Muutke küpsiste eelistusi

E-raamat: SSE, SASE, and Zero Trust: Mastering Security Beyond Borders with Next-Gen Edge Technologies

Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 46,79 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

SSE, SASE, and Zero Trust: Mastering Security Beyond Borders with Next-Gen Edge Technologies is the essential guide for securing the modern, cloud-connected enterprise. Covering the three most influential network security architectures of our time--Secure Services Edge (SSE), Secure Access Service Edge (SASE), and Zero Trust--this book demystifies how these technologies work, why they matter, and how to implement them effectively.

Whether you're modernizing a global enterprise, securing a remote workforce, or preparing for the next evolution of cybersecurity, this comprehensive resource delivers the clarity, strategy, and practical steps needed to build a resilient security foundation.

Written for IT leaders, cybersecurity professionals, network engineers, and students entering the field, SSE, SASE, and Zero Trust blends foundational knowledge with real-world design patterns, migration frameworks, and best practices. Youll learn how these solutions work individually--and how they combine to form a holistic, future-ready security architecture.

If youre looking for a single resource that ties together cloud security, network transformation, and Zero Trust principles, this is the guide youve been waiting for.

What You Will Learn





The core principles of SSE, SASE, and Zero Trust, explained in clear, practical terms How these architectures work together to secure modern, cloud-first environments Proven design patterns and deployment guidance for cloud-delivered security Best practices for protecting hybrid workforces and distributed networks How to evaluate vendors, plan migrations, and reduce legacy complexity Strategies to prevent lateral movement and protect data everywhere Practical examples, case studies, diagrams, and actionable, real-world guidance How to future-proof your security strategy in a rapidly evolving threat landscape

Who This Book Is For

This book is written for:





Cybersecurity analysts, engineers, and architects Network administrators and infrastructure teams CISOs, IT directors, and technology decision-makers Cloud and network architects designing modern environments Consultants, integrators, and managed service providers Students and professionals preparing for or advancing cybersecurity careers Anyone responsible for securing cloud, remote, or hybrid networks

Whether youre a seasoned security professional or just beginning to explore modern security frameworks, this book will give you the knowledge and confidence to design scalable, effective, and resilient security solutions.

Why This Book Stands Out





A Complete View of Modern Security Connects SSE, SASE, and Zero Trust into a single, cohesive frameworknot siloed concepts. Strategic and Hands-On Balances executive-level guidance with practical, technical implementation details. Holistic by Design Integrates identity, networking, cloud security, and Zero Trust into one unified approach. Built for Whats Next Addresses emerging threats and evolving architectures to help you stay ahead of change.
    Introduction xx

