Close

GigaOm Radar for Secure Service Accessv2.0

An Evaluation Guide for Technology Decision Makers

Table of Contents

  1. Summary
  2. Deployment Types and Operations Models
  3. Key Criteria Comparison
  4. GigaOm Radar
  5. Vendor Insights
  6. Analyst’s Take
  7. About Ivan McPhee

Summary

Secure service access (SSA) represents a significant shift in the way organizations consume network security. Replacing multiple point products with a single integrated platform offering full interoperability and end-to-end redundancy, SSA shifts security consumption from either data center- or edge-centric to ubiquitous and user-centric. Leveraging cloud-native, layered security functions, SSA meets each organization’s unique needs irrespective of network architecture, cloud infrastructure, user location, or device.

However, while some vendors deliver a single integrated platform offering full interoperability and end-to-end redundancy, others are repackaging existing point products or developing a common UI and going to market with an SSA solution. In addition, many vendors are incorporating framework acronyms into their product names, either limiting solution features and functionality or creating further confusion as additional capabilities are added or new frameworks emerge.

Representing features and capabilities widely adopted and well implemented in the industry, the following table stakes are the minimum required for solutions to be included in the GigaOm Radar for secure service access.

  • Cloud-native convergence: Networking and security are converged into a single cloud-native platform. Services are available in the cloud as a software as a service (SaaS) offering independent of specific hardware requirements. Cloud-native refers to platforms specifically designed to take advantage of a cloud delivery model to increase speed, scalability, and agility.
  • Location-independent service delivery: Services are independent of user location and available to any user using any device anywhere in the world. With the shift toward a distributed workforce, remote users must have the same access to resources and services as if they were physically located in a corporate office.
  • User-centric policy enforcement: Policies are enforced based on the identity and behavior of the user (application, device, or human) accessing the resource. Therefore, well-designed, converged network and security systems should enable the user journey, providing authenticated users with authorized access to resources and services as easily and quickly as possible.
  • Distributed policy enforcement: Instead of the enterprise data center being the access gateway to the network, policies are enforced, and threats are detected and eliminated at multiple data touchpoints. Ideally, defense-in-depth should be implemented within multiple layers of the OSI model, with Layer 3 and 4 firewalls filtering traffic at the packet level and Layer 7 firewalls filtering content for granular protection.
  • Standardized software-defined architecture: SSA depends on the availability of a ubiquitous cloud-native software-defined architecture supporting a broad range of use cases and scenarios across a shared infrastructure. Running over the existing private, public, or managed networks via global POPs, software-defined applications accelerate time-to-value by eliminating the need to deploy and commission hardware.

Once the table stakes are met, each solution is scored on key criteria and evaluation metrics. Key criteria are the basis on which organizations decide which solutions to adopt for their particular needs, while evaluation metrics determine the impact the solution may have on the organization.

This GigaOm Radar report provides an overview of notable SSA vendors and their available offerings. The corresponding GigaOm report “Key Criteria for Evaluating Secure Service Access Solutions” outlines critical criteria and evaluation metrics for selecting an SSA solution. Together, these reports offer essential insights for enterprise security initiatives, helping decision-makers evaluate solutions before deciding where to invest.

How to Read this Report

This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding, consider reviewing the following reports:

Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions.

GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector.

Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product.

Full content available to GigaOm Subscribers.

Sign Up For Free