Secure Access Service Edge

Netskope reversed logo

Connect securely and eliminate perimeter-based legacy solutions

SASE is the convergence of Security-as-a-Service and Network-as-a-Service SASE is an architecture enabled through cloud-based platform Provides the opportunity to rethink the network and security stack. Required to meet the demands of digital business transformation

Reduction in complexity & costs

Increased effectiveness of network and security staff

Improvement in performance & latency

Ease of use & transparency for users

Features of SASE

Liquid’s technologies cloud-based security platform, including integrated CASB, SWG, ZTNA and DLP. a cloud-based security posture must be accessible through a fast, worldwide network of data centres and peering relationships.

Cloud Firewall – Liquid owned MSSP offering consisting of virtual UTM per customer

Cloud Access Security Broker (CASB) – Customer owned device hosted within Liquid DC or at customer premises

Nextgen Secure Web Gateway (SWG) Multi-tenant Vendor options – Netskope and Cisco

Private Access for Zero Trust Network (Zero Trust) – Cisco, Fortinet, Check Point, Sophos and Palo Alto to be provided upon request

Advanced Analytics – Next generation firewall (NGFW), Virtual private networking (VPN), Secure Access Service Edge (SASE), Secure SD-WAN, Zero-Trust

Cloud Firewall – Liquid owned MSSP offering consisting of virtual UTM per customer​

Cloud Access Security Broker (CASB) – Customer owned device hosted within Liquid DC or at customer premises​9

Nextgen Secure Web Gateway (SWG) Multi-tenant Vendor options – Netskope and Cisco ​

Private Access for Zero Trust Network (Zero Trust) – Cisco, Fortinet, Check Point, Sophos and Palo Alto to be provided upon request​

Advanced Analytics – Next generation firewall (NGFW), Virtual private networking (VPN), Secure Access Service Edge (SASE), Secure SD-WAN, Zero-Trust 

Vendors – Netskope a leader and Cisco always popular

The Liquid Intelligent Technologies Solution assists our clients by mitigating:

Unauthorized Access – Unauthorized access by users or devices, e.g. remote endpoints

Unauthorized utilization of Network Protocols, Services, Applications and IPsv – Misuse and compromise via vulnerable or weakly configured network protocols, services, IP’s and applications

Malicious code and malware attacks – Virus attacks, compromise via malicious code website exploits

Intrusion and Brute Force – Intrusions attempts in all it forms including brute force attacks on user credentials

Data Leakage, Shadow IT -Leakage of sensitive data by users, unauthorized utilization of unsanctioned applications in the Cloud

Data Interception – Interception of sensitive information including user passwords

Enable zero trust network access

User and end user behaviour analysis

Centralized policy with local enforcement

Scalability & Redundancy

Interested?

Leave your details and our team will be in touch