Chapter 1 The Evolving Landscape of Edge Technologies 1

    A History of Network Security 2

    The Proliferation of Remote Users and Application Placement Options 7

    Case Study: A Healthcare Providers Shift to Cloud Security 9

    Self-Managed and SaaS Edge 10

    The Triad of Modern Edge Security Concepts: SSE, SASE, and Zero Trust
12

    Bringing It All Together: How SSE, SASE, and Zero Trust Work in Unison
15

    Summary 15

    References 16

Chapter 2 Secure Service Edge (SSE) Unveiled 17

    Core Capabilities of SSE 17

    Recommended and Optional Capabilities of SSE 30

    Methods to Connect and Secure Remote User Access Via SSE 31

    Methods to Connect and Secure Edge Access Via SSE (Owned Branch
Location) 42

    Methods That Connect the Application Environment to SSE 45

    Use Cases: Bringing It All Together 51

    Summary 68

    References 68

Chapter 3 Secure Access Service Edge (SASE) Unveiled 71

    What Is SASE? 71

    Building Blocks of SASE 73

    SSE 74

    SD-WAN 74

    Site-to-Site Communications 85

    Middle Mile Overview 93

    Optional Capabilities of SASE 100

    Elements of SASE 104

    SASE Implementation Options 106

    Methods to Connect and Secure Edge Access Using SASE 109

    Methods to Connect the Application Environment Using SASE 113

    How to Integrate CoLo and Carrier Neutral Facilities 115

    Use Cases: Bringing It All Together 116

    Summary 125

    References 125

Chapter 4 The Essence of Zero Trust Network Security 127

    Introduction to Zero Trust 127

    Zero Trust Principles 131

    Critical Technologies for Implementing a Zero Trust Architecture 139

    Core Pillars of Zero Trust Architectures 148

    Zero Trust Frameworks and Maturity Models 151

    Zero Trust Strategy Example 161

    Summary 167

    References 168

Chapter 5 Integrating Zero Trust with SSE and SASE 171

    Strategies for Synergy 171

    Comprehensive Security Integration 175

    Bringing It All Together 179

    Lessons from Misalignment: The Risk of Silos 179

    From Fragmentation to Convergence 180

    Applying Zero Trust Principles Across the Network Diameter 181

    Case Studies of Successful Integration 184

    Summary 193

    References 193

Chapter 6 Evaluating and Selecting the Right Solution 195

    Assessing Organizational Requirements 195

    Outlining the Decision-Making Process 200

    Planning and Executing Implementation 213

    Sustaining the Zero Trust Program 225

    Summary 225

    References 226

Chapter 7 Managing and Maintaining the Edge Solutions 227

    Understanding Edge Deployment Options 227

    Determining Operational Structure 245

    SASE Troubleshooting 255

    Scalability and Growth Considerations 275

    Summary 279

    References 280

Chapter 8 Future Trends in SSE, SASE, and Zero Trust 283

    Emerging Technologies and Innovations 283

    Evolving Threat Landscape 302

    The Path Forward 305

    Summary 305

    References 306

Glossary 309

 

9780138344955, TOC, 2/4/2026
Gustavo Medina, CCIE #51487, is a Senior Solutions Architect who is passionate about helping enterprise customers design and implement secure and scalable architectures. Known for his ability to solve complex problems and connect the dots across technologies, teams, and business requirements, he takes great pride in contributing to the security industry in meaningful and lasting ways. Beyond his customer work, he mentors engineers around the world and enables Cisco partners on emerging technologies. His influence extends across the company through his involvement in reviewing Cisco official certification exams, presenting at Cisco Live, and developing technical content published on cisco.com.

Since joining Cisco in 2009, Gustavo has been recognized as a trusted advisor and respected member of the global security community. Over the course of his career, he has built deep expertise in network security technologies and has served in roles based in Heredia, Costa Rica; Research Triangle Park, North Carolina; and Mexico City, Mexico. He remains committed to excellence, innovation, and advancing the practice of secure network design through clarity, collaboration, and a problem-solving mindset.

Oscar Ramirez, CCIE #68457, is a Senior Solutions Architect with more than 5 years of specialized experience in SASE and more than 15 years in network and security technologies. He excels at bridging business needs with cutting-edge solutions by delivering impactful technical presentations, guiding proof-of-value deployments, and addressing complex pre-sales challenges.

Leveraging industry-leading credentials, including CCIE Security, CISSP, and CCSP, Oscar specializes in competitive positioning and aligning advanced security architectures such as Zero Trust and SD-WAN to customer requirements. His work reflects a commitment to driving innovation, adoption, and measurable business outcomes.

Through close collaboration with stakeholders and cross-functional teams, he ensures technical alignment and strategic value for enterprise clients. Passionate about secure cloud connectivity and multi-domain architectures, Oscar actively contributes to shaping security strategies that empower organizations on their digital transformation journey.

Ryan Shoemaker, CCIE #7405, is a Senior Solutions Architect from Chicago, Illinois, with more than 30 years of technical expertise in cybersecurity, networking infrastructure, and cloud integrations. He enjoys helping customers utilize networking technologies to accomplish meaningful goals. Leveraging his CCIE and CISSP certifications, along with his MBA, he has found success in connecting new capabilities with accomplishing his customers business goals. Networking is all about connecting, while security is all about protecting, and as such, he has found it critical to implement the right set of capabilities to provide both. He is a passionate content creator who has authored whitepapers, documents, and presentations that he has delivered at different tradeshows throughout his career. He also holds a patent for Optimizing Application Path Selection for Cloud Apps from a Client. This book marks his first attempt at authorship of this scale, and he hopes readers enjoy reading it as much as he did in helping write it.