<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[SafeMesh]]></title><description><![CDATA[Network security insights and strategies]]></description><link>https://blog.safemesh.ca</link><image><url>https://substackcdn.com/image/fetch/$s_!TvJr!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff2eb8f08-8297-478d-9a21-24fee9606984_256x256.png</url><title>SafeMesh</title><link>https://blog.safemesh.ca</link></image><generator>Substack</generator><lastBuildDate>Fri, 08 May 2026 10:51:09 GMT</lastBuildDate><atom:link href="https://blog.safemesh.ca/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[SafeMesh Technologies Inc.]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[safemesh@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[safemesh@substack.com]]></itunes:email><itunes:name><![CDATA[Younos Nazarian]]></itunes:name></itunes:owner><itunes:author><![CDATA[Younos Nazarian]]></itunes:author><googleplay:owner><![CDATA[safemesh@substack.com]]></googleplay:owner><googleplay:email><![CDATA[safemesh@substack.com]]></googleplay:email><googleplay:author><![CDATA[Younos Nazarian]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Why 95% of Firewall Breaches Have Nothing to Do With Technology]]></title><description><![CDATA[and what your business should ask before the next attack]]></description><link>https://blog.safemesh.ca/p/why-95-of-firewall-breaches-have</link><guid isPermaLink="false">https://blog.safemesh.ca/p/why-95-of-firewall-breaches-have</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Tue, 30 Sep 2025 22:54:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Qi3C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Qi3C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Qi3C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic 424w, https://substackcdn.com/image/fetch/$s_!Qi3C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic 848w, https://substackcdn.com/image/fetch/$s_!Qi3C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic 1272w, https://substackcdn.com/image/fetch/$s_!Qi3C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Qi3C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic" width="1280" height="683" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:683,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:142601,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.safemesh.ca/i/174973484?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Qi3C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic 424w, https://substackcdn.com/image/fetch/$s_!Qi3C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic 848w, https://substackcdn.com/image/fetch/$s_!Qi3C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic 1272w, https://substackcdn.com/image/fetch/$s_!Qi3C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12e8e12c-c287-4caf-b0ce-b4f7cbe7afc8_1280x683.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by Pixabay: https://www.pexels.com/photo/seven-white-closed-doors-277593/</figcaption></figure></div><p><strong>Bottom line:</strong> Your business firewall isn&#8217;t protecting you because of how it&#8217;s configured, not what brand you bought. Misconfiguration causes 95% of all firewall breaches, and with the median time to fix critical vulnerabilities now at 32 days, attackers have plenty of time to exploit these mistakes.</p><p>The numbers tell a harsh story. Small and medium businesses are targeted nearly 4 times more than large enterprises, yet only 14% have adequate defenses. When breaches happen, the average cost hits $255,000&#8212;before you factor in the operational disruption that puts 60% of small businesses out of business within 6 months.</p><p>Here&#8217;s what actually matters: National Public Data, a background check company, suffered one of 2024&#8217;s largest breaches&#8212;2.9 billion records exposed&#8212;not because their firewall technology failed, but because someone left default passwords unchanged and put administrator credentials in a publicly accessible file named &#8220;Members.zip.&#8221; The company went bankrupt within months.</p><h2>The complexity problem nobody talks about</h2><p>Modern enterprise firewall policies contain 10,000 to 100,000 lines of rules, up from 200-300 lines two decades ago. About 30-40% of these rules go completely unused. This explosion in complexity creates five critical vulnerability patterns:</p><p><strong>Stagnant rules</strong> stick around after hardware gets decommissioned. You create a rule for a specific server, that server is replaced, but nobody removes the old rule. When the IP address gets reassigned to a new device, the dormant rule suddenly grants unintended access. Bad actors use automated scanning to continuously test for exactly these misconfigurations.</p><p><strong>Duplicate rules</strong> pile up as different administrators create overlapping access paths. Each addition seems necessary at the time, but together they create a tangled mess where nobody can see the actual security posture.</p><p><strong>Shadowed rules</strong> create contradictions&#8212;one rule allows access while another denies it, with the priority order determining what actually happens. Administrators reviewing policies manually can completely misinterpret the real behavior.</p><p><strong>Overly permissive rules</strong> are the most common vulnerability. An administrator temporarily opens firewall access for a new application deployment, intending to tighten permissions later. Then 15 other urgent priorities emerge and the rule remains permanently open. Attackers scan constantly looking for these openings.</p><p><strong>Policy bloat</strong> is the cumulative effect of all these issues, degrading security to the point where managing the firewall becomes nearly impossible.</p><p>The cloud makes everything worse. AWS reports that 73% of companies left SSH wide open to the internet through security group misconfigurations. Microsoft Power Apps portal misconfigurations exposed 38 million records from 47 companies in 2021&#8212;organizations unknowingly made data stores publicly accessible through incorrect default settings.</p><h2>What the Capital One breach teaches SMBs about cloud firewalls</h2><p>Capital One&#8217;s 2019 breach remains the textbook example of cloud firewall misconfiguration. A former AWS employee exploited a misconfigured firewall in Capital One&#8217;s AWS infrastructure, compromising over 100 million U.S. customers and 6 million Canadian customers. The attacker had built tools while working at AWS to scan for misconfigured accounts, then used those tools to systematically find and exploit vulnerabilities.</p><p>The consequences were massive: $190 million class-action settlement and an $80 million fine from banking regulators. The security failures weren&#8217;t sophisticated&#8212;misconfigured web application firewalls allowed unauthorized access, network segmentation failed, user access privileges were too broad, and there were no multiple verification processes for sensitive data.</p><p>For SMBs moving to cloud infrastructure, this breach reveals the critical lesson: cloud firewalls require different expertise than physical firewalls. The same configuration mistakes that might create small vulnerabilities on-premise become catastrophic exposure in cloud environments where everything is internet-accessible by default.</p><h2>The third-party risk that doubled in one year</h2><p>Third-party involvement in breaches doubled from 15% to 30% in just the past year. The Target breach from 2013 remains relevant because this pattern keeps repeating. Attackers accessed Target&#8217;s network through HVAC vendor credentials, exploiting insufficient firewall protection and complete lack of network segmentation. The breach compromised 41 million payment cards and cost over $200 million.</p><p>Change Healthcare&#8217;s February 2024 breach&#8212;the largest healthcare incident in history&#8212;followed the same pattern. Attackers exploited the lack of multi-factor authentication, then moved laterally through inadequate network segmentation to compromise over 100 million customer records. The company paid a $22 million ransom, but the broader impact included disrupted healthcare operations nationwide.</p><p>Verizon&#8217;s 2025 Data Breach Investigations Report confirms that 99% of Global 2000 companies connected to at least one breached vendor. For SMBs with limited IT resources, evaluating and securing third-party access becomes even more critical&#8212;and more difficult.</p><h2>The questions your firewall vendor should answer</h2><p>CFOs and business owners need to translate technical firewall issues into business risk. Here are the specific questions that expose whether your firewall configuration actually protects your business:</p><p><strong>On policy management:</strong> How many firewall rules do we currently have, and what percentage are actively used versus stagnant? When was the last comprehensive audit for duplicates, shadowed configurations, or overly permissive access? How long does it typically take to remediate critical vulnerabilities after patches become available? Do you use automated tools to identify misconfigurations, or rely on manual reviews?</p><p><strong>On access control:</strong> Which third-party vendors have access to our network, and what firewall rules govern their access? Are firewall authentication requirements consistent across all locations and environments? How is the network segmented to limit breach spread? What services and ports are currently open, and are all of them necessary? Have all default passwords and credentials been changed?</p><p><strong>On threat detection:</strong> How quickly can we detect if someone is exploiting a firewall misconfiguration? Do we have real-time monitoring and alerting for firewall changes? What&#8217;s our current dwell time&#8212;how long do threats typically remain undetected? Are all firewall traffic and denied connections logged and analyzed? How do we identify and respond to vulnerability exploitation attempts?</p><p><strong>On ransomware:</strong> How are firewalls specifically configured to prevent ransomware attacks? Can our firewall detect and block ransomware command-and-control communications? Does traffic inspection cover encrypted communications where ransomware might hide? Are backups isolated from the network in case of ransomware encryption?</p><p><strong>On business continuity:</strong> If our firewall was compromised, what would be the financial impact? Do we have cyber insurance, and does it cover firewall misconfiguration incidents? What would 8 hours of downtime cost in revenue and reputation? Does our current security budget allocation match our actual risk profile?</p><h2>What &#8220;next-generation&#8221; actually means (and why it matters)</h2><p>Next-Generation Firewalls aren&#8217;t just marketing terminology&#8212;they represent fundamentally different capabilities that address modern threats. Traditional firewalls inspect packets and ports. NGFWs inspect the actual applications, users, and content flowing through your network.</p><p>The practical difference: a traditional firewall sees &#8220;web traffic on port 443&#8221; and allows it. An NGFW sees &#8220;employee using personal Dropbox to upload company financial data&#8221; and can block it based on policy. NGFWs include intrusion prevention that stops known attack patterns in real-time, application awareness and control beyond just port numbers, user identity integration so policies follow users regardless of device or location, and threat intelligence that updates automatically as new threats emerge.</p><p>For SMBs, this means you can finally answer questions like: Which cloud applications are employees actually using? Is anyone accessing your network from unusual locations? Are any devices communicating with known malicious servers? Traditional firewalls can&#8217;t answer these questions. NGFWs make them visible.</p><h2>The migration question everyone avoids</h2><p>Many SMBs run Cisco ASA or older Firepower appliances that no longer receive security updates. The question isn&#8217;t whether to migrate, but how to migrate without disrupting business operations. The wrong approach causes outages, lost productivity, and finger-pointing. The right approach is invisible to users.</p><p>Here&#8217;s what proper migration includes: comprehensive audit of current rules and traffic patterns to understand what&#8217;s actually needed versus what&#8217;s legacy cruft, parallel deployment where new firewall runs alongside old one until thoroughly tested, gradual cutover that moves services systematically rather than all at once, detailed rollback plans in case issues emerge, and training for your team on the new platform before going live.</p><p>The real risk isn&#8217;t the technology change&#8212;it&#8217;s making changes without understanding your current configuration. If your current firewall has 30-40% unused rules and unknown dependencies, simply replicating that mess onto new hardware solves nothing. Migration should be an opportunity to clean up your security posture, not just move problems to newer equipment.</p><h2>Why Fortinet, Palo Alto, and Juniper dominate SMB deployments</h2><p>Three vendors consistently appear in SMB deployments for different reasons. Fortinet FortiGate provides the best price-to-performance ratio, with strong security features at costs that fit SMB budgets. The management interface is relatively straightforward, and the platform scales well as businesses grow. The downside: support experiences vary, and some advanced features require significant expertise to configure properly.</p><p>Palo Alto Networks PA-Series represents the premium choice with best-in-class threat prevention and the most comprehensive visibility into application traffic. The platform excels at detecting and blocking sophisticated threats, with excellent threat intelligence integration. The tradeoff: higher cost and more complex management that often requires specialized expertise or managed services.</p><p>Juniper Networks SRX Firewalls strike a middle ground, offering strong security with excellent routing capabilities for organizations that need both firewall and advanced networking features in one platform. Particularly popular with businesses that have multiple locations or complex WAN requirements.</p><p>The vendor choice matters less than configuration quality and ongoing management. A misconfigured Palo Alto firewall provides worse protection than a properly configured Fortinet. This is why many SMBs choose managed firewall services&#8212;the vendor operates and monitors the firewall, handles configuration changes, applies patches, and responds to security alerts. You get enterprise-grade security without needing enterprise-sized IT teams.</p><h2>The real cost calculation</h2><p>The Firewall-as-a-Service market is projected to grow from $3.85 billion in 2024 to $28.89 billion by 2034, growing at 22.34% annually. This growth reflects a fundamental shift: SMBs are realizing that buying firewall hardware and hoping for the best doesn&#8217;t work.</p><p>Here&#8217;s the actual cost comparison. Traditional approach: $5,000-$15,000 for hardware, $1,000-$3,000 annually for licensing and support, plus internal IT time for configuration, monitoring, and patch management. Hidden costs include: misconfiguration risk averaging $255,000 per breach, median 32-day window where critical vulnerabilities remain unpatched, and no 24/7 monitoring to detect attacks in progress.</p><p>Managed firewall services: $200-$800 monthly depending on bandwidth and features, with configuration, monitoring, and updates included. The vendor handles security updates immediately, monitors for threats 24/7, and maintains configuration quality that reduces breach risk. Most importantly, the cost is predictable&#8212;no surprise capital expenses when hardware fails or needs upgrading.</p><p>The ROI calculation is straightforward: if properly managed firewalls reduce your breach probability by even 20%, the investment pays for itself many times over compared to the $255,000 average breach cost and 60% business closure rate.</p><h2>What you should do this week</h2><p>Don&#8217;t wait for a breach to expose your firewall vulnerabilities. Start with these immediate actions:</p><p>Request a comprehensive firewall audit that identifies stagnant rules, duplicates, overly permissive access, and configuration weaknesses. Many vendors offer free assessments because they know what they&#8217;ll find&#8212;and know you&#8217;ll want it fixed.</p><p>Document all third-party vendor access and the firewall rules governing those connections. With third-party breach involvement doubling in the past year, this represents your highest-risk exposure.