydifferent kind of sub functions that we've held together with superglue andbailing wire and really try to kind of hack these systems together. And now wehave the opportunity to take a lot of that out to simplify too. And thatleads me to step two, which is to consolidate vendors in the ideal world,you would have a single pane of glass and that single pane of glass wouldprovide all of your connectivity capability, all of your securitycapability. It would draw the correlations between your userbehaviors and really be a single vendor.

Is that possible? Maybe, maybe not. Butit's a good goal to strive for right. Step three here is adopt zero trust.Zero trust is, it's a design philosophy. There's a lot of misunderstanding aboutwhat zero trust really means out there in the world and a lot of vendors whoare kind of proliferating this misunderstanding within the industry bytrying to say, hey, we, we have the zero trust solution for you by ourproduct and all your Zero trust needs will be met, which again is not true.Zero Trust is a design philosophy in which you can assume that nothing istrustworthy, right? For all the way from the device itself. The hardwarewithin the device, the firmware within that hardware, the user, your usersintentions, the connectivity mechanism between them and the assets. They'retrying to leverage all of that could potentially be compromised. And youneed to adopt technology that allows you to verify the legitimacy of everyconnection of every user action of every piece of data that gets movedfrom Point A to point B in order to...

...really have that higher level ofgranularity of control along those lines. That will bring me to step forwhich is eliminating VPNS. VPNS not only do they provide a pretty terribleuser experience, they're very slow back calling all the traffic back to ourempty office building to run network traffic through that big stack of boxeswe all have. But more importantly, the technology, the routing theory behind aVPN actually connects the end user's home network directly to the corporatenetwork. So if you've got your kids or whoever on your environment and theirmachines are compromised with malware, that malware now has a very reallikelihood of spreading directly to the corporate network. It's a huge securityvulnerability. So eliminating VPN is pretty high on the list and then thelast step is gained visibility and control. And again, you know, the whenI say we're on this tectonic shift in the industry, we really are but theconcept shouldn't be, we need to redo everything in terms of how we thinkabout security, right? How it's delivered will change. The mechanismsby which users connect will change. But...

...we should still be able to have theparadigm that I want to manage. My users in groups based on their jobfunctionality. I want to apply policies to those groups. I want to be able toview the transactions that each user does. I want to have a good solidlogging, right visibility and control. It's absolutely critical. And so whenyou kind of wrap all of those things into one, that's what you're gettingwith the sassy platform, complexity is the enemy of security. I like thatIndeed it is. So you partner with some major companies out there to helpexpand your offerings and connect with multiple platforms. Can you talk to usa little bit about that and how that is a benefit? Oh definitely as a platform.Right. We really strive to be open to the ecosystem. Right. If you're thesassy platform, you are providing the connectivity or the glue if you will ofconnecting users to resources, wherever those users or resources maybe as such,you have a responsibility to your...

...customers that to be able to integratewith the other tools they need in their environments in order to meet theirobjectives. Right. A lot of organizations. They might haveadditional privacy requirements, say they're a health care organization andthey have very stringent reporting requirements for health care sensitiveinformation. We need to be able to integrate as an open platform withwhatever type of technology. Each, each vertical, our customers operate withinhalf upon them. Right? We all verticals have these requirements for securityand privacy and it's slightly different. Additionally, just in terms of overallfunctionality to help the businesses run more smoothly. And so again, we seeour position as being an open platform or 100% api driven, we provide acertain number of integrations that we believe are valuable to our customers,but we also provide the capability for our customers to integrate withwhatever technology they see fit well. So when you start talking to customers,what are some of those problems that that you're encountering and how do you,how do you solve for them? Oh, there's...

...quite a few problems that customershave when they're going through this journey, but the first is always thesame in the sense that they've had this realization, right? Why are we talkingto this customer in the first place? And it's because they, they're VPNS aresaturated, their links are saturated, their user experiences for theirproductivity is going down and the networking teams are kind of lookingfor answers and they've realized, hey, we want to have a look at this new,this new paradigm, this sassy based approach And in talking to them, a lotof the problems that they need to overcome are the same, right? They havea high requirement for a quality user experience. They want low latencyconnections to the things that they need most like office 365. Additionally,they have 100% of our customers have a bunch of on prem legacy hardware withcomplicated policies that they've been building over the last sometimes 30years and they are terrified of having to switch the idea. I mean, you got tounderstand if you're a big organization, let's say you're a bank and you are onthe networking team responsible for...

...providing connectivity to not only thebank's internal users, but also the connectivity for the apps for thecustomer experience. You need to make damn sure that when you switch thatthere will not be a blip, that there will be no connections dropped andthat's a terrifying proposition. And so just being able to give customersconfidence that we have given the necessary time and thought to thecomplexity of our policy engine, the ability to pore over a lot of theselegacy policies and a lot of cases to simplify those policies. Right? Thesassy based approach provides a lot of opportunity for simplification, whichcustomers really love. It is a paradigm shift. So you have an education problemwhere we really need to get everybody up into speed thinking about policymanagement in this new way. Well, so, I mean, speaking of paradigm shifts, Imean you know Sassy that's going to be a game changer and it is a game changer.But what makes my boss sassy products stand apart from other sassy productsand in that regard, it's all about the...

...design philosophy, it's thearchitecture, a lot of the critical capabilities that sassy platformsprovide and I'll just give one example dedicated IP addresses well in order tohave a dedicated IP address on a gateway by gateway basis, you have tohave containerized gateways. And my boss is the only Sassy platform whoprovides containerized architecture. This allows us to scale horizontally soour fabric is able to scale infinitely within a customer environment. Itallows for dedicated storage of sensitive customer information, theirencryption keys, they're independent client based reporting. None of that isever commingled with other customers. It allows for a seamless intendtroubleshooting capability which is also not possible in some of ourcompetitors platforms. So again I could, this list goes on and on and on, butfundamentally it all comes back to my boss is unique architecture and ourapproach to delivering Sassy definitely well as we start to wrap up thisepisode, we ask everybody here the same...

...question and that's where do you seetechnology going in the next year. Oh I think technology will continue alongthe same trajectory and continue to accelerate toward this cloudtransformation, I believe the journey to sassy and all of the benefits thathyper connectivity are going to bring is probably a 5-7 year journey beforeyou see like 80% of global organizations really on board there.It's been going for a while, but that sort of centralist connectivity modelis going to provide a huge ecosystem for things like connected vehicles, forthe IOT world, there's going to be huge connectivity and security implications.So I'm really excited to to be part of the sassy revolution. Well, so if ourlisteners have more questions, want to find out more about this about I boss,sassy and and the container ization, why? That's an you know, an exceptionalmethod. How can they reach out? I believe the contact informationprovided is jennifer cork at ingram micro dot com. Perfect eric, thank youso much for joining me. Oh thank you...

...for having me and thank you listenersfor tuning in and subscribing to be to be tech talk with ingram micro if youliked this episode or have a question, please join the discussion on twitterwith the hashtag B two B tech talk until next time I'm Shelby scare hawk.You've been listening to B to B tech talk with ingram micro. This episodewas sponsored by ingram micro security B two B tech talk is a joint productionby sweet fish media and ingram micro ingram micro production handled bylaura Burton and Christine fan to not miss an episode. Subscribe today inyour favorite podcast platform. Okay.

In-Stream Audio Search

NEW

Search across all episodes within this podcast

Episodes (331)