• Home
  • Managed Security
    • Managed Security
    • Managed Detection and Response
    • Security as a Service
  • Services
    • Cyber Risk and Technical Assurance
      • Segmentation and Zero Trust
      • Penetration Testing
      • Infrastructure security assessment
      • Secure Architecture Development
  • About Us
  • Resources
    • Cyber Security Blog
    • Case Studies
    • Cyber Security FAQs
  • Contact Us
  • Menu Menu

SASE – Secure Access Service Edge: A Simple Overview

Cyber Crime Australia, Large Corporation, Remote Working, SME's

Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home.

With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), corporate data networks are struggling with the bottleneck of traffic.

VPN’s may now not be the best solution for your business. So, let’s talk about the latest next-generation security solution.

Pronounced ‘sassy,’ SASE is short for Secure Access Service Edge, a cloud-hosted framework that protects data, end users and applications by using both security and network services. The term was first coined by Gartner in August 2019, who have calculated that “by 2025, at least 60% of enterprises will have explicit strategies and timelines for SASE adoption, encompassing user, branch and edge access, up from 10% in 2020”.

What is SASE?

SASE is a security framework that uses existing technologies to deliver wide area network and security controls as a cloud computing service directly to the source of the connection rather than a data centre or business premise. Security is based on digital identity, real-time context, and company security and compliance policies.

SASE helps to solve the bottlenecking of traffic into the network, by effectively combining security as a service (SECaaS) and network as a service (NaaS) into a single cloud-based service.

This merging of services allows the end-user to work securely from any location or device, without compromising the same level of security you would have in the office.

Implementing it is not the case of buying a single product and setting it up but requires multiple steps to enable services on existing cloud-hosted platforms. For most businesses, the level of expertise required in setting up a SASE approach will mean collaborating with a trusted vendor who understands your business needs.

SASE network- security diagram

How does SASE work?

Current systems may look something like this; traffic comes in via MPLS, internal traffic, or the internet and enters the router, this is then processed through a VPN, and then once verified through a firewall, access is gained to the network.

old network security model

Traffic ends up passing through the internet, security rules are applied, before being sent back out to the internet. This traffic is essentially passing through twice, meaning each security measure is essentially paying for double the amount of traffic, making this model inefficient and expensive.

With SASE, services are managed at the edge of the cloud, so secure communications are delivered to the specific resources the user wants to access, via the fastest path. This can help to provide the same level of security you would see in the corporate workplace, to any remote user, and from any location, device, or application, surely a necessity at this point in time.

SASE model diagram

The core components of the Framework

A SASE architecture can comprise of the following components:

• Software-defined wide area network (SD-WAN). SD-WAN can help simplify communications by finding the best route to the internet or cloud-based apps, optimising user experience.
• Cloud access security broker (CASB). CASB’s can secure cloud-based services by controlling data access and through data loss prevention (DLP). This prevents data leakage and malicious activity.
• Secure web gateways (SWG). SWG’s implement company security policies and filter any unauthorised access or suspicious behaviour. Any unsecure traffic is prevented from entering the network.
• Firewall-as-a-Service (FWaaS). FWaaS encompasses URL filtering, intrusion prevention systems (IPS), and threat protection to prevent cyber-attacks on cloud-hosted platforms.

There are also further recommend levels in the model including Sandbox, WAF, NAC, NGAN/ EDR and browsing Isolation. For an optional level you could also include a VPN or WLAN.

How can SASE benefit my company?

With more people than ever working from home, businesses of all sizes are needing to implement big security changes, fast. With cybercrime on the increase, there is no better time to convert to a SASE framework and secure every single user, device, and application entering your network. The time for updated cloud-based security is now.

Benefits of using SASE:

• Costs are lowered due to fewer hardware installs and a simplified system.
• Latency is reduced by finding the quickest path to the network.
• Zero-trust ensures secure data is only accessed by those authorised.
• Better performance and efficiency as users can access the network from anywhere.
• Keeps your data secure, within the network and prevents web attacks and malicious activity.