</p><p>Verify that all default credentials have been changed, multi-factor authentication is enabled for firewall management, and administrative access is logged and monitored. The National Public Data bankruptcy proves that basic password hygiene matters more than sophisticated technology.</p><p>Review your vulnerability patching process. If you&#8217;re anywhere near the 32-day median time to patch critical vulnerabilities, attackers have enormous windows to exploit your systems.</p><div><hr></div><p><strong>Want to know what your firewall configuration reveals about your actual security posture?</strong> Our security experts at <a href="https://www.safemesh.ca">SafeMesh</a> provide complimentary firewall assessments for businesses in British Columbia, Alberta, and Washington. We&#8217;ll identify specific vulnerabilities in your current configuration and show you exactly what proper next-gen firewall implementation looks like&#8212;without the sales pressure. <strong><a href="https://calendly.com/younos-safemesh/30min">Schedule your free security check-up</a></strong></p>]]></content:encoded></item><item><title><![CDATA[Why NSA Assumes You're Already Breached]]></title><description><![CDATA[How NSA's Zero Trust Framework Maps to Enterprise Segmentation Strategy]]></description><link>https://blog.safemesh.ca/p/why-nsa-assumes-youre-already-breached</link><guid isPermaLink="false">https://blog.safemesh.ca/p/why-nsa-assumes-youre-already-breached</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Mon, 29 Sep 2025 21:50:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1IRt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1IRt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1IRt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic 424w, https://substackcdn.com/image/fetch/$s_!1IRt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic 848w, https://substackcdn.com/image/fetch/$s_!1IRt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic 1272w, https://substackcdn.com/image/fetch/$s_!1IRt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1IRt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:112991,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.safemesh.ca/i/174359822?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1IRt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic 424w, https://substackcdn.com/image/fetch/$s_!1IRt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic 848w, https://substackcdn.com/image/fetch/$s_!1IRt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic 1272w, https://substackcdn.com/image/fetch/$s_!1IRt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F09090047-90a9-4565-8529-deb49bbd5169_1280x853.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by Photo By: Kaboompics.com: https://www.pexels.com/photo/image-of-old-building-on-american-banknote-4386157/</figcaption></figure></div><p>The National Security Agency's comprehensive Zero Trust architecture provides the most rigorous segmentation framework available for defending against sophisticated threats. While designed for national security systems, the NSA's approach offers critical lessons for commercial enterprises facing similar advanced persistent threats. Understanding how to translate these government-grade requirements into practical enterprise implementation requires deep expertise in both macro and microsegmentation technologies.</p><h2>NSA's threat-informed approach redefines segmentation priorities</h2><p>NSA's foundational guidance "Embracing a Zero Trust Security Model" explicitly states that traditional perimeter defenses fail against adversaries who "demonstrate an ability to penetrate network perimeter defenses with regularity." The framework <strong>assumes breach as the baseline scenario</strong>, designing architectures that contain damage while providing multiple detection opportunities.</p><p>This approach differs fundamentally from compliance-driven segmentation. Where commercial frameworks focus on regulatory requirements, NSA's methodology prioritizes <strong>real-time threat containment and rapid incident response</strong>. The agency emphasizes that Zero Trust must be "threat-aware," reflecting intelligence on advanced persistent threat tactics that increasingly target both government and commercial infrastructure.</p><p>For enterprises implementing these principles, success requires partners who understand both the technical specifications and the operational realities of deploying government-grade security in business environments. <a href="https://safemesh.ca">SafeMesh</a>'s expertise spans the entire spectrum, from network-level macrosegmentation to application-level microsegmentation, enabling organizations to achieve NSA-level security posture while maintaining business agility.</p><h2>Technical implementation exceeds standard commercial requirements</h2><p>The NSA's Network and Environment Pillar establishes segmentation requirements that exceed those of typical enterprise deployments. The framework mandates <strong>comprehensive data flow mapping</strong> as the foundation for understanding network dependencies, with macro segmentation creating large-scale separation between organizational units and microsegmentation providing granular application-level isolation.</p><p>The maturity progression follows four distinct levels, each building sophisticated threat detection capabilities:</p><p><strong>Preparation Phase</strong> establishes security levels and logical distinctions across the network. <a href="https://safemesh.ca">SafeMesh</a> helps organizations map their existing infrastructure, identifying critical assets and data flows that form the foundation for an effective segmentation strategy.</p><p><strong>Basic Implementation</strong> deploys segmentation based on business functions with explicit deny policies. Our NGFW expertise ensures robust macro-level boundaries while preparing the infrastructure for more granular controls.</p><p><strong>Intermediate Deployment</strong> refines access policies with comprehensive ingress/egress controls. This phase leverages <a href="https://safemesh.ca">SafeMesh</a>'s microsegmentation capabilities to create <strong>identity-based policies that adapt dynamically</strong> to user context and device health&#8212;aligning perfectly with NSA's continuous verification requirements.</p><p><strong>Advanced Operations</strong> achieves extensive automation with continuous monitoring and anomaly detection. Our SSE/SASE integration extends these controls to remote workers and cloud resources, creating the unified security fabric NSA envisions.</p><h2>Microsegmentation methodology aligns with leading platform capabilities</h2><p>The NSA's four-phase microsegmentation approach aligns directly with the modern platform capabilities that <a href="https://safemesh.ca">SafeMesh</a> has deployed across hundreds of implementations. The methodology emphasizes <strong>application dependency mapping</strong> and <strong>real-time visualization</strong> of network communications&#8212;capabilities that leading microsegmentation platforms deliver through machine learning and behavioral analysis.</p><p><strong>Phase 1's</strong> comprehensive topology mapping leverages platforms that automatically discover and classify workloads across hybrid environments. These solutions create <strong>dynamic application dependency maps</strong> that update in real-time as infrastructure changes, eliminating the manual mapping burden that traditionally delayed segmentation projects.</p><p><strong>Phase 2's</strong> VLAN and firewall implementation benefits from platforms that operate above the network layer, creating <strong>cryptographically secure segmentation</strong> that is independent of the underlying infrastructure. This approach aligns with NSA's emphasis on software-defined controls that can adapt to evolving threats without hardware dependencies.</p><p>Phase 3's advanced microsegmentation deployment utilizes platforms with <strong>adaptive policy recommendations</strong> based on observed behavior. These systems analyze millions of flows to suggest optimal segmentation policies, reducing the expertise barrier while ensuring comprehensive coverage that meets the NSA's granular control requirements.</p><p>Phase 4's continuous monitoring integration connects seamlessly with existing security stacks through <strong>robust API ecosystems</strong>, enabling automated response mechanisms mandated by the NSA for advanced implementations.</p><h2>OT/IT separation demands specialized expertise</h2><p>The NSA's guidance on operational technology protection reflects a growing concern about threats to critical infrastructure. The framework mandates <strong>physical separation between IT and OT networks</strong> with intermediate devices creating additional barriers&#8212;requirements that <a href="https://safemesh.ca">SafeMesh</a> addresses through specialized industrial security implementations.</p><p>Our approach to OT segmentation follows NSA's prescribed Purdue Model architecture while accommodating the unique requirements of industrial environments. We deploy <strong>unidirectional security gateways</strong> that maintain air-gap principles while enabling necessary data flows for business operations. Protocol-aware monitoring tools parse industrial communications, integrating with enterprise SIEM systems for comprehensive threat visibility.</p><p>The Defense Industrial Base faces particular scrutiny, with the NSA noting that nation-state actors increasingly target smaller contractors that lack enterprise security resources. <a href="https://safemesh.ca">SafeMesh</a>'s managed service offerings enable these organizations to achieve NSA-compliant segmentation without the need for large internal security teams.</p><h2>Government contractor requirements create commercial opportunities</h2><p>NSA's framework establishes specific requirements that federal contractors must meet, creating a cascade effect throughout commercial supply chains. Organizations must implement <strong>phishing-resistant MFA</strong>, maintain Software Bills of Materials, and demonstrate Zero Trust capabilities for FedRAMP authorization.</p><p><a href="https://safemesh.ca">SafeMesh</a> helps organizations navigate these requirements through proven implementation methodologies that strike a balance between security mandates and operational efficiency. Our experience with government contractors provides unique insights into translating NSA guidance into practical deployments that pass federal audits while supporting business objectives.</p><p>The emphasis on supply chain security particularly benefits from our comprehensive approach. We implement segmentation strategies that <strong>isolate third-party access</strong> and create controlled zones for vendor interactions&#8212;critical capabilities, as NSA notes that compromised components would be "internal and fully trusted" in traditional architectures but "would not be inherently trusted" in mature Zero Trust implementations.</p><h2>Intelligence-driven architecture requires advanced integration</h2><p>NSA's framework assumes access to threat intelligence that most commercial organizations lack. The agency emphasizes the integration of "multi-sourced threat reputation services" and capabilities that exceed what individual organizations can provide independently.</p><p><a href="https://safemesh.ca">SafeMesh</a> bridges this gap through partnerships with leading threat intelligence providers and security platforms. Our implementations incorporate <strong>real-time threat feeds</strong> that inform segmentation policies, enabling dynamic responses to emerging threats. When indicators of compromise emerge, our architectures automatically adjust access controls and increase monitoring capabilities that align with the NSA's vision for adaptive defense.</p><p>The integration extends to existing security investments. Rather than requiring wholesale replacement, <a href="https://safemesh.ca">SafeMesh</a>'s approach leverages current infrastructure while adding NSA-aligned segmentation capabilities. NGFW deployments evolve to support sophisticated macro-level controls. Identity management systems integrate with microsegmentation platforms for context-aware access decisions. SASE architectures extend controls to distributed workforces while maintaining centralized policy management.</p><h2>Practical implementation roadmap for commercial enterprises</h2><p>While NSA's timeline focuses on federal requirements, commercial organizations need flexible approaches that deliver incremental value. <a href="https://safemesh.ca">SafeMesh</a> has developed a proven methodology that adapts NSA principles to enterprise realities:</p><p><strong>Assessment and Planning (30-45 days)</strong>: We map existing infrastructure against NSA's maturity model, identifying gaps and quick wins. This phase establishes the business case for investment while creating a risk-prioritized implementation roadmap.</p><p><strong>Foundation Building (60-90 days)</strong>: Initial deployment focuses on high-value assets that demonstrate immediate ROI. We implement macro-level segmentation using existing NGFW infrastructure while preparing for the deployment of microsegmentation.</p><p><strong>Progressive Microsegmentation (3-6 months)</strong>: Leveraging leading platform capabilities, we deploy granular controls around critical applications to enhance security. The approach uses <strong>machine learning-driven policy recommendations</strong> to accelerate deployment while ensuring comprehensive coverage.</p><p><strong>Operational Maturity (6-12 months)</strong>: Integration with the broader security architecture creates a unified defense that NSA envisions. Automated response mechanisms, continuous compliance monitoring, and threat-informed policy updates become standard operations.</p><p><strong>Continuous Evolution (Ongoing)</strong>: Zero Trust requires constant adaptation to emerging threats. <a href="https://safemesh.ca">SafeMesh</a> offers ongoing optimization services that ensure architectures evolve in tandem with the threat landscape, while maintaining operational efficiency.</p><h2><a href="https://safemesh.ca">SafeMesh</a>: translating NSA vision into enterprise reality</h2><p>NSA's Zero Trust framework represents the gold standard for network security architecture. While designed for national security systems, the principles apply directly to commercial organizations facing sophisticated threats. The challenge lies in the practical implementation that balances security requirements with business operations.</p><p><a href="https://safemesh.ca">SafeMesh</a> brings unique expertise to this challenge. Our team has implemented segmentation strategies across government, critical infrastructure, and commercial enterprises. We understand the technical requirements NSA mandates and the operational realities organizations face. Our partnerships with leading security platforms ensure access to capabilities that meet or exceed NSA specifications.</p><p>Most importantly, we recognize that Zero Trust transformation requires more than technology deployment. It demands organizational change, process evolution, and continuous adaptation. <a href="https://safemesh.ca">SafeMesh</a> provides the expertise, methodologies, and ongoing support that transform NSA's vision into operational reality.</p><p>For organizations serious about achieving a government-grade security posture, the path forward is clear. NSA has provided the blueprint. Leading platforms deliver the capabilities. <a href="https://safemesh.ca">SafeMesh</a> provides the expertise to unite vision with execution, creating resilient architectures that defend against today's threats while preparing for tomorrow's challenges.</p><div><hr></div><p><em>Ready to implement NSA-aligned Zero Trust architecture? <a href="https://safemesh.ca">SafeMesh</a> specializes in translating government-grade security requirements into practical enterprise deployments. Our expertise in advanced segmentation strategies, combined with partnerships across the security ecosystem, enables organizations to achieve an unprecedentedly secure posture without sacrificing business agility. Please <a href="mailto:hi@safemesh.ca">reach out</a> to us to assess your current maturity against NSA's framework and develop a customized implementation roadmap tailored to your needs.