{"id":518,"date":"2024-10-08T19:07:33","date_gmt":"2024-10-08T19:07:33","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=518"},"modified":"2024-10-08T19:07:33","modified_gmt":"2024-10-08T19:07:33","slug":"aryaka-brings-casb-into-unified-sase-fold","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=518","title":{"rendered":"Aryaka brings CASB into unified SASE fold"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>Aryaka continues to build out its SASE platform, adding new capabilities aimed at enhancing security and simplifying the adoption process for enterprises that want to\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/2075149\/sd-wan-sase-outpace-mpls-investments-survey.html\">consolidate their network and security deployments<\/a>.<\/p>\n<p>At the heart of this update is Aryaka\u2019s new cloud access security broker (CASB). A CASB is used to help secure access to cloud and software-as-a-service (SaaS) applications. The new CASB capability is directly integrated into the Aryaka platform in a bid to enable organizations to have more control and\u00a0<a href=\"https:\/\/www.networkworld.com\/article\/972187\/how-to-shop-for-network-observability-tools.html\">visibility over network traffic<\/a>\u00a0in and out of cloud applications.<\/p>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/3552285\/aryaka-brings-casb-into-unified-sase-fold.html\">Continue reading on Network World.<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Aryaka continues to build out its SASE platform, adding new capabilities aimed at enhancing security and simplifying the adoption process for enterprises that want to\u00a0consolidate their network and security deployments. At the heart of this update is Aryaka\u2019s new cloud access security broker (CASB). A CASB is used to help secure access to cloud and [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":519,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/518"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=518"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/518\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/519"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}