{"id":7842,"date":"2021-07-14T14:58:37","date_gmt":"2021-07-14T12:58:37","guid":{"rendered":"https:\/\/www.ensec.ch\/managed-it-security\/secure-access-service-edge-sase\/"},"modified":"2024-12-19T09:19:57","modified_gmt":"2024-12-19T08:19:57","slug":"secure-access-service-edge-sase","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/managed-it-security\/secure-access-service-edge-sase\/","title":{"rendered":"Managed Secure Service Edge"},"content":{"rendered":"<h1>Managed Secured Service Edge<\/h1>\n<h2>Optimised networks and security for all applications, users and locations \u2013 on a single, central platform.<\/h2>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<ul>\n<li>\n        <a href=\"\">Navigation:<\/a>\n    <\/li>\n<li>\n        <a href=\"#vorteile\">Advantages<\/a>\n    <\/li>\n<li>\n        <a href=\"#funktion\">Functional principle<\/a>\n    <\/li>\n<li>\n        <a href=\"#bestandteile\">Ingredients<\/a>\n    <\/li>\n<li>\n        <a href=\"#business\">Business relevance<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<div>\n<p>By providing a unified, cloud-based security and network concept managed by experts, Managed SASE helps companies to optimise their IT resources, improve their security posture and maximise the performance of their networks.<\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security_02.jpg\" alt=\"\"><\/p>\n<h3>The seven most important use cases for SASE<\/h3>\n<p>eBook Download<\/p>\n<p><a href=\"#\">Download now<\/a><\/p>\n<\/div>\n<h2>Why Managed SASE?<\/h2>\n<hr>\n<h3>Reduced complexity<\/h3>\n<div>\n<p>Combining security functions, for which a number of individual products from different manufacturers are traditionally used, with a single integrated and cloud-based solution significantly reduces complexity. This can massively reduce operating costs.<\/p>\n<\/div>\n<hr>\n<h3>Increased security<\/h3>\n<div>\n<p>With the increasing use of cloud services and remote employees, the attack surface has grown. SASE offers a comprehensive security solution designed to support and secure these scenarios. This protects data and applications from threats and unauthorised access, while functions such as ZTNA also secure remote access to company resources.<\/p>\n<\/div>\n<hr>\n<h3>Better Performance<\/h3>\n<div>\n<p>Traditional network architectures can be overloaded by increasing data traffic and the use of cloud services. SASE optimises network performance through the use of SD-WAN and the provision of security functions at the edge.<\/p>\n<\/div>\n<h2>The functional principle of SASE<\/h2>\n<div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/ensec_sase_funktionsprinzip.png\" alt=\"SASE functional principle diagram\"><\/p>\n<h3>United in one platform<\/h3>\n<p>SSE and SD-WAN<\/p>\n<div>\n<p>SASE combines network and security-as-a-service functions in one cloud platform. By consolidating these functions, companies can greatly simplify their security architecture while improving the security and performance of their networks. Expensive MPLS solutions can also be replaced.<\/p>\n<\/div>\n<\/div>\n<h2>What tasks we take on for you<\/h2>\n<ul>\n<li>\n<h3>Implementation and configuration<\/h3>\n<div>\n<p>Although SASE technology simplifies many aspects of security, good preparation is required to ensure that the implementation runs smoothly and without failures.<\/p>\n<ul>\n<li>Requirements analysis and planning<\/li>\n<li>Design of the network and security architecture that integrates SASE<\/li>\n<li>Design and adoption of the security policies<br \/>Definition and configuration of data flow policies and access controls<\/li>\n<li>Integration and configuration of SASE components such as: SD-WAN, SWG, CASB, firewall, ZTNA<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>\n<h3>Monitoring and management<\/h3>\n<div>\n<p>Real-time monitoring of network traffic and security events to detect anomalies and threats at an early stage.<\/p>\n<\/div>\n<\/li>\n<li>\n<h3>Maintenance and further development<\/h3>\n<div>\n<p>We take on the following tasks as part of the Service Level Agreement (SLA):<\/p>\n<ul>\n<li>Processing and optimising the rules and regulations<\/li>\n<li>Troubleshooting and fault rectification<\/li>\n<li>Lifecycle management of the infrastructure<\/li>\n<li>Further developments and enhancements as part of projects. (Architecture, infrastructure requirements, connection of (additional) locations)<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>\n<h3>Last Mile Management<\/h3>\n<div>\n<p>The monitoring and management service for the last mile is operated from a Network Operation Centre (NOC) set up specifically for this purpose. The service monitors the SASE sockets and offers:<\/p>\n<ul>\n<li>Real-time detection of connection failures or degradations,<\/li>\n<li>proactive opening of tickets with the Internet Service Provider (ISP)<\/li>\n<li>and follow-up until the connection service is restored.<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<\/ul>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/Frachter_weltkarte.jpg\" alt=\"\"><\/p>\n<h2>Your entire company network &#8211; connected and secured via a single service.<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p>How can IT support the company with the desired security, performance and agility in a time characterised by increasing technical and operational complexity?<\/p>\n<p>By massively reducing IT complexity. A flexible and cost-effective SASE solution can drive digital transformation in a wide range of use cases. New branches can be connected quickly and the rules and regulations can be managed centrally.<\/p>\n<p>ensec is at your side with strong partners to implement the transition to a new IT infrastructure era.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p>\n    <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Managed Secured Service Edge\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Optimised networks and security for all applications, users and locations \\u2013 on a single, central platform.