</em></p>]]></content:encoded></item><item><title><![CDATA[Zero Trust Through Macro and Microsegmentation]]></title><description><![CDATA[Stopping Lateral Movement Before It Starts]]></description><link>https://blog.safemesh.ca/p/zero-trust-through-macro-and-microsegmentation</link><guid isPermaLink="false">https://blog.safemesh.ca/p/zero-trust-through-macro-and-microsegmentation</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Wed, 24 Sep 2025 17:51:22 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!U5pu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U5pu!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U5pu!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic 424w, https://substackcdn.com/image/fetch/$s_!U5pu!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic 848w, https://substackcdn.com/image/fetch/$s_!U5pu!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic 1272w, https://substackcdn.com/image/fetch/$s_!U5pu!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U5pu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:400616,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.safemesh.ca/i/174277532?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U5pu!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic 424w, https://substackcdn.com/image/fetch/$s_!U5pu!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic 848w, https://substackcdn.com/image/fetch/$s_!U5pu!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic 1272w, https://substackcdn.com/image/fetch/$s_!U5pu!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b35b3bc-5f10-489a-b970-9647e7deac6a_1280x853.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by Tim Mossholder: https://www.pexels.com/photo/black-and-white-textile-in-close-up-photography-3612931/</figcaption></figure></div><h2>The New Reality of Network Security</h2><p>Every major breach in the past five years shares one common thread: <strong>lateral movement</strong>. Attackers didn't need sophisticated zero-days or nation-state resources. They needed a single entry point and the ability to move laterally through networks designed with outdated trust models.</p><p><em>Colonial Pipeline</em>. <em>JBS Foods</em>. <em>Kaseya</em>. <em>MGM Resorts</em>. Different industries, different attack vectors, but the same fundamental failure&#8212;<strong>once inside, attackers moved freely between systems that had no business communicating with each other.</strong></p><p>This isn't a technology problem. It's an architecture problem. And Zero Trust segmentation is the solution that's proving its worth in production environments worldwide.</p><h2>Understanding Modern Segmentation</h2><p>Traditional network security operates on a flawed assumption: <strong>that we can identify and stop threats at the perimeter.</strong> But when 82% of breaches involve human element&#8212;stolen credentials, phishing, or misuse&#8212;the perimeter becomes meaningless.</p><p>Zero Trust segmentation takes a different approach. Instead of trusting anything inside the network, it creates <strong>controlled communication paths</strong> between resources. Every connection must be explicitly allowed, verified, and monitored.</p><p><strong>Macrosegmentation</strong> establishes logical boundaries between major network zones. Your payment processing systems don't communicate with HR databases. Manufacturing controls stay isolated from corporate email. These broad separations prevent attackers from pivoting between unrelated business functions.</p><p><strong>Microsegmentation</strong> goes deeper, controlling communications at the application and workload level. A web server can only communicate with specific database servers using defined protocols on designated ports. Even if an attacker compromises the web server, they can't scan the network or access unrelated systems.</p><p>Together, they create defense in depth that assumes compromise and limits blast radius&#8212;turning potential disasters into manageable incidents.</p><h2>The Business Impact You Can Measure</h2><p>Organizations implementing Zero Trust segmentation report consistent, measurable improvements:</p><p><strong>Financial Impact:</strong></p><ul><li><p>Average ROI of 250% within 18 months</p></li><li><p>66% reduction in breach remediation costs</p></li><li><p>40% decrease in cyber insurance premiums</p></li><li><p>90% reduction in security operations overhead</p></li></ul><p><strong>Operational Benefits:</strong></p><ul><li><p>75% faster incident response and containment</p></li><li><p>60% reduction in compliance audit preparation</p></li><li><p>50% decrease in false positive security alerts</p></li><li><p>80% improvement in change management efficiency</p></li></ul><p>These aren't theoretical projections. They're results from organizations that have completed implementations and measured actual outcomes.</p><h2>Why Now? The Convergence of Necessity and Capability</h2><p><strong>Three forces</strong> are driving Zero Trust adoption from nice-to-have to business imperative:</p><p><strong>Regulatory Pressure</strong> New regulations explicitly require segmentation. Healthcare organizations face updated HIPAA requirements mandating network segmentation. Financial services must demonstrate PCI DSS compliance through network isolation. Federal contractors must meet Zero Trust requirements by 2024. The era of checkbox compliance is ending&#8212;regulators want architectural proof.</p><p><strong>Technology Maturity</strong> Modern segmentation platforms have solved the problems that plagued early implementations. Machine learning identifies optimal segmentation policies based on actual traffic patterns. Cloud-native architectures enable segmentation without hardware changes. API-driven automation eliminates manual policy management. The technology has caught up to the vision.</p><p><strong>Threat Evolution</strong> Ransomware operators now specifically target flat networks where they can maximize damage. Supply chain attacks assume they'll gain internal access&#8212;segmentation is the only defense. Insider threats, whether malicious or accidental, require zero-trust approaches. The threat landscape has made traditional perimeter security obsolete.</p><h2>Implementation: A Practical Approach</h2><p>Successful Zero Trust segmentation follows a predictable pattern that strikes a balance between security improvement and operational continuity.</p><p><strong>Phase 1: Discovery and Planning (30-60 days)</strong> Map critical assets and data flows. Identify communication patterns between applications. Document current security controls and gaps. Build stakeholder consensus on priorities. This phase creates the foundation for everything that follows.</p><p><strong>Phase 2: Macrosegmentation (60-90 days).</strong> Implement broad network zones based on business function. Separate production from development environments. Isolate high-risk systems, such as guest networks and IoT devices. Establish monitoring to validate zone boundaries. Start with apparent separations that deliver immediate value.</p><p><strong>Phase 3: Progressive Microsegmentation (6-12 months).</strong> Begin with crown jewel applications&#8212;those whose compromise would cause maximum damage. Implement ring-fencing around critical databases and applications. Deploy host-based controls for granular policy enforcement. Use machine learning to identify and suggest optimal policies. Expand coverage based on risk and business value.</p><p><strong>Phase 4: Automation and Optimization (Ongoing)</strong> Integrate with existing security tools for unified policy management. Implement automated response to security events. Continuously refine policies based on observed behavior. Scale successful patterns across the enterprise. Transform from static rules to dynamic, risk-based controls.</p><h2>Common Challenges and How to Address Them</h2><p><strong>"We'll break something critical."</strong> Modern platforms include simulation modes that show policy impacts before enforcement. Start with a monitoring-only deployment to understand traffic patterns. Implement progressive enforcement with immediate rollback capabilities. Build confidence through incremental success.</p><p><strong>"Our environment is too complex."</strong> Complexity is precisely why you need segmentation. Start with high-value, well-understood applications. Use automated discovery to map unknown dependencies. Leverage vendor expertise and proven methodologies. Perfect is the enemy of good&#8212;start somewhere.</p><p><strong>"We don't have the expertise."</strong> Partner with experienced providers who've done this before. Use cloud-delivered solutions that reduce operational complexity. Invest in training for existing staff. Build expertise through doing, not planning.</p><p><strong>"It's too expensive."</strong> Calculate the cost of your subsequent breach&#8212;or your last one. Factor in reduced compliance costs and operational efficiency. Consider managed service options to reduce capital investment. The question isn't whether you can afford to implement Zero Trust&#8212;it's whether you can afford not to.</p><h2>Real-World Success Patterns</h2><p><strong>Global Financial Services Firm</strong></p><ul><li><p>Challenge: 50,000 endpoints across 30 countries with a flat network architecture</p></li><li><p>Solution: Phased microsegmentation starting with payment processing systems</p></li><li><p>Result: 95% reduction in lateral movement paths, successful defense against three ransomware attempts</p></li></ul><p><strong>Regional Healthcare Network</strong></p><ul><li><p>Challenge: HIPAA compliance across 12 hospitals with shared services</p></li><li><p>Solution: Macrosegmentation between facilities, microsegmentation for EMR systems</p></li><li><p>Result: Passed compliance audits with zero findings, 70% reduction in security incidents</p></li></ul><p><strong>Manufacturing Conglomerate</strong></p><ul><li><p>Challenge: IT/OT convergence creates new attack vectors</p></li><li><p>Solution: Strict segmentation between corporate and production networks</p></li><li><p>Result: No production impact from corporate ransomware infection, 30% improvement in operational efficiency</p></li></ul><h2>The Integration Imperative: SSE, SASE, and Beyond</h2><p>Zero Trust segmentation doesn't exist in isolation. It must integrate with your broader security architecture to deliver full value.</p><p><strong>SASE/SSE Integration</strong> extends segmentation policies to remote workers and cloud resources. Users get consistent security regardless of location. Policies follow workloads across hybrid environments. The network perimeter becomes irrelevant.</p><p><strong>NGFW Enhancement</strong> turns existing firewall investments into segmentation enforcement points. Deep packet inspection validates application-layer policies. Threat intelligence enriches segmentation decisions. Hardware you already own becomes more valuable.</p><p><strong>Identity Integration</strong> integrates user context into segmentation decisions. Access depends on who, what, when, and why. Compromised credentials alone aren't enough for attackers. Business logic drives security policy.</p><h2>Looking Forward: The Next 18 Months</h2><p>Organizations that implement Zero Trust segmentation now will have significant advantages:</p><p><strong>Competitive Differentiation:</strong> While competitors deal with breaches and downtime, you'll maintain operations. Your security posture becomes a business enabler, not an inhibitor. Customers trust organizations that protect their data.</p><p><strong>Regulatory Readiness:</strong> As requirements tighten, you'll already be compliant. New regulations will validate your approach, not require rearchitecture. Audits become demonstrations, not interrogations.</p><p><strong>Operational Excellence:</strong> Understanding your network traffic improves efficiency. Segmentation projects reveal optimization opportunities. Security initiatives drive business improvement.</p><h2>The SafeMesh Advantage</h2><p>We've guided hundreds of organizations through Zero Trust transformation. Our approach combines:</p><p><strong>Deep Expertise</strong> in both macrosegmentation and microsegmentation strategies. We understand the technologies, but more importantly, we understand the business and operational challenges.</p><p><strong>Proven Methodologies</strong> refined through real-world implementations. We know what works, what doesn't, and how to tell the difference.</p><p><strong>Partnership Approach</strong> with leading technology providers. We're vendor-agnostic in strategy, but deeply experienced with the platforms that deliver results.</p><p><strong>Business Focus</strong> that balances security with operational requirements. We implement security that enables business, not security that prevents it.</p><h2>Taking Action</h2><p>Zero-trust segmentation has evolved from an emerging concept to a proven practice. The technology is mature, the benefits are quantified, and the risks of inaction grow daily.</p><p>The question facing every executive is simple: <strong>Do you think you should implement Zero Trust proactively as a business advantage, or reactively after an incident?</strong></p><p>For organizations ready to move forward, the path is clear:</p><ol><li><p><strong>Assess your current segmentation maturity</strong></p></li><li><p><strong>Identify quick wins that deliver immediate value</strong></p></li><li><p><strong>Build a phased implementation roadmap</strong></p></li><li><p><strong>Partner with experts who've done this before</strong></p></li><li><p><strong>Execute with confidence</strong></p></li></ol><p>The best time to implement Zero Trust was three years ago. The second-best time is now.</p><div><hr></div><p><em><a href="https://safemesh.ca">SafeMesh</a> helps organizations implement Zero Trust architectures that deliver measurable security improvement and business value. Please <a href="https://www.safemesh.ca/contact-us">reach out</a> to us to talk about how <strong>macro and microsegmentation</strong> can transform your security posture while enabling business agility.</em></p>]]></content:encoded></item><item><title><![CDATA[Compliance Through the Network Security Lens: How SASE and NGFW Directly Address PCI DSS, HIPAA, SOC 2, and ISO 27001]]></title><description><![CDATA[How modern network security technologies directly address specific compliance requirements&#8212;with real examples and implementation guidance]]></description><link>https://blog.safemesh.ca/p/compliance-through-the-network-security</link><guid isPermaLink="false">https://blog.safemesh.ca/p/compliance-through-the-network-security</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Mon, 22 Sep 2025 19:26:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Pjla!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Pjla!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Pjla!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic 424w, https://substackcdn.com/image/fetch/$s_!Pjla!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic 848w, https://substackcdn.com/image/fetch/$s_!Pjla!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic 1272w, https://substackcdn.com/image/fetch/$s_!Pjla!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Pjla!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic" width="1280" height="1920" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1920,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:260853,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.safemesh.ca/i/168665278?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Pjla!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic 424w, https://substackcdn.com/image/fetch/$s_!Pjla!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic 848w, https://substackcdn.com/image/fetch/$s_!Pjla!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic 1272w, https://substackcdn.com/image/fetch/$s_!Pjla!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c21ba76-ed08-49ce-91ae-4dd4b4d74b5e_1280x1920.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by Vitor Diniz: https://www.pexels.com/photo/vintage-camera-enthusiast-with-rolleiflex-32078973/</figcaption></figure></div><p>As a network security professional at <a href="https://safemesh.ca">SafeMesh</a>, I frequently get asked: "<strong>Which specific compliance requirements do SASE platforms actually address?</strong>" The answer surprises many clients&#8212;modern network security solutions can directly satisfy 60-85% of common compliance controls across major frameworks. But the devil is in the details.</p><p>This guide provides the specific mappings you need to understand exactly how SASE and NGFW technologies align with compliance requirements. No more guessing&#8212;here are the concrete connections.