Ebook Painless Guide To Sse en
Ebook Painless Guide To Sse en
Ebook Painless Guide To Sse en
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 2
Table of Contents
Gartner, Predicts 2022: Consolidated Security Platforms are the Future, Charlie Winckless, Joerg Fritsch, Peter Firstbrook,
Neil MacDonald, Brian Lowans, 1 December 2021
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 3
Look around. Your business or mission is now digital-first, and your apps and data
can’t get to the cloud fast enough. 30%
It’d be awesome if security could transform, too. After all, the cyber crooks are
getting smarter, raking in more money than most countries’ economies. Your
employees are working remotely wherever the internet is available, with both
company-issued and personal devices at hand. of enterprises deploy more than 50
Where to look first? You’re already managing more tools than ever. Each has a security products
proprietary console, generating their own set of alerts and false positives, which
introduces yet more risk and requires the implementation of orchestration tools,
incident response, and SIEMs.
59%
The resulting complexity and costs are making enterprises less safe year after year.
SOCS are under increasing pressure and the ongoing talent shortage of security
professionals doesn’t help. Things are complicated, and you probably don’t feel
they are getting any easier.
It’s time to simplify security.
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 4
The simplified security model of the future must embrace zero trust. Why is that?
NIST* tells us…
“Zero trust focuses on protecting resources (assets, services, workflows, network
accounts, etc.), not network segments, as the network location is no longer seen as
the prime component to the security posture of the resource.”
The network perimeter as we know it, has vanished. The new edge is wherever your
people and data are; who is accessing what and how are they doing it?
Now, security policies must focus on identities and explicit permission of a given
identity to access a given resource at a given point in time.
Why should we treat the web, cloud, and internal apps as separate things that
security teams must manage? The name of the game is to control access, without
getting in the way of everyone’s day jobs. Zero trust is also about making security
> 100% believe the Zero Trust architecture is
transparent, not an Olympic obstacle course for users.
‘somewhat’ to ‘critically’ important to reducing
Trying to implement zero trust across your organization may seem too much of a their enterprise’s cyber risk.
burden, but it doesn’t have to be.
> Only 59% have so far adopted Zero Trust as a
foundational model across their enterprise.
ISMG ZERO TRUST STRATEGIES REPORT
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 5
it SSE. Those who did missed the point—resulting in the same patchwork of
fragmented products that organizations have been wrestling with
for years.
“By 2025, 80% of organizations seeking to procure
SSE relies on a unified platform that manages policies for using business SSE-related security services will purchase a
resources in one place, from one console, with access and enforcement provided consolidated SSE solution, rather than stand-alone
through one endpoint agent rather than many.
cloud access security broker, secure web gateway
This all-in-one approach makes it safer for people to work anywhere—at home, and ZTNA offerings, up from 15% in 2021.”
in an office, or anywhere in between—because they can get to and use all the GARTNER ® : MAGIC QUADRANT™ FOR SECURITY SERVICE EDGE
business resources they need through the internet, securely.
Gartner, Magic Quadrant for Security Service Edge, Lawrence Orans, John Watts,
Craig Lawson, Charlie, Winckless, 24 January 2022, Updated 30 March 2022,
Gartner, Predicts 2022: Consolidated Security Platforms are the Future, Charlie Winckless, Joerg Fritsch, Peter Firstbrook, GARTNER and MAGIC QUADRANT are registered trademarks and service marks of Gartner, Inc. and/
Nel MacDonald, Brian Lowans, 1 December 2021 or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved.
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 6
→ CASB enables identity-based access controls for cloud apps so users on managed or
unmanaged devices can easily and safely use cloud apps no matter how they need to connect. GATEWAYS 3
The unique reverse proxy technology makes it easy to connect for traditionally difficult use cases,
such as personal devices, consultants, contractors, and auditors; and even provides for inline
malware scanning and data loss prevention. This serves more types of users, with consistent
control to prevent malware and stop sensitive data from walking out the door.
