About Us

Netskope enhances Netskope Security Cloud SASE platform

Netskope, a secure cloud provider announced a series of enhancements to their Netskope Security Cloud SASE platform. They include the platform’s first integration of SSPM [SaaS Security Posture Management] and cloud firewall. Remote browser isolation [RBI], which was previously available but OEMed, has been replaced with Netskope native technology. Additionally, there have been major improvements to Netskope Private Access [NPA], a cloud-native ZTNA [Zero Trust Network Access service].  

“The Netskope platform has brought some brand spanking new things with a Wow factor, and these new capabilities which we are announcing make them even more important,” said Sasi Murthy, VP of product and solutions marketing at Netskope. 

“As threat actors continue to target organizations around the world, implementing innovative security solutions is key to protecting network infrastructure,” says Ahmed Shah, senior vice president of strategic alliances at Optiv. “Collaborating with partners like Netskope allows us to help clients accelerate their digital transformation.” 

A standard architecture, common administration dashboard, user-friendly policy engine, unified client, and AI/ML intelligence are all used by the tightly integrated Netskope Security Cloud to deliver greater security, faster performance, and a lower total cost of ownership. 

For businesses transforming their security and networking to meet the needs of branch offices and a remote-first workforce, Netskope Cloud Firewall is a firewall-as-a-service solution that helps reduce complexity, lower overall operational costs, prevent a degraded user experience and accelerate time-to-value. 

Netskope Cloud Firewall is fully integrated into the Netskope Security Cloud and provides network security for all outbound ports and protocols for safe, direct-to-internet access using the Netskope client on managed devices or via GRE and IPsec tunnels for offices. Additionally, it offers 5-tuple policy controls, user and group IDs, FQDNs, and wildcards for egress firewall settings, plus seamless FTP ALG support, and full logging (TCP, UDP, ICMP) with event export, including intoNetskope Advanced Analytics. At last, also provides centralized access control, providing simplified management for users and branch offices using one console, one policy engine, and one security platform. 

Palo Alto Networks introduces enhancements in Prisma SASE 

To securely enable work-from-anywhere, Palo Alto Networks released Prisma Access 2.0, the most comprehensive cloud-delivered security platform in the market. Prisma Access 2.0 introduces critical enhancements, including self-healing infrastructure for optimal experience, ML-powered security to help prevent attacks in real-time, cloud SWG capabilities for a secure web gateway regardless of user location, and a reimagined cloud management experience, in response to the ongoing need for work to be done securely everywhere with no compromise on speed, security, or performance. 

Anand Oswal, senior vice president, and general manager, of Firewall as a Platform, Palo Alto Networks said, “Remote work is now a critical long-term strategy for most organizations globally. As such, secure access to all apps with an optimized user experience has become a business necessity. To achieve this, organizations have to rethink their security architecture and move towards a cloud-delivered security model that can connect any user, to any application, from anywhere.” 

A new cloud management experience is one of Prisma Access 2.0’s most significant performance, security, and management upgrades. By introducing a cloud-based management experience that outperforms the competition by offering real-time security updates and best practices, Prisma Access 2.0 ensures the best possible security outcomes. Additionally, it offers a brand-new autonomous Digital Experience Management (DEM) where Prisma Access 2.0 can provide a self-healing architecture that automatically fixes network issues, assisting in ensuring an outstanding digital experience for distant workers. 

Another improvement is the new ML-powered security, where Prisma Access 2.0 uses inline machine learning to stop unknown, zero-day attacks in real-time, and the new cloud secure web gateway (SWG) capability, where Palo Alto Networks has added an explicit proxy to the Prisma Access Cloud SWG — so users can easily switch from legacy proxy-based solutions to a full cloud-delivered security platform without the need for network architecture changes. Customers can quickly upgrade to a more secure connection method in Prisma Access over time, protecting not just the web but also all apps, ports, and protocols. The final improvement is the platform support for CloudBlades API-based third-party services integration across the SASE solution. The first RBI services from top manufacturers to enable remote browser isolation are made possible by CloudBlades in Prisma Access 2.0. These services are qualified third-party security and infrastructure services that can be quickly and simply integrated. 

Read More : SASE in 2022!