\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\",\"modified\":\"2021-07-13T19:31:48.139Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"60\",\"css\":\".el-section {\\n\\tmargin-bottom:130px;\\n}\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"active\":true,\"content\":\"Navigation:\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Advantages\",\"link\":\"#vorteile\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Functional principle\",\"link\":\"#funktion\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Ingredients\",\"link\":\"#bestandteile\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Business relevance\",\"link\":\"#business\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]}],\"props\":{\"column_gap\":\"large\"}},{\"type\":\"row\",\"props\":{\"column_gap\":\"large\",\"layout\":\"2-3,1-3\",\"margin\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>By providing a unified, cloud-based security and network concept managed by experts, Managed SASE helps companies to optimise their IT resources, improve their security posture and maximise the performance of their networks.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\",\"text_style\":\"lead\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"}}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"eBook download \\u2013 einzeln\",\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"small\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-image {\\n\\tborder-radius:15px 0 0 15px;\\n}\\n\\n\\n.el-element a {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-element:hover {\\n   \\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n    transition:0.5s;\\n}\\n\\n.el-element:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security_02.jpg\",\"image_align\":\"left\",\"image_grid_breakpoint\":\"s\",\"image_grid_width\":\"2-5\",\"image_height\":800,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":800,\"link\":\"#\",\"link_margin\":\"medium\",\"link_size\":\"large\",\"link_style\":\"secondary\",\"link_text\":\"Download now\",\"margin\":\"default\",\"meta\":\"eBook Download\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_expand\":\"image\",\"panel_image_no_padding\":true,\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"title\":\"The seven most important use cases for SASE\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\"}}]}],\"props\":{\"margin\":\"xlarge\",\"row_gap\":\"large\"}}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"60\",\"css\":\".el-section {\\n\\tmargin-bottom:130px;\\n}\",\"id\":\"vorteile\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Why Managed SASE?\",\"margin\":\"large\",\"margin_remove_bottom\":true,\"maxwidth_breakpoint\":\"m\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\",\"margin\":\"default\",\"text_align\":\"left\",\"text_style\":\"lead\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"id\":\"vorteile\",\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"1-3,1-3,1-3\",\"margin\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\",\"margin\":\"default\",\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"content\":\"Reduced complexity\",\"margin_remove_top\":true,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Combining security functions, for which a number of individual products from different manufacturers are traditionally used, with a single integrated and cloud-based solution significantly reduces complexity. This can massively reduce operating costs.<\\\/p>\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\",\"margin\":\"default\",\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"content\":\"Increased security\",\"margin_remove_top\":true,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>With the increasing use of cloud services and remote employees, the attack surface has grown. SASE offers a comprehensive security solution designed to support and secure these scenarios. This protects data and applications from threats and unauthorised access, while functions such as ZTNA also secure remote access to company resources.<\\\/p>\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\",\"margin\":\"default\",\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"content\":\"Better Performance\",\"margin_remove_top\":true,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Traditional network architectures can be overloaded by increasing data traffic and the use of cloud services. SASE optimises network performance through the use of SD-WAN and the provision of security functions at the edge.<\\\/p>\",\"margin\":\"default\"}}]}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-right-medium\",\"animation_delay\":\"100\",\"id\":\"funktion\",\"image_position\":\"center-center\",\"padding\":\"large\",\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"The functional principle of SASE\",\"margin\":\"large\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"name\":\"Panel Slider Image Left\",\"type\":\"panel-slider\",\"children\":[{\"type\":\"panel-slider_item\",\"props\":{\"content\":\"\n\n<p>SASE combines network and security-as-a-service functions in one cloud platform. By consolidating these functions, companies can greatly simplify their security architecture while improving the security and performance of their networks. Expensive MPLS solutions can also be replaced.