Implementing SASE

Steps your organisation can take to implement a SASE approach:

• Move branch offices to a cloud-based perimeter.
• Set up zero-trust network access (ZTNA) for all users.
• Simplify your setup (VPN’s, CASB, SWG) to combine services into a single, more effective system.
• Use an SD-WAN based network, as opposed to MPLS.
• Ensure you have a high-performance edge network to reduce latency issues.

The SASE infrastructure can be overwhelming. If you think your business could benefit from a SASE framework, or you simply just want to find out more, then please do not hesitate to contact one of our experts at Cube Cyber. We are always happy to help.

April 21, 2022/by Sam Topping
https://cubecyber.com/wp-content/uploads/2022/04/cyber-globe-with-office-in-background.jpg 1280 1920 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2022-04-21 23:01:582022-11-24 11:46:06SASE – Secure Access Service Edge: A Simple Overview

Beginners Guide to Cloud Computing & How it Can Help Small Businesses

Cloud Services, Remote Working, SME's, Threat Protection

With more businesses working from home, it may be time to invest in cloud computing for your company. In fact, it is more than likely you are already using some form of cloud computing. If you have ever used Dropbox or Google Docs, as two examples, then you are already familiar with working from cloud-based systems.

As more organisations are moving to online working, now is a good time to learn more about cloud computing, and how it can help your business.

What is cloud computing?

Simply put, cloud computing is using programs and storing data online, rather than using your computer’s hard drive. Local computing or storage systems will use programs and store data directing to your computer, whereas cloud computing runs all these programs over the internet.

Cloud computing types include data storage, software, application hosting, databases, servers, and online programs, such as Google Drive or Microsoft Office Online. These web-based systems mean that users can access the same files from any location or device.

Types of cloud computing

There are numerous ways cloud computing works. Types of services include:

Software as a service (SaaS)

Software a service applications are typically run on subscription or pay-as-you-go models. They allow users or members of the same team to work on files simultaneously. Teammates can collaborate on the same file, which is updated in real time, so users will always have access to the most recent version. Examples of SaaS are Microsoft Office 365 and Google Workspace.

Platform as a service (PaaS)

Similar to SaaS, platform as a service (PaaS) allows you to create a service that is used over the web. Cloud based resources such as APIs, web portals and gateway software are used by software developers. This is the more multifaceted form of cloud computing. Examples include Salesforce and Google App Engine.

Infrastructure as a service (IaaS)

Infrastructure as a service uses cloud-based servers, rather than traditional physical systems, to deliver a range of services such as storage and servers. Examples of IaaS include Amazon Web Services, Microsoft Azure and IBM Cloud.

computer hardware

Examples of cloud computing

Google Drive

Google drive is a cloud-based storage service, where users upload files directing over the internet. These files can be accessed from any location or device connected to the internet. With the ability to gain access to files from your phone, laptop or tablet, Google Drive is an efficient way to work remotely and data is easily accessible.

Other Google Apps

Many of Google’s applications are cloud-based, such as Google Sheets, Google Docs, Google Calendar, Gmail, and Google Maps. Being able to access these apps from anywhere makes it easier and quicker to access data and work productivity.

Microsoft Office 365

Microsoft Office 365 is great for businesses of all sizes to work collaboratively and access systems from any location. Co-workers can use Microsoft Office email, work on the same projects, and share information and files amongst the team. This is a subscription-based service, with varying prices depending on how many users it is for.

Dropbox

Dropbox has been around for years and is a service that allows users to upload and store files over the internet. These files can be synchronised and shared amongst users. Prices start from AU$18.69 per month for individual users to AU$33 per month for larger teams.

Salesforce

Salesforce is one of the world’s leading providers in cloud computing, allowing users to access CRM, sales, marketing automation, commerce, ERP, analytics and more.

Apple iCloud

For Apple users (and those using Windows devices), iCloud synchronises all your data onto a virtual server. This includes emails, photos, messages, your calendar, contacts, and backups. This is a storage based system which allows you to have a backup of your files.

Cloud Security

Cloud computing stores data via three different methods; public, private and hybrid.