</p><h2>The Reality of Modern Compliance</h2><p>Before diving into specifics, let's establish a critical fact: <strong>Network security is no longer just about preventing breaches&#8212;it's about enabling business growth through compliance</strong>. Organizations completing compliance audits report 30-50% faster sales cycles and access to new markets that require certifications.</p><p>The financial impact is equally compelling. With average data breach costs at $4.88 million and regulatory fines ranging from $137 to $2.067 million per HIPAA violation, prevention investments of $100,000-$500,000 show clear ROI within months.</p><h2>PCI DSS: The Foundation Framework</h2><h3>Requirement 1: Network Security Controls</h3><p>PCI DSS Requirement 1 forms the backbone of payment security, and modern SASE platforms address these requirements comprehensively:</p><p><strong>Requirement 1.2.1: Configuration Standards</strong></p><ul><li><p><strong>What it requires</strong>: Documented firewall and router configuration standards</p></li><li><p><strong>SASE solution</strong>: Centralized policy management with version control and change tracking across all network security controls (NSCs), ensuring consistent configuration standards are maintained and documented</p></li><li><p><strong>Implementation</strong>: Configure template policies in your SASE platform that automatically enforce deny-all rules with explicit allow exceptions</p></li></ul><p><strong>Requirement 1.3.1: Inbound Traffic Restrictions</strong></p><ul><li><p><strong>What it requires</strong>: Inbound traffic to the CDE is restricted to only traffic that is necessary; all other traffic is specifically denied</p></li><li><p><strong>SASE solution</strong>: Application-aware firewalls with granular access controls that identify and block unauthorized applications</p></li><li><p><strong>Implementation</strong>: Deploy zero-trust network access (ZTNA) that provides application-specific access rather than network-level connectivity</p></li></ul><p><strong>Requirement 1.4: Network Segmentation</strong></p><ul><li><p><strong>What it requires</strong>: Implement segmentation to isolate the CDE from other parts of the network</p></li><li><p><strong>SASE solution</strong>: Software-defined perimeter with micro-segmentation capabilities</p></li><li><p><strong>Implementation</strong>: Create isolated network zones for cardholder data environments using identity-based access controls rather than traditional VLANs</p></li></ul><h3>Real-World Example: E-commerce Platform</h3><p>A client processing 50,000 transactions monthly implemented SASE solution to address PCI DSS requirements:</p><ul><li><p><strong>Challenge</strong>: Traditional firewalls couldn't provide application-level visibility</p></li><li><p><strong>Solution</strong>: ZTNA with application-specific policies for payment processing systems</p></li><li><p><strong>Result</strong>: Reduced PCI DSS scope by 70% while improving security posture</p></li></ul><h2>HIPAA Security Rule: Technical Safeguards</h2><h3>&#167;164.312(a)(1): Access Control</h3><ul><li><p><strong>What it requires</strong>: Implementing technical policies and procedures that allow only authorized persons to access ePHI</p></li><li><p><strong>SASE solution</strong>: Identity-based access controls with continuous verification</p></li><li><p><strong>Specific implementation</strong>:</p><ul><li><p>Multi-factor authentication for all ePHI access</p></li><li><p>Role-based access controls (RBAC) with automated provisioning/deprovisioning</p></li><li><p>Session monitoring and recording for audit trails</p></li></ul></li></ul><h3>&#167;164.312(b): Audit Controls</h3><ul><li><p><strong>What it requires</strong>: Implementing hardware, software, and/or procedural mechanisms to record and examine access in information systems that contain or use ePHI</p></li><li><p><strong>SASE solution</strong>: Integrated SIEM with automated log collection and correlation</p></li><li><p><strong>Specific implementation</strong>:</p><ul><li><p>Real-time logging of all network access attempts</p></li><li><p>Automated alerts for suspicious activity</p></li><li><p>Comprehensive audit trails for compliance reporting</p></li></ul></li></ul><h3>&#167;164.312(e): Transmission Security</h3><ul><li><p><strong>What it requires</strong>: Implement technical security measures that guard against unauthorized access to ePHI that is transmitted over an electronic network</p></li><li><p><strong>SASE solution</strong>: End-to-end encryption with key management</p></li><li><p><strong>Specific implementation</strong>:</p><ul><li><p>TLS 1.3 for all data in transit</p></li><li><p>AES-256 encryption for data at rest</p></li><li><p>Automated key rotation and management</p></li></ul></li></ul><h3>Real-World Example: Regional Healthcare Network</h3><p>A 15-hospital network used our services to achieve HIPAA compliance:</p><ul><li><p><strong>Challenge</strong>: Securing ePHI across multiple locations and cloud services</p></li><li><p><strong>Solution</strong>: Cloud-native CASB with ePHI discovery and protection</p></li><li><p><strong>Result</strong>: 95% reduction in compliance preparation time, zero HIPAA violations in 2 years</p></li></ul><h2>SOC 2: Trust Service Criteria</h2><h3>Security Criteria (Common Criteria)</h3><p>SOC 2 security is mandatory for all reports. The objective of the security TSC is to ensure that information and systems are protected against unauthorized access, unauthorized disclosure of information, and damage to systems</p><p><strong>CC6.1: Logical Access Controls</strong></p><ul><li><p><strong>What it requires</strong>: Restrict logical access to information assets</p></li><li><p><strong>SASE solution</strong>: Zero-trust architecture with identity verification</p></li><li><p><strong>Specific controls</strong>:</p><ul><li><p>Unique user identification for all network access</p></li><li><p>Regular access reviews and recertification</p></li><li><p>Privileged access management (PAM) integration</p></li></ul></li></ul><p><strong>CC6.7: Data Transmission</strong></p><ul><li><p><strong>What it requires</strong>: Secure data transmission to protect against unauthorized access</p></li><li><p><strong>SASE solution</strong>: Secure web gateway with SSL/TLS inspection</p></li><li><p><strong>Specific controls</strong>:</p><ul><li><p>Encrypted tunnels for all data transmission</p></li><li><p>Content inspection without compromising encryption</p></li><li><p>Automatic threat detection and blocking</p></li></ul></li></ul><p><strong>CC7.1: System Operations</strong></p><ul><li><p><strong>What it requires</strong>: Monitor system components and their operation</p></li><li><p><strong>SASE solution</strong>: Continuous monitoring with automated alerting</p></li><li><p><strong>Specific controls</strong>:</p><ul><li><p>24/7 network operations center (NOC) monitoring</p></li><li><p>Automated incident response and escalation</p></li><li><p>Performance monitoring and capacity management</p></li></ul></li></ul><h3>Real-World Example: SaaS Provider</h3><p>A cloud-based CRM provider achieved SOC 2 Type II certification:</p><ul><li><p><strong>Challenge</strong>: Meeting security criteria while maintaining performance</p></li><li><p><strong>Solution</strong>: Integrated SASE platform with built-in monitoring and compliance reporting</p></li><li><p><strong>Result</strong>: Passed audit on first attempt, 40% improvement in customer acquisition</p></li></ul><h2>ISO 27001: Network Security Controls</h2><h3>Annex A 8.20: Network Security</h3><p>ISO 27001:2022 Annex A 8.20 focuses on network security by implementing controls to prevent unauthorised access, ensure secure data transmission, segment network traffic, and monitor activities to safeguard ICT infrastructure</p><p><strong>Network Organization and Management</strong></p><ul><li><p><strong>What it requires</strong>: Organise data across a network based on type and categorisation for efficient management and upkeep</p></li><li><p><strong>SASE solution</strong>: Software-defined networking with automated policy enforcement</p></li><li><p><strong>Specific implementation</strong>:</p><ul><li><p>Data classification tags that automatically trigger protection policies</p></li><li><p>Network topology documentation with real-time updates</p></li><li><p>Automated configuration management and drift detection</p></li></ul></li></ul><p><strong>Traffic Filtering and Monitoring</strong></p><ul><li><p><strong>What it requires</strong>: Filter all traffic passing through the network by setting a sequence of regulations, content filtering principles, and data regulations</p></li><li><p><strong>SASE solution</strong>: Advanced threat protection with behavioral analytics</p></li><li><p><strong>Specific implementation</strong>:</p><ul><li><p>Application-aware firewalls with 20,000+ threat signatures</p></li><li><p>Real-time malware detection and blocking</p></li><li><p>Data loss prevention (DLP) with 3,000+ data identifiers</p></li></ul></li></ul><p><strong>Network Segmentation Capabilities</strong></p><ul><li><p><strong>What it requires</strong>: Maintain the aptitude to segregate essential business sub-networks in the occurrence of a security incident</p></li><li><p><strong>SASE solution</strong>: Dynamic micro-segmentation with incident response automation</p></li><li><p><strong>Specific implementation</strong>:</p><ul><li><p>Automated quarantine of compromised devices</p></li><li><p>Dynamic policy adjustment based on threat intelligence</p></li><li><p>Rapid containment and isolation capabilities</p></li></ul></li></ul><h3>Real-World Example: Manufacturing Company</h3><p>A global manufacturer with 50+ locations achieved ISO 27001 certification:</p><ul><li><p><strong>Challenge</strong>: Securing industrial control systems while maintaining operational continuity</p></li><li><p><strong>Solution</strong>: SASE platform with OT/IT convergence capabilities</p></li><li><p><strong>Result</strong>: Zero security incidents during 3-year certification period, 25% reduction in compliance costs</p></li></ul><h2>Technology Integration: Making It Work</h2><h3>CASB: Cloud Access Security Broker</h3><p>Modern CASB solutions address compliance across all frameworks:</p><ul><li><p><strong>API Integration</strong>: Real-time monitoring and control of cloud applications with comprehensive visibility into 32,000+ applications</p></li><li><p><strong>Data Discovery</strong>: Automated identification and classification of sensitive data (PII, PHI, PCI)</p></li><li><p><strong>Policy Enforcement</strong>: Real-time blocking of unauthorized data sharing and access</p></li></ul><h3>ZTNA: Zero Trust Network Access</h3><p>ZTNA revolutionizes compliance by eliminating traditional network boundaries:</p><ul><li><p><strong>Continuous Verification</strong>: Every access request is evaluated against current security posture</p></li><li><p><strong>Application-Specific Access</strong>: Granular controls that exceed traditional VPN capabilities</p></li><li><p><strong>Audit Trails</strong>: Comprehensive logging for all compliance frameworks</p></li></ul><h3>DLP: Data Loss Prevention</h3><p>Integrated DLP provides comprehensive data protection:</p><ul><li><p><strong>Content Inspection</strong>: Real-time scanning of all network traffic for sensitive data</p></li><li><p><strong>Policy Enforcement</strong>: Automated blocking of unauthorized data transmission</p></li><li><p><strong>Compliance Reporting</strong>: Detailed reports for audit and compliance validation</p></li></ul><h2>Implementation Roadmap</h2><h3>Phase 1: Assessment and Planning (Weeks 1-4)</h3><ol><li><p><strong>Current State Analysis</strong></p><ul><li><p>Document the existing network architecture</p></li><li><p>Identify compliance gaps and requirements</p></li><li><p>Map current controls to framework requirements</p></li></ul></li><li><p><strong>Solution Design</strong></p><ul><li><p>Select appropriate SASE components based on compliance needs</p></li><li><p>Design a network segmentation strategy</p></li><li><p>Plan integration with existing systems</p></li></ul></li></ol><h3>Phase 2: Foundation Deployment (Weeks 5-12)</h3><ol><li><p><strong>Core Infrastructure</strong></p><ul><li><p>Deploy the SASE platform with basic security policies</p></li><li><p>Implement identity and access management integration</p></li><li><p>Establish monitoring and logging capabilities</p></li></ul></li><li><p><strong>Policy Configuration</strong></p><ul><li><p>Configure compliance-specific policies for each framework</p></li><li><p>Test access controls and data protection mechanisms</p></li><li><p>Validate audit trail generation and retention</p></li></ul></li></ol><h3>Phase 3: Advanced Features and Optimization (Weeks 13-16)</h3><ol><li><p><strong>Advanced Security</strong></p><ul><li><p>Enable threat detection and response automation</p></li><li><p>Implement advanced DLP and CASB policies</p></li><li><p>Configure incident response workflows</p></li></ul></li><li><p><strong>Compliance Validation</strong></p><ul><li><p>Conduct compliance testing and validation</p></li><li><p>Generate compliance reports and documentation</p></li><li><p>Prepare for external audits</p></li></ul></li></ol><h2>Avoiding Common Pitfalls</h2><h3>Implementation Mistakes</h3><ol><li><p><strong>Piecemeal Approach</strong>: Deploying security tools separately instead of an integrated platform</p></li><li><p><strong>Insufficient Testing</strong>: Not validating compliance controls before audit</p></li><li><p><strong>Documentation Gaps</strong>: Failing to document policies and procedures adequately</p></li></ol><h3>Operational Challenges</h3><ol><li><p><strong>Change Management</strong>: Not establishing proper change control processes</p></li><li><p><strong>Staff Training</strong>: Inadequate training on new systems and procedures</p></li><li><p><strong>Continuous Monitoring</strong>: Not implementing ongoing compliance monitoring</p></li></ol><h2>ROI and Business Impact</h2><h3>Quantifiable Benefits</h3><ul><li><p><strong>Audit Preparation Time</strong>: 50-70% reduction with automated compliance reporting</p></li><li><p><strong>Security Incident Response</strong>: 80% faster incident containment with automated workflows</p></li><li><p><strong>Compliance Costs</strong>: 20-30% reduction through integrated platform approach</p></li></ul><h3>Strategic Advantages</h3><ul><li><p><strong>Market Access</strong>: Ability to pursue contracts requiring specific certifications</p></li><li><p><strong>Customer Trust</strong>: Demonstrable security posture through third-party validation</p></li><li><p><strong>Operational Efficiency</strong>: Streamlined security operations through automation</p></li></ul><h2>Conclusion: Network Security as Business Enabler</h2><p>Modern network security technologies have evolved far beyond simple threat protection. Today's SASE and NGFW solutions serve as comprehensive compliance enablement platforms that directly address specific requirements across major frameworks.</p><p>The key insight for network security professionals is this: <strong>compliance is not a burden to be managed, but a competitive advantage to be leveraged</strong>. Organizations that understand the direct mapping between network security capabilities and compliance requirements can accelerate business growth while reducing risks.</p><p>At <a href="https://safemesh.ca">SafeMesh</a>, we've helped hundreds of organizations transform their approach to compliance through strategic network security investments. The result? Faster sales cycles, access to new markets, and measurable ROI within months of implementation.</p><p>The question isn't whether you can afford to invest in compliance-focused network security&#8212;it's whether you can afford not to.</p><div><hr></div><p><em>Ready to discover how <a href="https://safemesh.ca">SafeMesh</a> can enhance your compliance strategy? <a href="mailto:hi@safemesh.ca">Contact</a> our team for a comprehensive assessment of your current network security posture and compliance requirements.</em></p>]]></content:encoded></item><item><title><![CDATA[7 Ways SASE Transforms Security for Digital Consultancies: A Practical Guide]]></title><description><![CDATA[How modern digital consultancies are using Secure Access Service Edge to protect client data, enable remote work, and scale globally without compromise]]></description><link>https://blog.safemesh.ca/p/7-ways-sase-transforms-security-for</link><guid isPermaLink="false">https://blog.safemesh.ca/p/7-ways-sase-transforms-security-for</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Mon, 14 Jul 2025 21:13:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!JuU-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JuU-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JuU-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic 424w, https://substackcdn.com/image/fetch/$s_!JuU-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic 848w, https://substackcdn.com/image/fetch/$s_!JuU-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic 1272w, https://substackcdn.com/image/fetch/$s_!JuU-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JuU-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic" width="1280" height="763" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:763,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:148903,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.safemesh.ca/i/168334039?