SECURITY
SERVICES 2
→ SWG monitors and safeguards interactions with any website. This includes blocking access to
websites based on category, blocking downloads of malware, blocking uploads of confidential
or sensitive data to personal file sharing accounts, and detecting shadow IT. And, together with
CASB, gives you control and visibility over shadow IT activity.
UNIFIED
→ ZTNA allows you to ditch the VPN for users. ZTNA gives you infinitely greater control with the FOUNDATION 1
confidence to allow people to use the devices that work best for them, even unmanaged devices
and BYOD. Further, ZTNA & CASB together lets security teams deliver identity-based access
controls for internal apps and cloud apps seamlessly using a Single Sign On (SSO) page to
simplify the user experience.
→ DLP consistently protects sensitive data across the cloud, the web, and private applications, even ONE Platform | ONE Console | ONE Agent
agentlessly, all from one console.
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 7
The innovation within the Forcepoint SSE platform integrates The Old Way The Forcepoint ONE solution
Hair-pinning traffic through any single First, we embrace a zero-trust architecture and do not provide
network location doesn’t scale and any implicit trust whatsoever based on what network segment a
performance and resiliency ultimately user may be attached to, or what platform they are operating.
suffer. Choke points outside HQ Second, we maintain a comprehensive policy and security profile
still choke. registry and database centrally in the public cloud. And third, we
enforce these centralized policies with our Secure Service Edge
capabilities no matter where the application resides.
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 8
Security should allow people to be productive from anywhere, no matter how they
need to work. We want to say “yes” as often as possible and only step in when either
Employee Example
colleagues or the data they are interacting with presents risk. Controlling a single
set of security policies from one place makes everything simpler.
Let’s explore three scenarios of data risk as Kris, a business analyst, goes
about their workday.
Kris Holdsworth
Business Analyst
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 9
Kris is starting his day at home and wants to check something on Salesforce before heading into the office. Let’s follow Kris’ actions and observe how
Forcepoint ONE responds behind the scenes…
The session redirects through CASB, which analyses whether the device is managed, its location, and its
From home, Kris browses directly to salesforce.com
security posture. Based on pre-defined security policies, CASB confirms Kris’ identity through multifactor
or through a corporate application portal.
authentication apps.
The admin policies also control direct access to the app, controlled access, or no access at all. This happens
Kris is granted managed app access. in milliseconds without impacting employee productivity. All traffic from Kris’ device and the app passes
through CASB.
CASB scans any downloaded file for malware and sensitive data. As Kris’ company is balancing a large remote
Kris decides to download a revenue forecast workforce and implementing zero trust they allow downloads of sensitive data only to managed devices,
from Salesforce. whereas unmanaged devices are still given access but cannot move sensitive data outside of company
control. Since Kris is using a company managed laptop the download is allowed.
Kris attempts to transfer a sensitive file contaminated CASB can check files being uploaded into cloud apps and can automatically block uploads containing
with malware via their corporate Slack and upload malware. Together with SWG, CASB can also block uploading of files to unsanctioned apps using the SWG
the data to personal cloud storage. on-device unified agent.
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 10
Accessing Websites
Having safe web access is a necessity for today’s workforce, but it’s not as simple as dividing them into good and bad; Safe sites can
become compromised, “recreational” sites may need to be accessed for work related purposes… and sometimes you need to visit the
unknown or uncategorized.
Kris has now arrived at the office and needs to browse a social website for work related research…
Kris visits reddit.com/r/technology to research recent posts on malware. The SWG content
In the corporate office, Kris browses reddit.com for
policies allow granularity to the directory level; this subreddit is considered work-related so Kris
company-related research.
can access it.
Kris’ Forcepoint ONE administrator has created SWG content policies that allow access to
Within the r/technology subreddit, Kris accidentally
acceptable subreddit pages, but block access to inappropriate subreddits and other inappropriate
clicks a link to an inappropriate subreddit page.
pages. SWG prevents Kris’ error and blocks the new subreddit page.
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 11
Kris is now on vacation, but a work issue has come up that requires an immediate response…
From their personal device, Kris browses to the corporate Access to any application managed by Forcepoint ONE — cloud or private — requires proper
single sign-on portal(SSO) and clicks on an internal authentication. This controlled access for unmanaged devices is useful for many atypical users,
application. such as contract workers, consultants, and auditors.
The admin policies also control direct access to the app, controlled access, or no access at all.
Kris is granted managed app access. This happens in milliseconds without impacting productivity. All traffic from Kris’ device and the
app passes through ZTNA.
Just like for CASB and SWG, the ZTNA service scans all uploads and downloads for sensitive data and
Kris uploads a vendor contract as an attachment. malware. If the file is malware-free the upload is allowed. If it is infected, the ZTNA gateway blocks the
upload, alerts Kris, and logs and reports the blocked event.
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 12
The simplicity and flexibility of the Forcepoint ONE cloud-native SSE platform Enhancing the Security Services
allows you to start quickly and configure the security services you need. Choose Forcepoint ONE provides a clear and simple path to the security
Cloud Edition for all-in-one SSE that lets you control access to cloud apps, model of the future.
websites, and private apps for both managed and unmanaged devices. Or, pick the → Add Forcepoint Remote Browser Isolation (RBI) for a zero
services you need and add more as you go. trust approach to web browsing with Content Disarm and
Reconstruction (CDR) to provide automatic file sanitization
of files.
1. Cloud Edition is the full Forcepoint ONE platform, with CASB, SWG, and ZTNA driving synergy
for security teams. There is one console to create and manage a single set of security policies, → Add CrowdStrike Machine Learning malware protection
and one agent to enforce them. All security services fit together seamlessly.
→ Add Forcepoint Classification powered by Getvisibility
that incorporates true artificial intelligence (AI) and machine
2. CASB Edition represents the evolution of the multiple-award winning cloud app security
learning (ML) to automatically categorize both structured and
solution from Forcepoint, with built-in best-in-class data loss prevention and advanced threat
unstructured data.
protection for unmanaged devices.
3. Web Edition makes browsing even risky or unreputable websites simple to control and prevents
upload or download of malware or confidential data.
4. ZTNA Edition lets organizations ditch VPNs to connect remote workers with private web and
non-web apps. Set up controls for zero trust access, stop data loss, and implement malware GATEWAYS
scanning in minutes.
UNIFIED
FOUNDATION
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 13
It may typically take months or even years for your vision of For typical implementations, you could achieve time to
security to fall into place. This isn’t the case with SSE. Going value in 45 to 90 days. With simpler deployments, you
cloud-native gets you off the starting blocks fast and makes it could see ROI in as little as 21 days.
much easier to adopt zero trust so you can:
forcepoint.com
The Painless Guide to Security Service Edge (SSE) 14
For security pros on the front line, a single console with unified
polices makes management a game-changer. With efficacy
comes accuracy, allowing teams to cut through alert noise and
minimize investigation time. Security leaders can get a handle on
data risk and simultaneously say “yes” to the board more often.
But most importantly, it makes the lives of people easier by safely
allowing them to do more, the way they want to work. That’s
simplifying security.
forcepoint.com
SSE: The Easy Button for Modern Security 15
About Forcepoint
forcepoint.com/contact Forcepoint simplifies security for global businesses and governments. Forcepoint’s
all-in-one, truly cloud-native platform makes it easy to adopt Zero Trust and prevent
the theft or loss of sensitive data and intellectual property no matter where people
are working. Based in Austin, Texas, Forcepoint creates safe, trusted environments
for customers and their employees in more than 150 countries. Engage with
Forcepoint on www.forcepoint.com, Twitter and LinkedIn.
© 2022 Forcepoint. Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint.
All other trademarks used in this document are the property of their respective owners.
[FP-The Painless Guide to SSE-Ebook] 06Sept2022
forcepoint.com