White Paper

Security for an upside-down network

How to use the Gartner concept Secure Access Service Edge (SASE) for secure cloud network migration.

The network upside down

Digitalization is pushing enterprises into a decentralized network architecture with the cloud as the new central hub for applications, services, and users. As more and more employees are using cloud apps, enterprises are facing a loss of observability, loss of control and therefore great security risks. To prevent this, they need to align their security postures management including cloud usage scenarios and architectural changes.

When companies move to the cloud, this doesn’t simply mean an expansion of the computing capacity of on-premises-setups in a flexible way. In fact, the whole process of deploying, developing and operating IT applications changes drastically.

New cybersecurity concepts are on the rise

Spike Reply consults on secure network transformation

This is where new key concepts such as the Gartner proclaimed Secure Access Service Edge (SASE) come into play. The concept shows how companies can move security services to the edge when transforming with the cloud. This grants the option to become flexible, scalable, and cost-efficient at the same time while avoiding classical on-prem bottlenecks and achieving a holistic security inspection capabilities.

Diving deep into the most important elements of cloud transformation and network security Spike Reply compares on-premises networks to cloud setups. In the end the experts give three clear points of advice on how to think security in a network determined by the cloud.


Spike Reply is the specialist for IT security within the Reply Group. Spike Reply specializes in secure IT and the protection of personal data. Spike Reply has created a comprehensive, integrated and consistent offering to identify, minimize and maximize all aspects of the risk associated with an information system. These range from the identification of threats and weak points to the planning, design and implementation of the corresponding technological, legal, organizational, underwriting and risk-limiting countermeasures.