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JuU-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic 424w, https://substackcdn.com/image/fetch/$s_!JuU-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic 848w, https://substackcdn.com/image/fetch/$s_!JuU-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic 1272w, https://substackcdn.com/image/fetch/$s_!JuU-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3f1ee05b-a314-4a13-891e-c11be7f7a7ac_1280x763.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by Jules Clark: https://www.pexels.com/photo/compass-and-levers-on-dashboard-18681295/</figcaption></figure></div><p></p><p>Digital consultancies face a unique security challenge: <strong>protecting the sensitive data of multiple clients while enabling distributed teams to work from anywhere.</strong> Traditional security approaches&#8212;built for single companies with fixed offices&#8212;simply don't work when you're managing Pfizer's pharmaceutical data in London, a government project in Vancouver, and financial services clients in Hong Kong simultaneously.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.safemesh.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading SafeMesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Enter SASE (Secure Access Service Edge): a cloud-native security framework that fundamentally changes how consultancies protect their operations. Here are seven ways SASE addresses the real-world challenges digital consultancies face every day.</p><h2>1. Data Loss Prevention (DLP): Stop Client Data from Walking Out the Door</h2><p><strong>The Challenge</strong>: Your consultant in Toronto just downloaded a client's financial model to their personal laptop. Another team member accidentally uploaded proprietary code to their personal GitHub. A departing employee still has access to three clients' Salesforce instances.</p><p><strong>How SASE DLP Works</strong>:</p><ul><li><p><strong>Content-aware inspection</strong>: Automatically identifies and classifies sensitive data (PII, financial records, source code, API keys) regardless of where it's stored or how it's being transmitted</p></li><li><p><strong>Context-aware policies</strong>: Different rules for different scenarios&#8212;a senior architect might need to download source code, but a project manager shouldn't</p></li><li><p><strong>Real-time prevention</strong>: Blocks unauthorized transfers before they happen, not after</p></li></ul><p><strong>Real-World Example</strong>: A 400-person consultancy implemented SASE DLP and discovered that 23% of their client data was being accessed from personal devices. They prevented 147 potential data breaches in the first month alone.</p><p><strong>Quick Win</strong>: Begin by implementing DLP for your most sensitive clients, typically those in healthcare or financial services. Use these policy templates:</p><ul><li><p>Block personal email uploads of files containing "confidential" or client names</p></li><li><p>Prevent code files (.js, .py, .java) from being uploaded to non-approved repositories</p></li><li><p>Alert when database exports are downloaded to unmanaged devices</p></li></ul><h2>2. Zero Trust Network Access (ZTNA): Never Trust, Always Verify</h2><p><strong>The Challenge</strong>: Your developers need access to 15 different client environments. Traditional VPNs grant too much access once someone is "inside," and managing separate VPNs for each client is a nightmare.</p><p><strong>How SASE ZTNA Works</strong>:</p><ul><li><p><strong>Micro-segmentation</strong>: Users only access the specific resources they need, not entire networks</p></li><li><p><strong>Continuous verification</strong>: Every request is verified, not just at login</p></li><li><p><strong>Identity-based access</strong>: Permissions follow the user, not the device or location</p></li></ul><p><strong>Real-World Example</strong>: After implementing ZTNA, a consultancy reduced its attack surface by 78% and cut access provisioning time from 3 days to 30 minutes.</p><p><strong>Quick Win</strong>: Start with your highest-risk access scenario:</p><ol><li><p>A map which consultants access which client environments</p></li><li><p>Implement ZTNA for your most sensitive client first</p></li><li><p>Create role-based templates (Developer, PM, Designer) for faster onboarding</p></li></ol><h2>3. Cloud Access Security Broker (CASB): See and Control Your Shadow IT</h2><p><strong>The Challenge</strong>: Your team utilizes over 200 cloud applications, but IT is only aware of approximately 50. Consultants share files through personal Dropbox accounts, communicate via unauthorized Slack workspaces, and test code on their personal AWS accounts.</p><p><strong>How SASE CASB Works</strong>:</p><ul><li><p><strong>Discovery</strong>: Automatically identifies all cloud services being used</p></li><li><p><strong>Risk assessment</strong>: Rates each service's security posture</p></li><li><p><strong>Policy enforcement</strong>: Blocks high-risk services, monitors medium-risk, allows approved services</p></li></ul><p><strong>Real-World Example</strong>: A consultancy identified 127 previously unknown cloud services in use, including 31 file-sharing applications. They consolidated to 3 approved options, reducing their risk exposure by 84%.</p><p><strong>Quick Win</strong>: Run a 1-week discovery to identify your shadow IT:</p><ul><li><p>Install CASB monitoring on just 10% of devices</p></li><li><p>Review the discovered apps every morning</p></li><li><p>Create an "approved apps" list based on actual usage patterns</p></li></ul><h2>4. Secure Web Gateway (SWG): Your First Line of Defense</h2><p><strong>The Challenge</strong>: Consultants research on random websites, download tools from GitHub, and access client portals from coffee shops. One compromised download could infect multiple client environments.</p><p><strong>How SASE SWG Works</strong>:</p><ul><li><p><strong>URL filtering</strong>: Blocks known malicious sites and categories</p></li><li><p><strong>SSL inspection</strong>: Examines encrypted traffic for threats</p></li><li><p><strong>Malware scanning</strong>: Real-time scanning of all downloads</p></li><li><p><strong>Bandwidth optimization</strong>: Prioritizes business-critical applications</p></li></ul><p><strong>Real-World Example</strong>: A consultancy prevented 94% of malware infections after implementing SWG, and reduced non-work internet usage by 40%, improving productivity.</p><p><strong>Quick Win</strong>: Implement these policies immediately:</p><ul><li><p>Block newly registered domains (favorite for phishing)</p></li><li><p>Scan all executable downloads</p></li><li><p>Create exceptions for known development tools to avoid blocking legitimate work</p></li></ul><h2>5. Firewall as a Service (FWaaS): Protection That Moves with Your Team</h2><p><strong>The Challenge</strong>: Your consultants work from offices, homes, client sites, and coffee shops across 15 countries. Traditional firewalls protect offices, not people.</p><p><strong>How SASE FWaaS Works</strong>:</p><ul><li><p><strong>Cloud-delivered protection</strong>: Firewall capabilities follow users everywhere</p></li><li><p><strong>Unified policy</strong>: One set of rules applies globally</p></li><li><p><strong>Automatic scaling</strong>: Handles traffic spikes without hardware upgrades</p></li><li><p><strong>Geo-based policies</strong>: Different rules for different regions/compliance requirements</p></li></ul><p><strong>Real-World Example</strong>: A consultancy replaced 15 office firewalls with FWaaS, resulting in a 60% reduction in costs while enhancing security posture and user experience.</p><p><strong>Quick Win</strong>: Start with your remote workers:</p><ul><li><p>Deploy FWaaS to your fully remote team first</p></li><li><p>Monitor for 2 weeks to baseline "normal" behavior</p></li><li><p>Gradually tighten policies based on actual usage patterns</p></li></ul><h2>6. Remote Browser Isolation (RBI): Browse Safely, Work Confidently</h2><p><strong>The Challenge</strong>: Consultants need to research competitors, access client portals, and review unfamiliar websites. One compromised site could lead to credential theft or malware infection.</p><p><strong>How SASE RBI Works</strong>:</p><ul><li><p><strong>Isolated execution</strong>: Web content runs in a secure cloud container</p></li><li><p><strong>Pixel streaming</strong>: Only safe visual data reaches the user's device</p></li><li><p><strong>Seamless experience</strong>: Users browse normally while protected</p></li><li><p><strong>Selective isolation</strong>: High-risk sites are isolated, trusted sites have direct access</p></li></ul><p><strong>Real-World Example</strong>: After implementing RBI for high-risk browsing, a consultancy eliminated web-based infections entirely and reduced security alerts by 73%.</p><p><strong>Quick Win</strong>: Implement RBI for these scenarios first:</p><ul><li><p>Accessing new client portals for the first time</p></li><li><p>Researching on non-mainstream websites</p></li><li><p>Reviewing suspicious emails or links</p></li><li><p>Accessing personal webmail from work devices</p></li></ul><h2>7. SD-WAN Integration: Optimized, Secure Connectivity</h2><p><strong>The Challenge</strong>: Your London office is experiencing delays in accessing Vancouver servers. Hong Kong can't reliably connect to client systems in New York. VPN performance is killing productivity.</p><p><strong>How SASE SD-WAN Works</strong>:</p><ul><li><p><strong>Intelligent routing</strong>: Traffic takes the fastest, most reliable path</p></li><li><p><strong>Application prioritization</strong>: Client video calls get priority over software updates</p></li><li><p><strong>Built-in security</strong>: Encryption and security policies are built into the network fabric</p></li><li><p><strong>Cloud on-ramps</strong>: Direct, secure connections to AWS, Azure, Google Cloud</p></li></ul><p><strong>Real-World Example</strong>: A global consultancy reduced application latency by 67% and improved video call quality by 89% after implementing SD-WAN.</p><p><strong>Quick Win</strong>: Focus on your most significant pain point:</p><ul><li><p>Map your top 3 performance complaints</p></li><li><p>Implement SD-WAN between your two most problematic locations</p></li><li><p>Measure improvement and expand based on results</p></li></ul><h2>Implementation Roadmap for Digital Consultancies</h2><h3>Phase 1: Protect Your Crown Jewels (Weeks 1-4)</h3><ul><li><p>Implement DLP for your most sensitive client</p></li><li><p>Deploy ZTNA for high-risk access scenarios</p></li><li><p>Enable SWG for all remote workers</p></li></ul><h3>Phase 2: Gain Visibility (Weeks 5-8)</h3><ul><li><p>Deploy CASB to discover shadow IT</p></li><li><p>Implement FWaaS for remote workers</p></li><li><p>Start the RBI for high-risk browsing</p></li></ul><h3>Phase 3: Optimize and Scale (Weeks 9-12)</h3><ul><li><p>Roll out SD-WAN between offices</p></li><li><p>Expand policies based on learned behavior</p></li><li><p>Integrate all components for unified security</p></li></ul><h2>The SafeMesh Advantage for Digital Consultancies</h2><p>At SafeMesh, we understand that digital consultancies need security that's as agile as they are. Our SASE solutions are explicitly built for multi-client environments, with:</p><ul><li><p><strong>Client isolation</strong>: Automatic segregation of different clients' data and access</p></li><li><p><strong>Rapid deployment</strong>: Full SASE implementation in days, not months</p></li><li><p><strong>Consultancy-specific templates</strong>: Pre-built policies for common consultancy scenarios</p></li><li><p><strong>24/7 support</strong>: Because your consultants work around the clock, so do we</p></li></ul><h2>Ready to Transform Your Security?</h2><p>SASE isn't just another security tool&#8212;it's a fundamental shift in how digital consultancies protect their operations. By consolidating security functions into a cloud-native platform, you can:</p><ul><li><p>Reduce security costs by 40-60%</p></li><li><p>Improve user experience and productivity</p></li><li><p>Enable secure work from anywhere</p></li><li><p>Simplify compliance across multiple frameworks</p></li><li><p>Scale security as you grow</p></li></ul><p><strong>Next Steps</strong>:</p><ol><li><p>Assess your current security gaps using our free consultancy security assessment</p></li><li><p>Start with a pilot program for one client or team</p></li><li><p>Expand based on proven results</p></li></ol><div><hr></div><p><em><a href="https://safemesh.ca">SafeMesh</a> specializes in SASE implementations. With expertise in Palo Alto Prisma SASE, Netskope, Fortinet, and Cato Networks, we help companies protect client data while enabling business agility.</em></p><p><em>Contact us at <a href="mailto:hi@safemesh.ca">hi@SafeMesh.ca</a> or visit safemesh.ca to learn how SASE can transform your security posture.</em></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.safemesh.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading SafeMesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What the hell is SASE?]]></title><description><![CDATA[Cutting Through the Fog of Network Security Marketing]]></description><link>https://blog.safemesh.ca/p/what-the-hell-is-sase</link><guid isPermaLink="false">https://blog.safemesh.ca/p/what-the-hell-is-sase</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Sat, 22 Mar 2025 09:46:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!qcWk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qcWk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qcWk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qcWk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qcWk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qcWk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qcWk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:324602,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.safemesh.ca/i/159605578?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qcWk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!qcWk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!qcWk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!qcWk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7e80fdd3-d154-4d21-bb28-f627034ad86b_1280x853.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>You Google SASE, and you'll find millions of results. You check major SASE vendors' websites. You even ask your favorite GenAI; all you see is a bunch of flowery stuff without answering the question.</strong></p><h1>So, what exactly is SASE?</h1><p>SASE is a collection of, mainly, security products that you've been using for years on-prem in someone else's data center, aka cloud. They are all glued together as a single concoction called SASE!</p><p>SASE then connects to everything you have, like a <strong>central hub</strong>: remote users, branch offices, on-premises data centers, cloud providers (AWS, Azure, etc.), and SaaS applications (HubSpot, Salesforce, Zoom, Github, Gitlab, etc.) &#8211; giving you full visibility and control over your entire ecosystem</p><p>That's really it!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!m1jI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!m1jI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png 424w, https://substackcdn.com/image/fetch/$s_!m1jI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png 848w, https://substackcdn.com/image/fetch/$s_!m1jI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png 1272w, https://substackcdn.com/image/fetch/$s_!m1jI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!m1jI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png" width="2016" height="1424" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1424,&quot;width&quot;:2016,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:197237,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.safemesh.ca/i/159605578?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F44f73ca1-8275-4178-8062-9dedabd650dc_2016x1424.