Research and practice of SASE cloud security

With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are be...

Full description

Saved in:
Bibliographic Details
Main Authors: Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2022-01-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022019/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529034671915008
author Chaoyang YE
Xin WANG
Shicong ZHANG
Zhiyong ZHAN
Yisha LIU
author_facet Chaoyang YE
Xin WANG
Shicong ZHANG
Zhiyong ZHAN
Yisha LIU
author_sort Chaoyang YE
collection DOAJ
description With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.
format Article
id doaj-art-9ae05ee32fcd4fa2aa3c4f15ae6c3d4d
institution Kabale University
issn 1000-0801
language zho
publishDate 2022-01-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-9ae05ee32fcd4fa2aa3c4f15ae6c3d4d2025-01-15T03:26:36ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012022-01-013814014959809132Research and practice of SASE cloud securityChaoyang YEXin WANGShicong ZHANGZhiyong ZHANYisha LIUWith the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022019/cloud securitySASESD-WAN
spellingShingle Chaoyang YE
Xin WANG
Shicong ZHANG
Zhiyong ZHAN
Yisha LIU
Research and practice of SASE cloud security
Dianxin kexue
cloud security
SASE
SD-WAN
title Research and practice of SASE cloud security
title_full Research and practice of SASE cloud security
title_fullStr Research and practice of SASE cloud security
title_full_unstemmed Research and practice of SASE cloud security
title_short Research and practice of SASE cloud security
title_sort research and practice of sase cloud security
topic cloud security
SASE
SD-WAN
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022019/
work_keys_str_mv AT chaoyangye researchandpracticeofsasecloudsecurity
AT xinwang researchandpracticeofsasecloudsecurity
AT shicongzhang researchandpracticeofsasecloudsecurity
AT zhiyongzhan researchandpracticeofsasecloudsecurity
AT yishaliu researchandpracticeofsasecloudsecurity