Public cloud

Public cloud providers use the internet for their storage and web services. Your data will be handled by a third party and you will receive a portion of the cloud service, over a shared infrastructure. For larger companies it may not be wise to share sensitive data over a public system, although advantages are that you will be getting up to date services at a cheaper price.

Private cloud

Instead of storing all data over the internet, a private cloud system is installed within your company. This will be conducted by an in-house IT team and can be a great option for bigger corporations with large amounts of data or any company wishing to have a higher level of security.

Hybrid cloud

As the name suggests, this cloud service provides both public and private cloud based systems. This is a flexible way to store the most confidential information on the private cloud and general data on the public cloud. The private cloud will be managed by the organisations own IT team.

man holding tablet

Positives of cloud computing

Flexible working

One of the biggest benefits of cloud computing is the flexibility and efficient way of working it offers. Employees can access services from any device and any location. When previously many systems could only be accessed from the office, which had the software installed, staff can now work from anywhere. This is especially important now as many more people are working remotely.

Up-to-date files

With programs such as Google Docs and Microsoft Office 365, teammates can be assured that they are working on the most up to date file and can do so simultaneously. This seamless workflow can mean projects can get completed faster and better communication is had amongst the team.

Cost efficient

Although cloud computing is still an expense, it is also predicable. You know how much money is coming out of the account each month, making budgeting easier. Rather than paying for an expensive server and the expertise to run it, businesses can work more efficiently when managing a monthly subscription.

Your data is backed up

One of the benefits of cloud security is that if your system crashes, you should be able to retrieve your data. A cloud backup service is different from a cloud storage service, which will allow you to store any files you upload to it. A cloud backup will allow you to restore data which has been lost or damaged.

Negatives of cloud computing

With potentially sensitive information being stored in the cloud, there will always be some vulnerabilities to watch out for. If the cloud service provider crashes from a bug, power cut or cyber attack, then company data can be lost.

There is also the rapid development of the Internet of Things (IoT). Smart devices and anything which uses the connection to the internet can be a vulnerability path into your network and cloud services.

A main concern for many business owners is how exactly their data is stored in the cloud. Before paying for a cloud service, you should be asking the right questions. Ask them how they will store your data and who has access to it. Be sure they are following security protocols, have a good support service and ask which methods they use to keep your data safe.

Cloud computing is evolving as technology evolves. This is the new way to work and as long as you are using good cyber security measures to protect your cloud services, then you are in a good position.

At Cube Cyber we help businesses protect themselves when using cloud based services and can help you stay protected whilst online.

Find out more on how we can help your business.

 

May 13, 2021/by Sam Topping
https://cubecyber.com/wp-content/uploads/2021/05/illustration-of-man-and-devices.jpg 797 1280 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2021-05-13 05:16:402022-11-24 10:44:52Beginners Guide to Cloud Computing & How it Can Help Small Businesses

Pandemic Cyber Security: Is your Business at Greater Risk Due to Covid-19?

Cyber Attacks, Remote Working, SME's, Threat Protection

An overwhelming majority of reports are indicating that cyber crime is increasing at an alarming rate. INTERPOL’s COVID-19 Cybercrime Analysis Report shows that cyber criminals are taking advantage of the COVID-19 pandemic to switch their target from small businesses to large corporate and major organisations, as well as government entities. Due to the pandemic, cyber security is as important now more than ever.

With organisations having to install remote working in their companies and with more staff now working from home, the risk of a cyber attack is ever increasing.

Working from Home is Increasing the Risk

With remote working increasing in this pandemic cyber security should be high on every organisations to do list. With the increased vulnerabilities of more employees working from home, employers need to ensure their cyber security systems are both up to date and doing the intended job.

Since COVID-19 made it’s ugly appearance at the start of the year, cyber criminals have taken advantage of the situation and of staff members who are working remotely, perhaps not thinking about cyber security in the same way as they would do in their corporate office jobs.

PwC’s 2021 Global Digital Trust Insights survey of large businesses, reported a 65% increase in cyber security attacks from April to June this year. According to a Webroot study, there has been a 40% increase in devices running unsecured remote desktop protocol (RDP). These insecure machines only make it easier for cyber criminals to take control over the entire device. And according to a report released by cyber security firm Kaspersky, the increase in these brute force attacks have risen by 400% in just March and April this year.