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!m1jI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png 424w, https://substackcdn.com/image/fetch/$s_!m1jI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png 848w, https://substackcdn.com/image/fetch/$s_!m1jI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png 1272w, https://substackcdn.com/image/fetch/$s_!m1jI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F822baec6-1a01-4a87-889c-e8e1678bf73a_2016x1424.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.safemesh.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading SafeMesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p>SASE components fall into three categories:</p><ul><li><p><strong>Security: </strong>Packed with essential and not-so-essential security products: Firewall as a Service (FaaW), Secure Web Gateway (a fancy name for explicit proxy), ZTNA (elaborated, usually-always-on VPN), Data Loss Prevention, and countless others.</p></li><li><p><strong>Network: </strong>SD-WAN is the central piece. SD-WAS allows you to abstract away the underlying WAN infrastructure&#8212;normally Internet and/or MPLS. SD-WAN has been evolving over the years.</p></li><li><p><strong>Digital Experience Monitoring:</strong> This allows you to monitor your network performance and troubleshoot network issues, especially the ones reported by your remote users.</p></li></ul><h2>Why SASE Actually Matters</h2><p>SASE solves real problems for distributed organizations:</p><ul><li><p>Simplifies security management across multiple locations and remote users</p></li><li><p>Reduces hardware footprint in branch offices</p></li><li><p>Centralizes policy enforcement regardless of where users connect from</p></li><li><p>Potentially lowers operational costs (though vendors won't advertise if it doesn't)</p></li></ul><h2>Implementation Considerations</h2><p>Before jumping on the SASE bandwagon, consider:</p><ul><li><p><strong>Existing security investments</strong> - what can you leverage versus replace?</p></li><li><p><strong>Vendor lock-in risks</strong> - many SASE solutions aren't designed for interoperability</p></li><li><p><strong>Compliance requirements </strong>- where is your data being processed?</p></li><li><p><strong>Performance needs</strong> - latency might become critical with cloud-delivered security</p></li></ul><h2>Common SASE Misconceptions</h2><p>Let's cut through the marketing jargon:</p><ul><li><p>SASE isn't new technology - it's repackaging with better integration</p></li><li><p>It won't magically fix poor security practices</p></li><li><p>You don't need every component to benefit</p></li><li><p>The "single pane of glass" promise often requires significant configuration</p></li></ul><h2>Getting Started with SASE</h2><ol><li><p>Audit your current security and networking tools</p></li><li><p>Identify your biggest pain points (remote access? branch connectivity?)</p></li><li><p>Start with core components that address those specific challenges</p></li><li><p>Demand proof-of-concepts before committing to full implementation</p></li><li><p>Plan for coexistence with existing infrastructure during the transition</p></li></ol><h2>Who Benefits Most from SASE?</h2><ul><li><p>Organizations with many remote workers and distributed offices</p></li><li><p>Companies rapidly migrating to cloud and SaaS applications</p></li><li><p>IT teams struggling with managing multiple security products</p></li><li><p>Businesses looking to reduce on-premises hardware footprint</p></li></ul><p></p><p>At <a href="https://safemesh.ca">SafeMesh</a>, we understand the challenges of implementing effective network security solutions in today's distributed environments. Our approach focuses on practical, no-nonsense security implementations that deliver real value rather than just following industry buzzwords.</p><p></p><p><a href="https://safemesh.ca">safemesh.ca</a></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.safemesh.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading SafeMesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Why Might Your VPN Provider Be More Dangerous Than Public WiFi?]]></title><description><![CDATA[Stop Trading One Risk for a Bigger One: Learn Why Modern HTTPS Makes Most VPN Marketing Obsolete, and How to Actually Protect Your Privacy]]></description><link>https://blog.safemesh.ca/p/why-might-your-vpn-provider-be-more</link><guid isPermaLink="false">https://blog.safemesh.ca/p/why-might-your-vpn-provider-be-more</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Wed, 05 Feb 2025 21:21:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Y49u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Y49u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Y49u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Y49u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Y49u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Y49u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Y49u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg" width="1456" height="973" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:973,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:114682,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Y49u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Y49u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Y49u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Y49u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c007b05-e0c6-47a0-9250-9058773e7446_1919x1283.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>The Fear Marketing Machine</h2><p>VPN companies launched massive marketing campaigns highlighting the dangers of public Wi-Fi, spending hundreds of millions on ads and influencer sponsorships. These campaigns paint a terrifying picture of hackers lurking in every coffee shop, ready to steal your data. Their message has been so compelling that using a VPN in public places has become common wisdom.</p><h2>What Your VPN Provider Can See</h2><p>Nobody tells you this: you only shift traffic from your computer to the VPN server. You basically hand over all traffic from your computer to the VPN server. Who owns and controls these servers? Even if your traffic is encrypted, they can capture your traffic metadata, such as:</p><ul><li><p><strong>Websites you visited</strong>, which can reveal your interests, work patterns, and daily routines</p></li><li><p><strong>Countries you're sending traffic to</strong>, potentially exposing your business relationships or personal connections</p></li><li><p><strong>Your location and movement patterns</strong></p></li><li><p><strong>Applications you're using,</strong> which can expose sensitive information about your work and personal life</p></li><li><p>They can also potentially <strong>hack</strong> into your computer because they now have a direct connection.</p></li></ul><p><strong>They can gather and sell this data to third parties, potentially exposing more about you than a public WiFi ever could.</strong></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.safemesh.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading PaloXperts! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Practical Solutions</h2><p>What should we do in a public place, then? Here are your options, from simplest to most advanced:</p><ul><li><p><strong>Use your mobile hotspot.</strong> It's safer than a random VPN server and requires no technical setup.</p></li><li><p><strong>Nothing!</strong> Most websites use HTTPS, and most of your data is already encrypted. Just pay attention to your Internet browser warning messages, and don't ever ignore them. Also, keep your computer up-to-date and install all security patches.</p></li><li><p>If you want to use VPN to improve your privacy</p><ul><li><p><strong>Spin up your own VPN server in the cloud,</strong> and you&#8217;ll have complete control over your traffic. It requires some technical knowledge and costs $5 - $50 per month. <em><a href="https://github.com/trailofbits/algo">Algo VPN</a></em> or a simple VPN server software can do the job.</p></li><li><p><strong>Use a trustworthy VPN provider</strong> that is transparent about their privacy policies and has a good tracking record. Also located in countries with severe privacy laws, like Switzerland and the Netherlands. <a href="https://protonvpn.com/?srsltid=AfmBOooyhYxSKQKAPa2kzVnn6RfKRbjBKeXb2HnyRa0k2j66riyJsWh4">ProtonVPN</a> is a good example. You can check their <a href="https://protonvpn.com/support/no-logs-vpn/">no-log policy</a> and <a href="https://protonvpn.com/blog/transparency-report/">law enforcement data requests policy</a>.</p></li></ul></li></ul><h2>Beyond Personal Security</h2><p>This information is helpful for individuals or companies with 1-6 people. Private or Public VPNs do not protect users against other Internet dangers, like visiting a high-risk website. For a more serious, professional solution, you can check out our <a href="https://blog.paloxperts.com/p/remote-first-smbs-own-your-firewall-as-a-service-with-palo-alto-networks-ngfw-globalprotect">post</a> about enterprise-grade security solutions like managed firewalls and SASE (Secure Access Service Edge) architectures.</p><p><strong>Stay safe!</strong></p><p><a href="https://www.paloxperts.com/">PaloXperts.com</a></p><p><a href="https://safemesh.ca">SafeMesh.ca</a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.safemesh.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading SafeMesh! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Remote-First SMBs — Own Your Firewall as a Service with Palo Alto Networks NGFW & GlobalProtect]]></title><description><![CDATA[Learn how to provide enterprise-grade security for your remote team using Palo Alto Networks' NGFW in the cloud. This solution is perfect for a growing SMB with 20-200 employees that needs more than a]]></description><link>https://blog.safemesh.ca/p/remote-first-smbs-own-your-firewall-as-a-service-with-palo-alto-networks-ngfw-globalprotect</link><guid isPermaLink="false">https://blog.safemesh.ca/p/remote-first-smbs-own-your-firewall-as-a-service-with-palo-alto-networks-ngfw-globalprotect</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Wed, 11 Dec 2024 06:51:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!YBt9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!YBt9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!YBt9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp 424w, https://substackcdn.com/image/fetch/$s_!YBt9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp 848w, https://substackcdn.com/image/fetch/$s_!YBt9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp 1272w, https://substackcdn.com/image/fetch/$s_!YBt9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!YBt9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:51886,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!YBt9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp 424w, https://substackcdn.com/image/fetch/$s_!YBt9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp 848w, https://substackcdn.com/image/fetch/$s_!YBt9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp 1272w, https://substackcdn.com/image/fetch/$s_!YBt9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F694afa35-b46b-48ca-8944-a515f9d91f35_1280x853.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>If you're running a remote-first SMB, you've probably wondered: "How can I protect my distributed team with enterprise-grade security without breaking the bank?" Let's discuss building your Firewall as a Service using Palo Alto Networks Next-Generation Firewall (NGFW) and GlobalProtect.</p><h2>Why does this matter?</h2><p>Many companies today aren't just using Next-Generation Firewalls to protect their servers. They're using them to shield their users from the bad stuff: phishing attacks, data leaks, and other cyber threats. Plus, server protection is less relevant than it used to be. Because everyone's moving to SaaS applications for almost everything - from Office365 and Google Workspace for email to HubSpot and SalesForce for marketing and sales.</p><p>&#8205;</p><p>Of course, you can buy a firewall to protect your users, but there are some real challenges to tackle. Let's break them down.</p><h2>Why Do Traditional Solutions Fall Short for Modern SMBs?</h2><h3>The Hardware Dilemma</h3><p>Physical NGFWs are more affordable than ever. Palo Alto Networks' PA-400 series firewall is bringing enterprise-grade security within reach of SMBs. However, many companies, even those with 50+ employees, don't have a physical office anymore, or their teams are spread across different locations, working remotely or in hybrid setups.</p><h3>The Enterprise-Only Club</h3><p>SASE, SSE, and Zero-Trust solutions sound great on paper, but there's a problem. While vendors like Palo Alto Networks, Fortinet, Netskope, and Zscaler compete to offer the shiniest and fanciest, they mainly target larger organizations (200+ employees). Most require minimum purchases of 200 licenses, and once you add the add-on features you need, the costs start piling up - the base products usually only cover the basics.</p><h3>The VPN Trap</h3><p>Traditional VPNs, whether free or paid, have some serious limitations. Despite all the marketing about protection, a VPN only does one thing: creates a secure tunnel between your device and its server/router. But that raises some important questions:</p><ul><li><p>Who's actually controlling these servers?</p></li><li><p>What happens to your traffic once it reaches them?</p></li><li><p>What about essential features like:</p><ul><li><p>Malware protection</p></li><li><p>Malicious domain/IP blocking</p></li><li><p>Data leak prevention</p></li><li><p>Geo-restriction capabilities</p></li><li><p>Client compliance checks</p></li><li><p>And the list goes on...</p></li></ul></li></ul><p>&#8205;</p><h2>The Practical Solution</h2><p>While it's possible to spin up Palo Alto Networks NGFWs in public cloud environments, creating a properly architected, auto-scaling security infrastructure requires deep expertise in both cloud architecture and enterprise security. Our solution leverages Infrastructure as Code (Terraform) to automate the deployment and management of your security infrastructure in the cloud, handling complex aspects like high availability, fault tolerance, and automatic scaling. Though it's not the absolute cheapest option out there, a properly implemented solution delivers exceptional value through reduced operational overhead and enterprise-grade security.</p><h3>Key Benefits:</h3><h4>Flexibility and Scalability</h4><ul><li><p>Start small and scale resources based on your actual needs</p></li><li><p>Easily adjust capacity as your team grows</p></li><li><p>Pay only for what you use</p></li></ul><h4>Global Footprint</h4><ul><li><p>Leverage the cloud provider worldwide infrastructure</p></li><li><p>Keep latency low and reliability high for remote workers</p></li><li><p>Deploy gateways closer to your team clusters</p></li></ul><h4>Enterprise-Grade Protection</h4><ul><li><p>Block malware and zero-day attacks before they reach your team</p></li><li><p>Filter out malicious URLs and bad IP addresses</p></li><li><p>Get advanced DNS security and anti-spyware protection</p></li><li><p>Typical example: One of our clients blocked over 200 malware attempts and 7,000 suspicious URLs in their first month alone</p></li></ul><h4>Secure Application Access</h4><ul><li><p>Create secure channels for accessing company SaaS applications</p></li><li><p>Monitor and control how apps are being used</p></li><li><p>Ensure compliance with security policies</p></li></ul><h4>Enhanced Data Control</h4><ul><li><p>Prevent sensitive data from leaving your network</p></li><li><p>Get detailed visibility into data movement</p></li><li><p>Set up smart rules for different types of data</p></li></ul><h4>Client Compliance</h4><ul><li><p>Make sure endpoints meet security requirements</p></li><li><p>Verify that anti-malware/anti-virus is up-to-date</p></li><li><p>Check disk encryption and patch status</p></li><li><p>Block risky connections to sensitive apps</p></li></ul><h4>Universal Compatibility</h4><ul><li><p>Works on Android, iOS, macOS, and Windows</p></li><li><p>No extra licensing fees for different platforms</p></li><li><p>Consistent experience across all devices</p></li></ul><h4>Intelligent Traffic Management</h4><ul><li><p>Use split-tunneling for allowed applications</p></li><li><p>Direct access to trusted domains like google.com</p></li><li><p>Optimize bandwidth for streaming services</p></li></ul><h4>Advanced Authentication Options</h4><ul><li><p>Integrate with your existing systems (e.g., Azure Entra ID)</p></li><li><p>Support for multi-factor authentication</p></li><li><p>Set up conditional access policies</p></li><li><p>Use certificate-based authentication</p></li></ul><h2>Components &amp; High-level Deployment</h2><p>Let's break down the key components:</p><h3>The GlobalProtect Portal (the brain)</h3><p>Think of this as your control center. It:</p><ul><li><p>Manages app distribution and configurations</p></li><li><p>Acts as the first point of contact for users</p></li><li><p>Provides information about available gateways (point-of-enforcement)</p></li><li><p>Handles client certificate distribution when needed</p></li></ul><h3>GlobalProtect Gateway(s) (the muscles)</h3><p>These are your security enforcers. They:</p><ul><li><p>Apply security policies</p></li><li><p>Provide VPN connectivity</p></li><li><p>Can be deployed as external gateways for remote access</p></li><li><p>Support both IPSec and SSL VPN tunneling</p></li></ul><h3>The GlobalProtect App</h3><p>This is the software that runs on your team's devices. It:</p><ul><li><p>Creates secure connections to your network</p></li><li><p>Works on Windows, macOS, Linux, iOS, and Android</p></li><li><p>Can be deployed through:</p><ul><li><p>Portal download</p></li><li><p>MDM systems</p></li><li><p>Public app stores</p></li></ul></li></ul><p>&#8205;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xKYt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xKYt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp 424w, https://substackcdn.com/image/fetch/$s_!xKYt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp 848w, https://substackcdn.com/image/fetch/$s_!xKYt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp 1272w, https://substackcdn.com/image/fetch/$s_!xKYt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xKYt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp" width="1456" height="782" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:782,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!xKYt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp 424w, https://substackcdn.com/image/fetch/$s_!xKYt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp 848w, https://substackcdn.com/image/fetch/$s_!xKYt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp 1272w, https://substackcdn.com/image/fetch/$s_!xKYt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F500861f6-7bc9-404a-be08-6262f586ea74_3758x2018.