Colt launches Colt SASE Gateway Solution!

Colt Technology Services strives to change the way the world works by harnessing the power of connectivity – taking what has always been in its DNA to enable customer success. With the release of its new Colt SASE Gateway solution, customers now have access to an integrated full Secure Access Service Edge (SASE) solution that combines SD-WAN and SSE features.

The Colt Gateway solution is designed for global enterprise companies and is based on Versa SASE, which includes Versa Secure Web Gateway, a secure web access solution that offers organizations protection from malware and threats, and instant insight for policy management, and reduces end-user friction to access cloud-based applications securely.

Peter Coppens, Colt’s VP Product Portfolio, said: “Colt was one of the first to offer a true SD WAN service in Europe many years ago, and now we extend our offering further with the launch of a full SD WAN-integrated SASE solution, powered by Versa. It comes as a result of the changes in how people are working and accessing systems, combined with increasingly complex enterprise networks and rapidly changing security threats. We see our customers looking to move away from more traditional network security solutions to a SASE approach. This brings together networking and security to offer secure access for employees no matter where they are and how they’re accessing the company network.”

This initiative is in response to the growing popularity of hybrid working and cloud deployments, as well as increasing enterprise network complexity and a rapidly evolving security threat landscape, all of which indicate that enterprises can no longer rely on traditional solutions to keep their systems secure. As a result, they are increasingly considering using a SASE approach, which combines networking and security to provide dynamic, secure access for employees regardless of where they are or what device they are using to access the network.

Read more: Importance of SASE in 2022!

SASE in 2022!

Importance of SASE in 2022!

SASE also called secure access service edge is a cloud-based system that combines networking and cloud security features. It connects people, systems, and endpoints to applications and services worldwide in a safe manner. These are available as a cloud service and can be managed centrally to meet the demands of today’s dynamic operations.

SASE is unconcerned about where applications live:

Applications can be hosted on-premises, in the cloud (private or public), or as a SaaS offering. Centralized network access and authentication are not ideal for this wide distribution of applications. SASE’s distributed architecture makes it simple to conduct security functions close to the end-user while also simplifying application communication.

Centralized, dynamic, role-based policies streamline operations:

Regardless of their location, central control of security policies facilitates remote workers’ networking and security aspects. In essence, the network perimeter is the endpoint’s location, even if it is on a network that is not under the authority of the organization’s personnel. Security is implemented dynamically, with policies dependent on the connecting entity’s role.

Reduces Costs and Complexity:

A single software stack replaces appliance sprawl, lowering CAPEX and OPEX expenditures. Removing backhauled traffic flows lowers transport costs, improves data center aggregation, minimizes client-to-cloud latency, and streamlines communication network operations. By safeguarding DIA, SASE lowers the cost of private circuits and allows for more cost-effective transportation options. SASE enforces policies consistently, reducing IT complexity and pressure on IT workers. SASE’s SaaS model enables rapid expansion and technological advancements at a lower cost. SASE provides simple models to purchase, manage, and run, including per-user pricing. SASE provides client security on all devices and operating systems, including Windows, macOS, Linux, and BYOD.

Threat Prevention and Reducing Risk:

The SASE architecture allows application and resource masking, segmentation, and isolation with dispersed control and data planes. The SASE architecture provides comprehensive security at numerous points along the access chain. SASE supports inline encryption and decryption. It also includes risk profiling and evaluation depending on the user, device, and location (UEBA). The SASE fabric has security built-in, guaranteeing that all connections are verified and secured.

Increased and Optimized Performance:

SASE enhances performance and reduces latency by safeguarding DIA, resulting in a better user experience. Applying security measures in a single-pass parallel processing technique reduces latency and enhances application and network performance. By removing backhaul traffic flows, client-to-cloud latency is reduced. SASE’s cloud-native design is scalable flexibly to support WFA and rapid deployment. During peak demand periods, the distributed SASE architecture grows readily to meet traffic fluctuations and reduces delays to the user experience.