Individual users are similarly being targeted too, with pandemic related cyber security incidents on the rise in the general public. WHO reports more scammers impersonating them, in order to get people to donate funds for COVID-19 donations into a fake account. Phishing scams trying to trick users into giving away personal or secure information have likewise been growing since March. Individuals could be even more likely to click on a phishing link now than before the pandemic, with clickbait words such as ‘covid vaccine’, ‘testing’, and ‘quarantining’.

Claroty  recently released a report from 1100 information technology (IT) and operational technology (OT) security professionals, who stated an average rise of 56% in cyber security threats since the pandemic began. As well as this, 70% of organisations reported cyber criminals are using new tactics to target their company. Hacking, identity theft, ransomware, and web application threats are just some that have been most common.

The threats from working from home during this pandemic means cyber security is more vulnerable due to unsecure or weak Wi-Fi networks, more secure data being transferred across unsecure networks and a lack of digital infrastructure.

Organisations are having to quickly react to the changing situation, creating temporary and fast solutions to staff working remotely and often compromising security in the process.

pandemic cyber security with woman remote working

Pandemic Cyber Security Attacks

COVID-19 has given risen to new cyber threats, as well as an increase in malware and ransomware attacks. Here are some of the way’s criminal are taking advantage of poor cyber security in the pandemic:

Spammy coronavirus domains

Since the pandemic began, there has been a huge rise in false domains and spammy accounts related the COVID-19 virus, 90% of which are completely fake. Scam sites have propped up here, there, and everywhere, with everything from fake coronavirus news, vaccines, fake cures, fraudulent donation websites and fake shopping stores selling masks and other medical supplies. These domains will use words with COVID related terms to trick users into giving away details from phishing attacks, malware threats and C2 servers.

Online ‘zoom’ related scams

Webroot reported a staggering 2000% rise in malicious attacks containing the word ‘zoom’. With more and more companies resorting to online video Zoom calls, this is a tempting target for cyber attackers. Zoom login details are being sold over the internet with over 530,000 accounts being sold on the dark web.

Ransomware Attacks

Skybox Security 2020 Vulnerability and Threat Trends Report says a 72% rise in ransomware attacks have been documented. Healthcare institutions and other large organisations are being targeted in exchange for ransom. These attacks can be completely disruptive to enterprises.

Phishing Attacks

Phishing attacks have always been a popular method amongst cyber criminals and that has been no exception during the pandemic. Cyber security phishing attacks have been COVID-19 themed, convincing users to part with their personal data. Criminals will impersonate government agencies or health organisations to be even more convincing.

Malware Threats

Using pandemic associated wording in order to entice users, cyber criminals will then use disruptive malware to compromise secure networks, using spyware, banking trojans and remote access trojans. Data and money are then able to be stolen.

covid-19 remote workers on laptops

How Companies Can Protect Themselves

Government and large corporations can help protect themselves from new threats by building secure internal platforms and increasing their cyber security structures.

Review current cyber security

Now’s the time for organisations to really take an in-depth look at their cyber security protection and continuity plans. Do you know what you would do in a cyber attack? Do you have a plan and procedure to follow such an attack? It is a good idea to go over everything, ensure you are fulfilling privacy, government and compliance guidelines and keeping up to date with the latest guidelines for businesses. We all know the saying ‘fail to prepare, then prepare to fail’. Do not let this statement ring true.

Educate staff on procedures

Use this time to educate your staff on your security procedures and on cyber security awareness. This can ensure the opportunity for employees to be tricked into giving away secure information is massively reduced. Make sure they are using two-factor authentication, keeping strong passwords, and updating them regularly.

Use a VPN

Try and implicate employee access to a VPN (Virtual Private Network) which will help safeguard sensitive information when using remote connections. Make sure staff devices have end-point security installed to keep important information safe.

Install cyber protection

Having an extensive and managed cyber protection is the best thing you can do for your organisation. Using an expert cybersecurity firm such as Cube Cyber, can break down the complicated problems for organisations and ensure your company is in the best hands.