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/ensec_sase_funktionsprinzip.png\",\"image_alt\":\"SASE functional principle diagram\",\"meta\":\"SSE and SD-WAN\",\"title\":\"United in one platform\"}}],\"props\":{\"container_padding_remove\":true,\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"left\",\"image_grid_breakpoint\":\"s\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"1-2\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"900\",\"link_margin\":\"large\",\"link_style\":\"text\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"remove\",\"meta_style\":\"h4\",\"nav\":\"dotnav\",\"nav_align\":\"left\",\"nav_breakpoint\":\"\",\"nav_margin\":\"medium\",\"panel_card_offset\":true,\"panel_image_no_padding\":true,\"panel_link\":false,\"panel_match\":true,\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"slidenav\":\"outside\",\"slidenav_breakpoint\":\"xl\",\"slidenav_margin\":\"medium\",\"slidenav_outside_breakpoint\":\"xl\",\"slider_autoplay_pause\":true,\"slider_center\":false,\"slider_finite\":true,\"slider_gap\":\"large\",\"slider_sets\":true,\"slider_width\":\"fixed\",\"slider_width_default\":\"1-1\",\"slider_width_medium\":\"4-5\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":true,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"}}]}],\"name\":\"Funktionsprinzip\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"100\",\"id\":\"bestandteile\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/04\\\/seekarte_hintergrund-02.svg\",\"image_position\":\"top-right\",\"image_size\":\"contain\",\"padding\":\"large\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"\"},\"children\":[{\"type\":\"row\",\"props\":{\"width\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"What tasks we take on for you\",\"margin\":\"large\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"name\":\"Accordion Image Left\",\"type\":\"accordion\",\"children\":[{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>Although SASE technology simplifies many aspects of security, good preparation is required to ensure that the implementation runs smoothly and without failures.<\\\/p>\\n\n\n<ul>\\n\n\n<li>Requirements analysis and planning<\\\/li>\\n\n\n<li>Design of the network and security architecture that integrates SASE<\\\/li>\\n\n\n<li>Design and adoption of the security policies<br \\\/>Definition and configuration of data flow policies and access controls<\\\/li>\\n\n\n<li>Integration and configuration of SASE components such as: SD-WAN, SWG, CASB, firewall, ZTNA<\\\/li>\\n<\\\/ul>\",\"image\":\"\",\"title\":\"Implementation and configuration\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>Real-time monitoring of network traffic and security events to detect anomalies and threats at an early stage.<\\\/p>\",\"image\":\"\",\"title\":\"Monitoring and management\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>We take on the following tasks as part of the Service Level Agreement (SLA):<\\\/p>\\n\n\n<ul>\\n\n\n<li>Processing and optimising the rules and regulations<\\\/li>\\n\n\n<li>Troubleshooting and fault rectification<\\\/li>\\n\n\n<li>Lifecycle management of the infrastructure<\\\/li>\\n\n\n<li>Further developments and enhancements as part of projects. (Architecture, infrastructure requirements, connection of (additional) locations)<\\\/li>\\n<\\\/ul>\",\"image\":\"\",\"title\":\"Maintenance and further development\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>The monitoring and management service for the last mile is operated from a Network Operation Centre (NOC) set up specifically for this purpose. The service monitors the SASE sockets and offers:<\\\/p>\\n\n\n<ul>\\n\n\n<li>Real-time detection of connection failures or degradations,<\\\/li>\\n\n\n<li>proactive opening of tickets with the Internet Service Provider (ISP)<\\\/li>\\n\n\n<li>and follow-up until the connection service is restored.<\\\/li>\\n<\\\/ul>\",\"image\":\"\",\"title\":\"Last Mile Management\"}}],\"props\":{\"collapsible\":false,\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tfont-size:2.3vh;\\n    padding-bottom:15px;\\n}\\n\\n.el-image {\\n\\tmargin-top:10px;\\n}\\n\\n.el-content {\\n\\tmax-width:80%;\\n}\\n\\n.uk-child-width-expand {\\n\\tpadding-bottom:50px;\\n}\",\"image_align\":\"left\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"s\",\"image_grid_width\":\"1-4\",\"image_height\":\"200\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_vertical_align\":false,\"image_width\":\"250\",\"link_margin\":\"small\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"multiple\":false,\"show_image\":true,\"show_link\":true,\"title_element\":\"h3\"}}]}]}],\"name\":\"Bestandteile\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p>How can IT support the company with the desired security, performance and agility in a time characterised by increasing technical and operational complexity?<\\\/p>\\n\n\n<p>By massively reducing IT complexity. A flexible and cost-effective SASE solution can drive digital transformation in a wide range of use cases. New branches can be connected quickly and the rules and regulations can be managed centrally.<\\\/p>\\n\n\n<p>ensec is at your side with strong partners to implement the transition to a new IT infrastructure era.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/Frachter_weltkarte.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"Your entire company network - connected and secured via a single service.\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business \\u2013 schmal\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"ensec \\u2013 Call to action\"}],\"version\":\"4.4.16\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Managed Secured Service Edge Optimised networks and security for all applications, users and locations \u2013 on a single, central platform. Our IT security experts will be happy to advise you. Call now Navigation: Advantages Functional principle Ingredients Business relevance By providing a unified, cloud-based security and network concept managed by experts, Managed SASE helps companies [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7803,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7842","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7842"}],"version-history":[{"count":3,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7842\/revisions"}],"predecessor-version":[{"id":8091,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7842\/revisions\/8091"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7803"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}