Reduced WAN costs:

The route component of SASE works similarly to SD-WAN. You should anticipate reducing or eliminating the requirement for more expensive MPLS and leased circuits in favor of VPN access over the public internet, lowering WAN expenditures. To make the WAN more efficient, WAN optimization technologies can be used. By utilizing cloud connectivity to large SaaS vendors, cloud-based SASE implementations may further optimize traffic flows. Typically, these connections are redundant and extremely dependable. Application availability may improve.

Read More: SASE in 2022!

SASE in 2022!

Secure access service edge (SASE) is a cloud-delivered solution that combines networking capabilities with cloud security functions. It securely links people, systems, and endpoints to applications and services anywhere in the world. These are offered as a cloud service and may be controlled centrally to accommodate today’s agile operations.

But why do organizations need it?

Traditional networks are designed based on location and perimeter. Firewalls and other security applications are often installed on the network perimeter between the organization’s network and the untrusted Internet. The dynamic nature of cloud-based services like Software-as-a-Service (SaaS) and the rise of globally distributed customers and workforce make these location and perimeter-based architectures difficult to adapt. Multiple network and security point solutions, such as secure web gateways and firewalls become more complex resulting in a lack of interoperability.


Traditional Networks – Traditionally, networks are designed based on location and perimeter. Firewalls and similar security applications are installed between the organization’s network and the untrusted internet to secure these. However, the addition of dynamic cloud-based services like SaaS, and the widespread global distribution of customers and workforces pose a slight hurdle for perimeter-based architectures. The volume of network and end-point security solutions, such as web gateways and firewalls, accumulated to ensure complete safety often results in unnecessary complexities and a serious lack of interoperability. To serve the digital business today and in the future, large groups of remote IT architecture had to grow beyond traditional solutions, the way organizations inspected traffic and enforce policies had to improve, and business firms had to rethink how they would network and protect their offices, customers, and services against the changes that cloud and mobility brought about.

SASE is a new System – SASE puts network controls on the cloud edge (SASE Edge). Rather than configuring processes from networking hardware or layering cloud services that require separate setup and management, SASE facilitates network and security services to create a secure and transparent network edge enabling them to be configured across an entire network. Organizations can expand their network perimeter globally to any client or office by employing zero trust access policies on the edge of the cloud network (SASE Edge). SASE architecture is constructed on top of a worldwide network to make customers’ experiences seamless.

Some of the noteworthy features of SASE are:

Identity-Based and Zero-trust Network Security – SASE relies heavily on “zero-trust”, which means the elimination of the concept of trust even if they are already within an organization’s network’s perimeter. In this, a user’s identity is checked before they are granted access restricted to only the resources required. Secure access is the main component of SASE architecture, it is based on various parameters like IP address, time of the day, risk assessed, etc.

A Cloud-Based Service Model – Elasticity, adaptability, and maintenance – the advantages of a cloud-native architecture, are also applicable to SASE. By combining multiple point products into a single solution, to simplify network and security applications, organizations can lower the total costs of purchase and maintenance of network and security infrastructure.
Secure web gateways (SWG) filter inappropriate content from internet traffic, block unauthorized users’ activity and enforce security policies to avoid cyber-attacks. Firewall-as-a-Service (FWaaS) refers to firewalls included as a service in the cloud. FWaaS guards against cyber threats on cloud-based platforms is a suite of security features that includes IP address filtering, intrusion detection and prevention, and consistent monitoring of network traffic.

Software-Defined Wide-Area Network (SD-WAN) – SD-WAN can easily handle a variety of connections and route traffic over the most efficient path. It is designed to meet the evolving needs of enterprise networks brought on by the emergence of the cloud and the Internet. SD-WAN is used to connect to the cloud. SD-WAN is being adopted by businesses to link branch offices to their business network and to improve efficiency and user experience.

Comprehensive Cross-Functionality- Organizations can simplify their IT infrastructure by reducing the number of security products their IT team has to maintain. This results in the strengthening of security into a cloud-based security service. IT teams are freed from the tedious tasks of handling on-premises network infrastructure, which helps them devote expertise to business-specific issues. IT teams can use network and security integration simultaneously on a single platform to handle all functionality and policies. Cross-team coordination enhances overall service quality for an enterprise. SASE helps organizations to set, track, modify, and execute access policies in all locations, rather than managing different policies for separate locations.