For more information on Cube Cyber and how we can help your organisation, please get in contact with us today. We have a wealth of experience and knowledge and help companies of all sizes.

December 9, 2020/by Sam Topping
https://cubecyber.com/wp-content/uploads/2020/12/co-workers-looking-at-computer-screen-2048x1365-1.jpg 1365 2048 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2020-12-09 02:22:302022-11-24 11:13:11Pandemic Cyber Security: Is your Business at Greater Risk Due to Covid-19?

Quick Search

Latest Insights

  • SASE – Secure Access Service Edge: A Simple OverviewApril 21, 2022 - 11:01 pm

    Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home. With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), […]

  • Beginners Guide to Cloud Computing & How it Can Help Small BusinessesMay 13, 2021 - 5:16 am

    With more businesses working from home, it may be time to invest in cloud computing for your company. In fact, it is more than likely you are already using some form of cloud computing. If you have ever used Dropbox or Google Docs, as two examples, then you are already familiar with working from cloud-based […]

  • Top 7 Cyber Attacks Threatening SME’s (and how to prevent them)May 13, 2021 - 5:14 am

    Small and medium sized enterprises (SME’s) frequently underestimate the need for cyber security protection. This miscalculation could end up being a risky strategy for those not willing to invest in the best preventative measures for their business. Just because an enterprise is small, does not mean it is not at risk from the top cyber […]

  • GDPR Cyber Security and How It Might Impact Your BusinessMarch 2, 2021 - 11:45 am

    The European Union’s General Data Protection Regulation (GDPR), came into effect back in May 2018, but what does that mean for Australian businesses and cyber security? What is GDPR? First of all, what actually is GDPR? The GDPR is short for General Data Protection Regulation. It was brought in by the European Union on 25th […]

  • How to Prepare A Cyber Defence Plan for Your EnterpriseFebruary 12, 2021 - 4:56 am

    No business, small or large is not at risk from a cyber attack. From small businesses to huge government organisations, all companies must ensure they have an excellent cyber defence plan in place. Planning what to do in a cyber attack is just as important as managing active preventative measures. Many smaller enterprises do not […]

  • Cyber Security Australia: Increasing Attacks on BusinessesFebruary 12, 2021 - 3:21 am

    Cyber security in Australia is an essential tool to protect businesses both large and small, from advancing cyber crime threats. In this current environment it is vital that no matter the size of the company, everyone is doing what they can to stay secure online. In the past, businesses only had to really worry about […]

  • Cyber Security Risk: What would it cost if your company could not work for one day?February 12, 2021 - 2:56 am

    Cyber security risk is a problem all companies face, from large corporations to small, independent businesses. But cyber security is much more than a simple IT issue, it can have a huge impact on your revenue…and reputation. Have you ever thought about what you could lose if your business were to go offline from a […]

Choose Category

  • Advanced Development Capability
  • Assessment and Insights
  • Case Studies
  • Cloud Services
  • Cube News
  • Cyber Attacks
  • Cyber Crime Australia
  • Enterprise
  • Expert Advice
  • Incident Response
  • Industry
  • Internet of Things
  • Large Corporation
  • Managed Protection
  • Operational Technology
  • Remote Working
  • SME's
  • Threat Protection
  • Vulnerability Assessments

Tag Cloud

Cloud Computing Cyber Tips Data Breach emergency plan GDPR Hackers Malware News Office 365 Phishing Attacks Ransomware

Wondering how much our solutions cost?

GET A FREE QUOTE

Not sure yet? Get a Free Trial now.

GET A FREE TRIAL

ABOUT CUBE CYBER

About Us
Contact Us

CALL 1300 085 366

SERVICES

Cyber Risk & Technical Assurance
Segmentation and Zero Trust
Penetration Testing
Infrastructure security assessment
Secure Architecture Development

MANAGED SECURITY

Managed Security
Managed Detection & Response
Security-as-a-Service

RESOURCES

Cyber Security Blog
Case Studies
Cyber Security FAQs

ISO 27001 CERTIFIED

© CubeCyber 2023. All Right Reserved | Designed & Developed by Escope

Scroll to top

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this.

Accept & Close

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy