About Us

Importance of SASE in 2022!

SASE also called secure access service edge is a cloud-based system that combines networking and cloud security features. It connects people, systems, and endpoints to applications and services worldwide in a safe manner. These are available as a cloud service and can be managed centrally to meet the demands of today’s dynamic operations.

SASE is unconcerned about where applications live:

Applications can be hosted on-premises, in the cloud (private or public), or as a SaaS offering. Centralized network access and authentication are not ideal for this wide distribution of applications. SASE’s distributed architecture makes it simple to conduct security functions close to the end-user while also simplifying application communication.

Centralized, dynamic, role-based policies streamline operations:

Regardless of their location, central control of security policies facilitates remote workers’ networking and security aspects. In essence, the network perimeter is the endpoint’s location, even if it is on a network that is not under the authority of the organization’s personnel. Security is implemented dynamically, with policies dependent on the connecting entity’s role.

Reduces Costs and Complexity:

A single software stack replaces appliance sprawl, lowering CAPEX and OPEX expenditures. Removing backhauled traffic flows lowers transport costs, improves data center aggregation, minimizes client-to-cloud latency, and streamlines communication network operations. By safeguarding DIA, SASE lowers the cost of private circuits and allows for more cost-effective transportation options. SASE enforces policies consistently, reducing IT complexity and pressure on IT workers. SASE’s SaaS model enables rapid expansion and technological advancements at a lower cost. SASE provides simple models to purchase, manage, and run, including per-user pricing. SASE provides client security on all devices and operating systems, including Windows, macOS, Linux, and BYOD.

Threat Prevention and Reducing Risk:

The SASE architecture allows application and resource masking, segmentation, and isolation with dispersed control and data planes. The SASE architecture provides comprehensive security at numerous points along the access chain. SASE supports inline encryption and decryption. It also includes risk profiling and evaluation depending on the user, device, and location (UEBA). The SASE fabric has security built-in, guaranteeing that all connections are verified and secured.

Increased and Optimized Performance:

SASE enhances performance and reduces latency by safeguarding DIA, resulting in a better user experience. Applying security measures in a single-pass parallel processing technique reduces latency and enhances application and network performance. By removing backhaul traffic flows, client-to-cloud latency is reduced. SASE’s cloud-native design is scalable flexibly to support WFA and rapid deployment. During peak demand periods, the distributed SASE architecture grows readily to meet traffic fluctuations and reduces delays to the user experience.

Reduced WAN costs:

The route component of SASE works similarly to SD-WAN. You should anticipate reducing or eliminating the requirement for more expensive MPLS and leased circuits in favor of VPN access over the public internet, lowering WAN expenditures. To make the WAN more efficient, WAN optimization technologies can be used. By utilizing cloud connectivity to large SaaS vendors, cloud-based SASE implementations may further optimize traffic flows. Typically, these connections are redundant and extremely dependable. Application availability may improve.

Read More: SASE in 2022!

Cyolo Raises $21 Million in Series A funding to Grow Zero-Effort Zero-Trust Solutions

Cyolo, a developer of a Zero Trust Network Access (ZTNA) 2.0 solution for businesses, announced that it has raised $21 million in a Series A funding round led by Glilot Capital Partners, with investments from National Grid Partners and Merlin Ventures, as well as current investors Flint Capital, Global Founders Capital, and Differential Ventures.

Organizations are more vulnerable than ever before to breaches and vulnerabilities, which can result in long-term financial and reputational loss. Many governments around the world are now acting quickly to improve cybersecurity by hastening the adoption of new security best practices based on Zero Trust connectivity. Cyolo’s solution offers a new and innovative method to link users to their workplace environment by eliminating transitive trust and continuously verifying and authorising every endpoint, user and identity before and after granting them access to any organizational resource or app.

Cyolo is the first Zero Trust solution that spans both IT and Operational Technology (OT). It has zero access or insight into client data, leaving no vulnerability and assuring that enterprises do not compromise on data or company secrets. The company’s ZTNA 2.0 enables IT and security teams, SASE providers, and MSSPs to quickly deploy the most secure Zero Trust connection solution into any existing environment without requiring any infrastructure changes, lowering the risk to an organization’s digital assets and data.

“Cyolo is solving a critical problem by giving organizations an agile and easy-to-integrate solution that allows them to have full visibility and control. The timing is right to expand into new markets, and this investment enables us to further execute our vision of transforming secure connectivity from network-based to identity-based, in order to provide organizations with a solution for their current and future needs. This round will allow us to accelerate growth and R&D efforts, and help new customers easily navigate the transition to Zero Trust,” said Almog Apirion, CEO and co-founder of Cyolo.

Glilot Capital is one of Israel’s top performing VC funds with a focus on cybersecurity and enterprise software, and the investment in Cyolo was made by Glilot+, Glilot Capital’s recently raised $180M early-growth fund. “We are very excited to join the journey of Cyolo. We have been tracking Cyolo and other Zero Trust technologies for quite some time and Cyolo’s product execution is the best we’ve seen. Cyolo has grown exponentially and its roadmap and vision for the future of secure connectivity aligns with market needs. We are excited to support the company as it enters its next phase of growth,” said Kobi Samboursky, Glilot Capital Partners Co-founder and Managing Partner.

“By simplifying complex environments and enabling organizations to secure their digital assets in a distributed and multi-cloud environment, Cyolo’s flexible model integrates with existing technologies to ensure the safety of sensitive data and digital processes. This cutting-edge solution enables organizations to create their own distributed cloud based on identities,” said Sergey Gribov, Flint Capital Partner.

Over the past year, Cyolo has doubled its value quarter-by-quarter and has been rapidly Cyolo has been aggressively establishing collaborations with worldwide clients and service providers over the last year, doubling its value quarter after quarter.