From Networking to Security, SASE Takes a New Kind of Teamwork

SASE requires that the networking and security teams work together—but who’s the boss? Some companies are combining these teams into a single department.

A circle of hands each holding an unconnected puzzle piece.
(Credit: franky242 / Alamy Stock Photo)

The SASE (secure access service edge) market is on target to exceed $16 billion by 2028, largely driven by companies’ desire to move more IT to the cloud and to secure all the multi-cloud data exchanges that they perform at the same time, according to a recent report by Dell’Oro group.

"The SASE market is not just growing; it's transforming how enterprises approach their network and security architecture,” said Mauricio Sanchez, Sr. Director, Enterprise Security and Networking at Dell'Oro Group, in a release. “As businesses adapt to the new normal of hybrid work and distributed applications, integrating networking and security into a cohesive, cloud-native solution becomes paramount. SASE is not a trend; it's the future of enterprise connectivity and security.”

Are IT departments integrating their security and networking areas because of SASE? Judging by the organizations I’ve spoken with, it’s a mixed bag of combining both departments, leaving both departments as separate silos, and trying to blend them into some kind of hybrid collaboration.

In virtually all cases, the key is identifying the differences and the synergies between the two groups because it is commonly acknowledged that they must work together when it comes to SASE. This process begins with classifying the skillsets and competencies of both groups, seeing where there is duplicity of duties, and then determining the right blend of skills and effort to field a team for SASE.

Step One: Assessing SASE Skills

For network management professionals, the skills and competencies of employees are:

  • Installing and maintaining network hardware and software

  • Setting, tuning, observing, and optimizing network performance

  • Developing failover strategies and network workload balancing

  • Planning the network for future expansion

  • Testing new network equipment and concepts

  • Supporting users when it involves network troubleshooting issues

  • Working with users, application development, database administration, and systems support on planning, deployment, and troubleshooting issues.

In the cybersecurity area, the important employee skills and competencies are:

  • Monitoring security

  • Researching future security threat landscape

  • Assessing risks

  • Assuring compliance

  • Working with auditors, examiners, regulators, insurance companies, and others who have an active interest in corporate security

  • Defining security governance standards and controls

  • Participating in employee security training exercises

  • Writing security policies

  • Reporting to upper management and the board on security status and risks.

In the event of a network security breach or threat, the security and network groups work together for purposes of breach prevention or mitigation.

There is bound to be overlap as the two groups work together and there is, especially when both are focused on a potential or actual security breach. In other cases, there is a sharp division of labor. The networking group is more technically oriented because its utmost attention is directed toward network uptime, availability, and optimal performance for users.

In contrast, the security group is less technically oriented. Instead, it focuses on being cognizant of security threats and ensuring that the latest guidelines and regulations for security are in place. The security team also reports on security and compliance to the board, upper management, insurance companies, auditors, examiners, and others with a need to know.

Next Steps: The Conversation That SASE Forces

Because SASE moves security practices and governance out to the edges of cloud providers and out of the data center, the task becomes not only ensuring the enterprise's security and governance criteria are met by the SASE provider but also that the SASE provider has compliant security practices in its own right. To do this, both the networking group, which configures security at the SASE provider, and the security group, which ensures that the SASE is security-compliant, must participate.

Some companies have reconsidered their organizational structures because of SASE, thinking that it might be more effective to combine the security and networking functions into a single department instead of having both functions operate under their own separate silos. This approach can work -- and separate silos can work too, so long as there is active collaboration between the two functions as it is needed.

What hasn’t worked is a blended approach between networking and security where there is a dotted line reporting from one function to another. This blended approach quickly becomes dysfunctional because there is always confusion as to whom has the ultimate authority to call the shots when it comes to decision making or strategy.

About the Author

Mary E. Shacklett, President, Transworld Data

Mary E. Shacklett is an internationally recognized technology commentator and President of Transworld Data, a marketing and technology services firm.

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox

You May Also Like


More Insights