SSE, SASE, and Zero Trust : Mastering Security Beyond Borders with Next-Gen Edge Technologies (Networking Technology: Security)

個数:
  • 予約

SSE, SASE, and Zero Trust : Mastering Security Beyond Borders with Next-Gen Edge Technologies (Networking Technology: Security)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 368 p.
  • 言語 ENG
  • 商品コード 9780138344955

Full Description

SSE, SASE, and Zero Trust: Mastering Security Beyond Borders with Next-Gen Edge Technologies is the essential guide for securing the modern, cloud-connected enterprise. Covering the three most influential network security architectures of our time--Secure Services Edge (SSE), Secure Access Service Edge (SASE), and Zero Trust--this book demystifies how these technologies work, why they matter, and how to implement them effectively.

Whether you're modernizing a global enterprise, securing a remote workforce, or preparing for the next evolution of cybersecurity, this comprehensive resource delivers the clarity, strategy, and practical steps needed to build a resilient security foundation.

Written for IT leaders, cybersecurity professionals, network engineers, and students entering the field, SSE, SASE, and Zero Trust blends foundational knowledge with real-world design patterns, migration frameworks, and best practices. You'll learn how these solutions work individually--and how they combine to form a holistic, future-ready security architecture.

If you're looking for a single resource that ties together cloud security, network transformation, and Zero Trust principles, this is the guide you've been waiting for.

What You Will Learn



The core principles of SSE, SASE, and Zero Trust, explained in clear, practical terms
How these architectures work together to secure modern, cloud-first environments
Proven design patterns and deployment guidance for cloud-delivered security
Best practices for protecting hybrid workforces and distributed networks
How to evaluate vendors, plan migrations, and reduce legacy complexity
Strategies to prevent lateral movement and protect data everywhere
Practical examples, case studies, diagrams, and actionable, real-world guidance
How to future-proof your security strategy in a rapidly evolving threat landscape

Who This Book Is For

This book is written for:



Cybersecurity analysts, engineers, and architects
Network administrators and infrastructure teams
CISOs, IT directors, and technology decision-makers
Cloud and network architects designing modern environments
Consultants, integrators, and managed service providers
Students and professionals preparing for or advancing cybersecurity careers
Anyone responsible for securing cloud, remote, or hybrid networks

Whether you're a seasoned security professional or just beginning to explore modern security frameworks, this book will give you the knowledge and confidence to design scalable, effective, and resilient security solutions.

Why This Book Stands Out



A Complete View of Modern Security
Connects SSE, SASE, and Zero Trust into a single, cohesive framework—not siloed concepts.
Strategic and Hands-On
Balances executive-level guidance with practical, technical implementation details.
Holistic by Design
Integrates identity, networking, cloud security, and Zero Trust into one unified approach.
Built for What's Next
Addresses emerging threats and evolving architectures to help you stay ahead of change.

Contents

    Introduction xx

Chapter 1 The Evolving Landscape of Edge Technologies 1

    A History of Network Security 2

    The Proliferation of Remote Users and Application Placement Options 7

    Case Study: A Healthcare Provider's Shift to Cloud Security 9

    Self-Managed and SaaS Edge 10

    The Triad of Modern Edge Security Concepts: SSE, SASE, and Zero Trust 12

    Bringing It All Together: How SSE, SASE, and Zero Trust Work in Unison 15

    Summary 15

    References 16

Chapter 2 Secure Service Edge (SSE) Unveiled 17

    Core Capabilities of SSE 17

    Recommended and Optional Capabilities of SSE 30

    Methods to Connect and Secure Remote User Access Via SSE 31

    Methods to Connect and Secure Edge Access Via SSE (Owned Branch Location) 42

    Methods That Connect the Application Environment to SSE 45

    Use Cases: Bringing It All Together 51

    Summary 68

    References 68

Chapter 3 Secure Access Service Edge (SASE) Unveiled 71

    What Is SASE? 71

    Building Blocks of SASE 73

    SSE 74

    SD-WAN 74

    Site-to-Site Communications 85

    Middle Mile Overview 93

    Optional Capabilities of SASE 100

    Elements of SASE 104

    SASE Implementation Options 106

    Methods to Connect and Secure Edge Access Using SASE 109

    Methods to Connect the Application Environment Using SASE 113

    How to Integrate CoLo and Carrier Neutral Facilities 115

    Use Cases: Bringing It All Together 116

    Summary 125

    References 125

Chapter 4 The Essence of Zero Trust Network Security 127

    Introduction to Zero Trust 127

    Zero Trust Principles 131

    Critical Technologies for Implementing a Zero Trust Architecture 139

    Core Pillars of Zero Trust Architectures 148

    Zero Trust Frameworks and Maturity Models 151

    Zero Trust Strategy Example 161

    Summary 167

    References 168

Chapter 5 Integrating Zero Trust with SSE and SASE 171

    Strategies for Synergy 171

    Comprehensive Security Integration 175

    Bringing It All Together 179

    Lessons from Misalignment: The Risk of Silos 179

    From Fragmentation to Convergence 180

    Applying Zero Trust Principles Across the Network Diameter 181

    Case Studies of Successful Integration 184

    Summary 193

    References 193

Chapter 6 Evaluating and Selecting the Right Solution 195

    Assessing Organizational Requirements 195

    Outlining the Decision-Making Process 200

    Planning and Executing Implementation 213

    Sustaining the Zero Trust Program 225

    Summary 225

    References 226

Chapter 7 Managing and Maintaining the Edge Solutions 227

    Understanding Edge Deployment Options 227

    Determining Operational Structure 245

    SASE Troubleshooting 255

    Scalability and Growth Considerations 275

    Summary 279

    References 280

Chapter 8 Future Trends in SSE, SASE, and Zero Trust 283

    Emerging Technologies and Innovations 283

    Evolving Threat Landscape 302

    The Path Forward 305

    Summary 305

    References 306

Glossary 309

 

9780138344955, TOC, 2/4/2026

最近チェックした商品