Professional Documents
Culture Documents
Detail Product SASE
Detail Product SASE
id
INTERNAL
What is SASE
INTERNAL
SD-WAN
Current
Solutions SWG FIREWALL/IPS
Vendor X= IT TEAM
Management
Sprawl
VPN CLIENT LAN/WAN
3
INTERNAL
SASE Solution Suite
Concerto
3rd Party
Router/SD-WAN
Single Pane of Management,
Monitoring and Visibility
HQ / DC
Security as a
Service
Local
SASE Fabric
Indonesia
POP
INTERNAL
Multiple International Acknowledgment
6
INTERNAL
CyberRatings.org
SD-WAN RATING ENTERPRISE FIREWALL
7
INTERNAL
SSE – Security Service Edge
Why ?
Versa Concerto or Titan
• Leverage Existing Network/Security Device
INTERNAL
Zero Trust
Zero Trust is a security framework requiring all users, whether in or outside the organization’s network, to be
authenticated, authorized, and continuously validated for security configuration and posture before being
granted or keeping access to applications and data. Zero Trust assumes that there is no traditional network
edge; networks can be local, in the cloud, or a combination or hybrid with resources anywhere as well as
workers in any location.
Zero trust is a strategic mindset based on core guiding
principles:
● “Never trust, always verify”
● Access based on identity and context (not location
on/off the network)
● Least privilege access by default
INTERNAL
Traditional VPN VS SASE
HQ
Enterprise Cloud Enterprise
Public Cloud
Network Data
Center
Perimeter firewall,
VPN Concentrator
Employee Versa
visiting
Malicious
Internet office Cloud
content
downloade Gateway
d from
Internet
SASE Client
Access
App on End-
from Home User device
Category ZTNA Traditional VPN Note
Endpoint Router , Laptop, Mobile Laptop
Network Performance Throughput, Delay, &
Monitor Yes No Packet Loss
Per Application and Per
Access Control Granular Limited Group
User Grouping Yes Yes
Client Failover and Load 1
Balance Automatic between DC-DR Manual INTERNAL
Features
INTERNAL
ZTNA
INTERNAL
SWG
INTERNAL
Presales
INTERNAL
Sizing Method
INTERNAL
Deployment Option A:
Single Site with Remote Worker
Private
Data
Center
IPSEC
Versa SASE
Remote Workers Remote Workers Remote Workers Remote Workers Remote Workers
INTERNAL
Deployment Option B:
Multi Sites – Remote User
Private Data
Center
Branch Branch
IPSEC
IPSEC IPSEC
Versa SASE
Remote Workers Remote Workers Remote Workers Remote Workers Remote Workers
INTERNAL
Deployment Option C:
Secure Access to Cloud SAAS
Versa SASE
Remote Workers Remote Workers Remote Workers Remote Workers Remote Workers
INTERNAL
Scope Of Work
INTERNAL
Scope Of Work
INTERNAL
Modify Add Change Delete
oSecurity Policy
oUser Profile
oZTNA User
oIP SEC/VPN Tunnel Profile
oReport
INTERNAL
SLA
INTERNAL
Service Level Agreement
Availability : 99,8%
INTERNAL
Dependency Services
INTERNAL
Dependency Services
INTERNAL
List SKU
INTERNAL
Business Scheme
Client : HYPERNET Client : Non INTERNET Client : PARTNER/SI Client :
INTERNET CLIENT CLIENT ITEM : PARTNER/SI/DISTRIBUTOR
ITEM : ITEM : SASE LICENSE ITEM :
SASE LICENSE SASE LICENSE non HYP BW SASE @ IDC BW SASE @ IDC
BW SASE @ IDC BW SASE @ IDC
INTERNAL
List SKU
BANDWIDTH ADD ON FOR SASE GATEWAY
HYP-SASE-BW-100M-1MNTH
HYP-SASE-BW-250M-1MNTH
HYP-SASE-BW-500M-1MNTH
HYP-SASE-BW-1G-1MNTH
HYP-SASE-BW-2G-1MNTH
HYP-SASE-BW-5G-1MNTH
INTERNAL
INTERNAL
Skema Demo
INTERNAL
Single Main DC – Remote User
Private Data
Center
Yang Di demokan :
Branch 192.168.89.100 • Dashboard
• Analytics
192.168.88.0/24 192.168.89.0/24 • Test Access
Mikrotik • Web Filtering Test (VSA)
Mikrotik
IPSEC • Malware Protection (Tentative)
IPSEC • Reporting sample
• Audit Log
Versa SASE
Remote Workers Remote Workers Remote Workers Remote Workers Remote Workers
INTERNAL
www.hypernet.co.id
INTERNAL