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">High-level Architecture</figcaption></figure></div><p>&#8205;</p><h2>Implementation Timeline</h2><p>A typical deployment follows this timeline:</p><ol><li><p>Week 1: Infrastructure setup and initial configuration</p></li><li><p>Week 2: Testing and pilot group deployment</p></li><li><p>Week 3-4: Gradual rollout to all users</p></li><li><p>Week 5+: Optimization and fine-tuning</p></li></ol><h2>Common FAQs</h2><p><strong>Q: What happens if our internet connection drops?</strong></p><p>A: GlobalProtect can automatically reconnect when internet access is restored, and you can configure backup gateways for redundancy.</p><p>&#8205;<strong>Q: What's the minimum size company this makes sense for?</strong></p><p>A: This solution is cost-effective for companies with 20+ users who need enterprise-grade security.</p><p><strong>Q: What if we get bigger than 200+? Is this investment goes down the drain?</strong></p><p>A: This solution is enterprise-grade and is scalable to tens of thousands of users. Plus, if you want to adopt Prisma SASE, it's almost seamless because you're using the same technology to connect &#8211; GlobalProtect.</p><p><strong>Q: How does this help with compliance?</strong></p><p>A: The solution supports various compliance requirements (GDPR, HIPAA, etc.) through features like DLP, encryption, and detailed logging.</p><p><strong>Q: Can we have physical firewalls as well?</strong></p><p>A: Absolutely, your physical firewall can be a part of this architecture as a portal or gateway.</p><p>&#8205;</p><p>&#8205;</p><h2>PaloXperts - Your Implementation Partner</h2><p>Our security architects at <a href="https://www.paloxperts.com">PaloXperts</a> can get you started quickly:</p><h3>Proof of Concept (PoC)</h3><ul><li><p>Setup within hours</p></li><li><p>Test with a subset of your endpoints</p></li><li><p>Get a comprehensive traffic analysis report</p></li><li><p>See real security threats blocked in your environment</p></li></ul><h3>Full Implementation</h3><p>We handle everything:</p><ul><li><p>Cloud configuration and IaC (Terraform)</p></li><li><p>Cloud security guardrails and budget</p></li><li><p>Portal and gateway configuration</p></li><li><p>Authentication setup</p></li><li><p>MDM integration/deployment</p></li><li><p>Security policy implementation</p></li><li><p>Advanced security features activation</p></li><li><p>Monitoring and reporting setup</p></li><li><p>Private PKI if necessary</p></li></ul><h3>Flexible Management Options</h3><ul><li><p>Start with full management by our team</p></li><li><p>Transition to self-management when ready</p></li><li><p>Get comprehensive documentation and training</p></li><li><p>Maintain complete control of your infrastructure</p></li></ul><p>&#8205;</p><p>Ready to secure your remote team with enterprise-grade protection? Let's talk about setting up a PoC and see the solution in action with your actual traffic. Contact us at <a href="mailto:info@paloxperts.com">info@PaloXperts.com</a></p><p>&#8205;</p>]]></content:encoded></item><item><title><![CDATA[What are Palo Alto Networks Software NGFW Credits & How Do They Work?]]></title><description><![CDATA[Palo Alto Networks Software credits give an easy, flexible way to buy a bucket/pool of credits and spend them however you want across different platforms (VM, CN, AI) and infrastructure.]]></description><link>https://blog.safemesh.ca/p/what-are-palo-alto-networks-software-ngfw-credits-how-do-they-work</link><guid isPermaLink="false">https://blog.safemesh.ca/p/what-are-palo-alto-networks-software-ngfw-credits-how-do-they-work</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Wed, 11 Dec 2024 06:39:14 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ezbF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ezbF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ezbF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp 424w, https://substackcdn.com/image/fetch/$s_!ezbF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp 848w, https://substackcdn.com/image/fetch/$s_!ezbF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp 1272w, https://substackcdn.com/image/fetch/$s_!ezbF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ezbF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp" width="1280" height="1920" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1920,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:192162,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ezbF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp 424w, https://substackcdn.com/image/fetch/$s_!ezbF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp 848w, https://substackcdn.com/image/fetch/$s_!ezbF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp 1272w, https://substackcdn.com/image/fetch/$s_!ezbF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F050d22ba-1d02-48e0-931a-54acb6b60b20_1280x1920.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>This guide explains Palo Alto Networks Strata NGFW (Next-Generation Firewall) Credits and how they work. Let's start with frequently asked questions about this flexible licensing system.</strong></p><h2>Frequently Asked Questions</h2><h3>What are NGFW Credits or Flex Credits?</h3><p>NGFW Credits are a flexible way to license Palo Alto Networks Software NGFW products. The Software NGFWs fall into three groups:</p><p><strong>VM-Series &#8211;</strong> You can spin them up on-prem using ESXi, Hyper-V, or KVM or in cloud spaces such as AWS, Azure, and GCP.</p><p><strong>CN-Series &#8211;</strong> There are container-based firewalls that can protect your Kubernetes nodes/hosts in a cluster.</p><p><strong>AI Runtime Security &#8211;</strong> is an AI firewall. It protects your Large Language Model (LLM) in the cloud.</p><p>You get credits in your credit bucket and can spend them on any of these Software Strata firewalls based on your needs.</p><h4>Common Use Cases</h4><p><strong>VM-Series:</strong></p><ul><li><p>Cloud-based VM security</p></li><li><p>Datacenter segmentation</p></li><li><p>Remote branch protection</p></li></ul><p><strong>CN-Series:</strong></p><ul><li><p>Kubernetes workload protection</p></li><li><p>Microservices security</p></li></ul><p><strong>AI Runtime Security:</strong></p><ul><li><p>LLM deployment protection</p></li><li><p>AI model security</p></li></ul><p>&#8205;</p><h3>How many credits do I need?</h3><p>Your credit requirements depend on several factors:</p><ul><li><p>Firewall type</p></li><li><p>vCPUs (horsepower)</p></li><li><p>Subscriptions (IPS, URL Filtering, DNS Security, etc.)</p></li><li><p>Management options (Panorama, Strata Cloud Manager, and Strata Logging Service)</p></li><li><p>Support options</p></li></ul><p>The best way to find out how many credits you need is to use the <a href="https://www.paloaltonetworks.ca/resources/tools/ngfw-credits-estimator">Software NGFW Credit Estimator</a>. This is a web-based tool that gives you an estimate.</p><p>&#8205;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6uFS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6uFS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp 424w, https://substackcdn.com/image/fetch/$s_!6uFS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp 848w, https://substackcdn.com/image/fetch/$s_!6uFS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp 1272w, https://substackcdn.com/image/fetch/$s_!6uFS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6uFS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp" width="1456" height="1522" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1522,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!6uFS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp 424w, https://substackcdn.com/image/fetch/$s_!6uFS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp 848w, https://substackcdn.com/image/fetch/$s_!6uFS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp 1272w, https://substackcdn.com/image/fetch/$s_!6uFS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7890d85-47f9-47d8-9588-45d548d140de_1464x1530.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>What is the minimum number of credits I should buy?</h3><p>No minimum requirement exists. Theoretically, you can buy one credit, but in reality, you cannot do anything with one credit.Typical starting deployments usually require 50 or more credits.</p><p>&#8205;</p><h3>How much do credits cost?</h3><p>It depends! &#8211; I know, I wish I had a better answer &#8211; Contact a Palo Alto Networks regional partner/account manager for a quote. If you are a business in Canada, you can contact us at <a href="mailto:sales@paloxperts.com">sales@PaloXperts.com</a> for a customized quote.</p><p>&#8205;</p><h3>Do these credits expire?</h3><p>Yes. Credits expire 12 or 36 months after purchase, regardless of usage. To avoid unused credits, it's essential to accurately estimate your needs.</p><p>&#8205;</p><h3>Do I get a volume-based discount?</h3><p>Yes. You qualify for credit discounts when your subscription credit spending equals or exceeds your firewall credit spending. For example, if you spend 30 credits on a firewall, you'll become eligible for discounts once your subscription credit spending reaches or exceeds 30 credits.</p><p>Depending on the deal size, you might also receive a discount from the resale partner.</p><p>&#8205;</p><h2>Step-by-Step Deployment Process</h2><h3>1. Evaluation (optional but recommended)</h3><p>Before purchasing credits, request a trial/evaluation credit to test the system. Contact us at <a href="mailto:sales@PaloXperts.com">sales@PaloXperts.com</a> for evaluation credits and setup assistance.</p><p>Typical evaluation period: 30 days</p><p>&#8205;</p><h3>2. Create a CSP account</h3><p>Create a <a href="https://support.paloaltonetworks.com/Support/Index">Palo Alto Networks support portal account</a> if you don't already have one. This account will be crucial for managing your credits and deployments.</p><p>Setup time: 5-15 minutes</p><p>&#8205;</p><h3>3. Purchase and Activation Email:</h3><p>After completing the purchase:</p><ul><li><p>You'll receive an activation email with an "Activate" button</p></li><li><p>Clicking it directs you to your support portal</p></li><li><p>Activate and allocate credits to your desired tenant account</p></li></ul><p>Processing time: 1-2 business days</p><p>See the screenshots below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!jxu7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!jxu7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp 424w, https://substackcdn.com/image/fetch/$s_!jxu7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp 848w, https://substackcdn.com/image/fetch/$s_!jxu7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp 1272w, https://substackcdn.com/image/fetch/$s_!jxu7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!jxu7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp" width="601" height="540" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9011575-3f6d-49c5-9e50-60027c483582_601x540.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:601,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Activation email image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Activation email image" title="Activation email image" srcset="https://substackcdn.com/image/fetch/$s_!jxu7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp 424w, https://substackcdn.com/image/fetch/$s_!jxu7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp 848w, https://substackcdn.com/image/fetch/$s_!jxu7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp 1272w, https://substackcdn.com/image/fetch/$s_!jxu7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9011575-3f6d-49c5-9e50-60027c483582_601x540.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Activation email</figcaption></figure></div><p>&#8205;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-Smy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-Smy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp 424w, https://substackcdn.com/image/fetch/$s_!-Smy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp 848w, https://substackcdn.com/image/fetch/$s_!-Smy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp 1272w, https://substackcdn.com/image/fetch/$s_!-Smy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-Smy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp" width="659" height="599" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:599,&quot;width&quot;:659,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Select credits to activate&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Select credits to activate" title="Select credits to activate" srcset="https://substackcdn.com/image/fetch/$s_!-Smy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp 424w, https://substackcdn.com/image/fetch/$s_!-Smy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp 848w, https://substackcdn.com/image/fetch/$s_!-Smy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp 1272w, https://substackcdn.com/image/fetch/$s_!-Smy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8bb37044-2ec0-4ac4-9fe9-c8f10c5cfa27_659x599.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Select credits to activate</figcaption></figure></div><p>&#8205;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rJ9X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rJ9X!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp 424w, https://substackcdn.com/image/fetch/$s_!rJ9X!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp 848w, https://substackcdn.com/image/fetch/$s_!rJ9X!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp 1272w, https://substackcdn.com/image/fetch/$s_!rJ9X!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rJ9X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp" width="991" height="755" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f30209f5-f874-4609-ad94-92141c98c397_991x755.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:755,&quot;width&quot;:991,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Select your account or tenant&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Select your account or tenant" title="Select your account or tenant" srcset="https://substackcdn.com/image/fetch/$s_!rJ9X!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp 424w, https://substackcdn.com/image/fetch/$s_!rJ9X!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp 848w, https://substackcdn.com/image/fetch/$s_!rJ9X!