One needs a network that just works constantly delivering smooth and reliable access to keep them safe. They are hence expected to be productive without compromising their experience. Users expect constant access to the resources since working from anywhere has become the norm. This is what a SASE structure promises, and is unquestionably a bright point for the future of security.

Current status of SD-WAN and SASE planning

Aryaka, the Cloud-First WAN and Security company, released a report that provided insights into global SD-WAN and SASE planning. The survey was completed by 1,600 information technology (IT) enterprise decision-makers worldwide.

Businesses all over the world are dealing with a rapid pace of change and unpredictability which has been exacerbated by the pandemic. Enterprise leaders are shifting to cloud-first models to meet the needs of a workforce that is not confined to the traditional office. To keep employees productive and able to collaborate in Hybrid workplace environments, the right connectivity and security technologies are required. The status quo of legacy telco-managed technologies and complex do-it-yourself solutions are being challenged.

The chief analyst of Futuriom, Scott Raynovich says, “This year’s Aryaka State of the WAN includes many valuable insights backing up trends we see in the industry. These include the effects of hybrid work, with 75% projecting a quarter of their employees to remain at least part-time remote, and cloud connectivity demands skyrocketing with 51% planning to move away from traditional data centers over the next two years. Both initiatives will require more sophisticated network-as-a-service (NaaS) solutions with integrated security offerings.”

Cyolo Raises $21 Million in Series A funding to Grow Zero-Effort Zero-Trust Solutions

Cyolo, a developer of a Zero Trust Network Access (ZTNA) 2.0 solution for businesses, announced that it has raised $21 million in a Series A funding round led by Glilot Capital Partners, with investments from National Grid Partners and Merlin Ventures, as well as current investors Flint Capital, Global Founders Capital, and Differential Ventures.

Organizations are more vulnerable than ever before to breaches and vulnerabilities, which can result in long-term financial and reputational loss. Many governments around the world are now acting quickly to improve cybersecurity by hastening the adoption of new security best practices based on Zero Trust connectivity. Cyolo’s solution offers a new and innovative method to link users to their workplace environment by eliminating transitive trust and continuously verifying and authorising every endpoint, user and identity before and after granting them access to any organizational resource or app.

Cyolo is the first Zero Trust solution that spans both IT and Operational Technology (OT). It has zero access or insight into client data, leaving no vulnerability and assuring that enterprises do not compromise on data or company secrets. The company’s ZTNA 2.0 enables IT and security teams, SASE providers, and MSSPs to quickly deploy the most secure Zero Trust connection solution into any existing environment without requiring any infrastructure changes, lowering the risk to an organization’s digital assets and data.

“Cyolo is solving a critical problem by giving organizations an agile and easy-to-integrate solution that allows them to have full visibility and control. The timing is right to expand into new markets, and this investment enables us to further execute our vision of transforming secure connectivity from network-based to identity-based, in order to provide organizations with a solution for their current and future needs. This round will allow us to accelerate growth and R&D efforts, and help new customers easily navigate the transition to Zero Trust,” said Almog Apirion, CEO and co-founder of Cyolo.

Glilot Capital is one of Israel’s top performing VC funds with a focus on cybersecurity and enterprise software, and the investment in Cyolo was made by Glilot+, Glilot Capital’s recently raised $180M early-growth fund. “We are very excited to join the journey of Cyolo. We have been tracking Cyolo and other Zero Trust technologies for quite some time and Cyolo’s product execution is the best we’ve seen. Cyolo has grown exponentially and its roadmap and vision for the future of secure connectivity aligns with market needs. We are excited to support the company as it enters its next phase of growth,” said Kobi Samboursky, Glilot Capital Partners Co-founder and Managing Partner.

“By simplifying complex environments and enabling organizations to secure their digital assets in a distributed and multi-cloud environment, Cyolo’s flexible model integrates with existing technologies to ensure the safety of sensitive data and digital processes. This cutting-edge solution enables organizations to create their own distributed cloud based on identities,” said Sergey Gribov, Flint Capital Partner.

Over the past year, Cyolo has doubled its value quarter-by-quarter and has been rapidly Cyolo has been aggressively establishing collaborations with worldwide clients and service providers over the last year, doubling its value quarter after quarter.