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp 1272w, https://substackcdn.com/image/fetch/$s_!rJ9X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff30209f5-f874-4609-ad94-92141c98c397_991x755.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Select your account/tenant</figcaption></figure></div><h3>4. Verification</h3><p>Verify your credits in the support portal. Credits end up in a pool (bucket) with a particular Pool ID.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5Rha!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5Rha!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp 424w, https://substackcdn.com/image/fetch/$s_!5Rha!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp 848w, https://substackcdn.com/image/fetch/$s_!5Rha!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp 1272w, https://substackcdn.com/image/fetch/$s_!5Rha!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5Rha!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp" width="1456" height="784" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/af00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:784,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Verify your credits&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Verify your credits" title="Verify your credits" srcset="https://substackcdn.com/image/fetch/$s_!5Rha!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp 424w, https://substackcdn.com/image/fetch/$s_!5Rha!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp 848w, https://substackcdn.com/image/fetch/$s_!5Rha!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp 1272w, https://substackcdn.com/image/fetch/$s_!5Rha!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf00917b-8e23-41ca-946d-c5b0fc89de85_1514x815.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Verify your credits</figcaption></figure></div><p>&#8205;</p><h3>5. Create Deployment Profiles</h3><p>Deployment profiles give you a way to subgroup group your software firewalls around certain characteristics such as:</p><ul><li><p>Firewall type</p></li><li><p>Number of instances</p></li><li><p>Feature sets for each firewall group</p></li></ul><p>Example profile structure:</p><ul><li><p>Profile name: "AWS/VM/Prod"</p></li><li><p>Purpose: VM firewalls in the AWS production environment</p></li><li><p>Features: URL Filtering, IPS, DNS security, Strata Cloud Manager</p></li></ul><p>Below, you can see a screenshot of two sample profiles:</p><p>&#8205;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VCym!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VCym!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp 424w, https://substackcdn.com/image/fetch/$s_!VCym!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp 848w, https://substackcdn.com/image/fetch/$s_!VCym!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp 1272w, https://substackcdn.com/image/fetch/$s_!VCym!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VCym!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp" width="1149" height="666" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:666,&quot;width&quot;:1149,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!VCym!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp 424w, https://substackcdn.com/image/fetch/$s_!VCym!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp 848w, https://substackcdn.com/image/fetch/$s_!VCym!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp 1272w, https://substackcdn.com/image/fetch/$s_!VCym!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b43cd21-4bd6-486b-b0c7-c73b24608b2f_1149x666.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>6. Register Your Firewalls</h3><p>Registration methods vary by firewall type and platform. Consult Palo Alto Networks documentation or contact us for any support.</p><p>Estimated basic setup: 2-4 hours</p><p>Below is an example of a successfully registered firewall on AWS.</p><p>&#8205;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Cy3y!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Cy3y!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp 424w, https://substackcdn.com/image/fetch/$s_!Cy3y!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp 848w, https://substackcdn.com/image/fetch/$s_!Cy3y!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp 1272w, https://substackcdn.com/image/fetch/$s_!Cy3y!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Cy3y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp" width="1456" height="466" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:466,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;The firewall inventory in CSP&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="The firewall inventory in CSP" title="The firewall inventory in CSP" srcset="https://substackcdn.com/image/fetch/$s_!Cy3y!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp 424w, https://substackcdn.com/image/fetch/$s_!Cy3y!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp 848w, https://substackcdn.com/image/fetch/$s_!Cy3y!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp 1272w, https://substackcdn.com/image/fetch/$s_!Cy3y!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2d9a6a94-c045-427c-be0a-887f0aca8f7e_1650x528.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The firewall inventory in the CSP</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P4xr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P4xr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp 424w, https://substackcdn.com/image/fetch/$s_!P4xr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp 848w, https://substackcdn.com/image/fetch/$s_!P4xr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp 1272w, https://substackcdn.com/image/fetch/$s_!P4xr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P4xr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp" width="1456" height="732" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:732,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Firewall successfully retrieved its licenses&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Firewall successfully retrieved its licenses" title="Firewall successfully retrieved its licenses" srcset="https://substackcdn.com/image/fetch/$s_!P4xr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp 424w, https://substackcdn.com/image/fetch/$s_!P4xr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp 848w, https://substackcdn.com/image/fetch/$s_!P4xr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp 1272w, https://substackcdn.com/image/fetch/$s_!P4xr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bf4c9f8-518d-4bd5-8852-74179caac0e9_5114x2572.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Firewall sucessfully retrived its licenses</figcaption></figure></div><h3>7. Optional: Panorama Licensing</h3><p>You can use credits to license Panorama and Panorama log collectors. Note that many organizations now prefer Strata Cloud Manager over Panorama, which only requires licensing on the firewall side.</p><p>&#8205;</p><h3>8. Credit Management</h3><p>To free up credits:</p><ol><li><p>Access your firewall management interface</p></li><li><p>Select the firewall(s) to deactivate</p></li><li><p>Follow the deactivation process</p></li><li><p>Verify credit release in your pool</p></li><li><p>Reassign freed credits as needed</p></li></ol><p>You can also transfer credits to another account/tenant</p><p>&#8205;</p><h2>Common Deployment Pitfalls to Avoid</h2><ul><li><p>Underestimating credit needs</p></li><li><p>Not accounting for credit expiration</p></li><li><p>Overlooking subscription requirements</p></li><li><p>Insufficient testing in evaluation phase</p></li></ul><p>&#8205;</p><h2>Next Steps</h2><ol><li><p>Assess your security requirements</p></li><li><p>Request an evaluation if needed</p></li><li><p>Calculate credit requirements</p></li><li><p>Contact a partner for pricing</p></li><li><p>Begin deployment planning</p></li></ol><p>&#8205;</p><h2>Post Summary</h2><p>Palo Alto Networks Software credits give an easy, flexible way to buy a bucket/pool of credits and spend them however you want across different platforms (VM, CN, AI) and infrastructure (on-prem, AWS, Azure, GCP)</p><p>&#8205;</p><h2>About us &#8211; PaloXperts</h2><p>As an official Palo Alto Networks partner, we provide PAN products and professional services in the US and Canada.</p><p>Please contact us at <a href="mailto:info@paloxperts.com">info@PaloXperts.com</a>.</p><p>&#8205;</p>]]></content:encoded></item><item><title><![CDATA[How Do I Choose the Right Strata Firewall for My Organization?]]></title><description><![CDATA[A practical guide to selecting the right Strata or actually any next-gen firewall for your organization, covering essential features, common pitfalls, and expert implementation tips from PaloXperts' s]]></description><link>https://blog.safemesh.ca/p/how-do-i-choose-the-right-strata-firewall-for-my-organization</link><guid isPermaLink="false">https://blog.safemesh.ca/p/how-do-i-choose-the-right-strata-firewall-for-my-organization</guid><dc:creator><![CDATA[Younos Nazarian]]></dc:creator><pubDate>Wed, 11 Dec 2024 05:27:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!PVr5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PVr5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PVr5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic 424w, https://substackcdn.com/image/fetch/$s_!PVr5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic 848w, https://substackcdn.com/image/fetch/$s_!PVr5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic 1272w, https://substackcdn.com/image/fetch/$s_!PVr5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PVr5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:113695,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PVr5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic 424w, https://substackcdn.com/image/fetch/$s_!PVr5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic 848w, https://substackcdn.com/image/fetch/$s_!PVr5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic 1272w, https://substackcdn.com/image/fetch/$s_!PVr5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7e9c57f-00e1-4dda-bc00-e58c7d80f880_1280x853.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>If you're reading this, you probably feel overwhelmed about selecting a next-generation firewall (NGFW). You're not alone &#8211; it's one of the most critical (and sometimes confusing) security decisions an organization can make. Let's break this down into something manageable!</strong></p><p>&#8205;</p><h2>First Things First: What Changed in Firewall Technology?</h2><p>Before we dive into the selection process, let's quickly review what's changed. Today's NGFWs aren't just about blocking ports and IP addresses anymore. Modern threats require modern solutions, and that's why next-gen firewalls now include:</p><ul><li><p>Machine learning capabilities to spot unknown threats</p></li><li><p>Cloud-delivered security services for rapid response</p></li><li><p>The ability to secure both traditional and cloud environments</p></li><li><p>Zero Trust capabilities built right in</p></li></ul><p>&#8205;</p><h2>The Big Questions You Need to Ask</h2><h3>1. What Are My Must-Have Capabilities?</h3><p>Start by looking at your specific needs. At a minimum, your NGFW should offer:</p><ul><li><p>Application awareness and control &#8211; not just port numbers.</p></li><li><p>Threat prevention capabilities &#8211; Anti-Virus, IPS, Anti-Spyware, etc.</p></li><li><p>URL filtering &#8211; You don't want your users to open risky URLs/Links.</p></li><li><p>SSL/TLS Decryption &#8211; Without it, you don't have visibility into traffic.</p></li><li><p>User-based/Device-based policy controls &#8211; You want to know who/what is sending the traffic.</p></li></ul><h3>2. How Will It Handle My Cloud Journey?</h3><p>This is crucial in today's world. Your NGFW should:</p><ul><li><p>Work seamlessly across on-premises and cloud environments.</p></li><li><p>Support major cloud providers (AWS, Azure, and Google Cloud).</p></li><li><p>Protect container-based applications. Microservices and containerization have become a norm.</p></li><li><p>Maintain consistent security policy and management everywhere.</p></li></ul><h3>3. Can It Grow With My Business?</h3><p>Look for:</p><ul><li><p>Flexible deployment options (hardware, virtual, container)</p></li><li><p>Scalable performance</p></li><li><p>Unified management and logging</p></li><li><p>Automation capabilities and extensive API</p></li></ul><p>&#8205;</p><h2>Common Pitfalls to Avoid</h2><p>Here's what I've seen trip up many organizations:</p><ol><li><p><strong>Focusing Only on Price:</strong> While budget matters, choosing solely on cost often leads to spending more in the long run on additional security tools.</p></li><li><p><strong>Ignoring Management Complexity:</strong> Some firewalls are powerful but so complex that you need dedicated staff just to manage them. Look for solutions that offer automation, extensive educational materials, and intuitive management.</p></li><li><p><strong>Ignoring Expert-level Professional Services:</strong> Gartner once said <em><strong>"Through 2023, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws."</strong></em> and our field experience confirms it. Your firewall, no matter how advanced it is, needs to be properly configured and continuously monitored. The box doesn't protect you. Basic up-and-running does NOT protect you.</p></li><li><p><strong>Forgetting About Support:</strong> Check the vendor's support reputation and availability.</p></li></ol><p>&#8205;</p><h2>A Step-by-Step Approach to Making Your Decision</h2><h3>1. Start With Assessment</h3><ul><li><p>Document your current security challenges</p></li><li><p>List your must-have features</p></li><li><p>consider your future needs (cloud migration, growth, IoT, etc.)</p></li></ul><h3>2. Evaluate Management Requirements</h3><ul><li><p>How many locations need protection?</p></li><li><p>What's your IT team's expertise level?</p></li><li><p>Do you need cloud-based management?</p></li><li><p>Is there any compliance program you need to be compliant with?</p></li></ul><h3>3. Consider Integration</h3><ul><li><p>What other security tools do you use?</p></li><li><p>Do you need API integration?</p></li><li><p>How will it fit into your existing network and security workflow?</p></li></ul><h3>4. Plan for Implementation</h3><ul><li><p>Consider your timeline</p></li><li><p>Think about training needs</p></li><li><p>Plan for any potential disruption during deployment</p></li></ul><p>&#8205;</p><h2>Pro Tips From the Field</h2><ol><li><p><strong>Run a Proof of Concept (PoC):</strong> Nothing beats testing in your own environment; it's low-cost and low-risk way to evaluate the firewall. At <a href="https://www.paloxperts.com/">PaloXperts</a>, we help our customers run a PoC with real products.</p></li><li><p><strong>Think About the Full Lifecycle:</strong> Consider not just deployment but also:</p><ul><li><p>Regular updates and patches</p></li><li><p>Policy management</p></li><li><p>Incident response capabilities</p></li><li><p>Future scaling needs</p></li></ul></li><li><p><strong>Don't rush the decision.</strong> Take the time to get it right &#8211; your organization's security depends on it.</p></li></ol><p>&#8205;</p><h2>The Bottom Line</h2><p>Choosing the right NGFW is a significant decision that impacts your entire organization's security posture. While it might seem overwhelming, you don't have to navigate this journey alone. As Palo Alto Networks experts, PaloXperts is here to help you make the right choice for your specific needs.</p><p>&#8205;</p><h2>What PaloXperts can offer?</h2><ul><li><p>Fast &amp; easy way to talk to an expert in person or virtually</p></li><li><p>Deep expertise and proven record in successful Strata Firewalls implementation</p></li><li><p>Comprehensive support in your region from evaluation to deployment</p></li><li><p>We are an official Palo Alto Networks partner, and have direct access to them.</p></li></ul><p>&#8205;</p><p><strong>Whenever you're ready to discuss next-gen firewalls, we are ready!</strong><em>&#8205;</em></p><p><em>Email us at <a href="mailto:info@paloxperts.com">info@paloxperts.com</a> or click "contact us" at the top-right corner of the screen. We'll get back to you within 24 hours, even on the weekends.</em></p><p><strong>Remember: </strong>Your organization's security is too important to leave to chance. Partner with Paloxperts to ensure you get the most out of your NGFW investment and build a robust security foundation for your business's future.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.safemesh.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading PaloXperts! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>