Chief Executive Officer & Chief Information Security Officer at a university with 11-50 employees
Real User
Top 20
2024-05-07T18:51:00Z
May 7, 2024
Lumen SASE is a global solution. It's a conglomeration of networks acquired over the years, and it can connect you to most locations globally. The next version of the solution would include enhancements that keep pace with the cybersecurity capabilities as they evolve and the network as it expands. It would improve everything, such as computing, networking, and cybersecurity. There's a Fortinet version of Lumen where they manage the Fortinet equipment that's in the network. If you do it yourself, you have to manage the Fortinet equipment. You can plug in a Fortinet and manage it all by yourself. However, that requires a certain amount of expertise, and that's where you get into the cost of the IT people. You don't have to configure the hardware yourself if you're using SASE. It's all optimized and put together in a schematic that the engineers have worked out. You don't have to try to learn for yourself for the first time because they've been doing it for a long time and have everything already worked out. I would recommend the solution to other users because it's the most complete, flexible, and best implementation of SASE out there. It's based on a leading hardware manufacturer that fits into the core of the Lumen network. It gives you a lot of flexibility that many other SASE providers don't provide because they're not using that level of equipment. A lot of AI has been built into Fortinet's cybersecurity services for a long time. AI is running in Fortinet and Lumen SASE. That's just evolving as a way to use the data for threat intelligence. AI can leverage what's known about cybersecurity vulnerabilities and extrapolate from that what a future vulnerability would look like. It can do so by matching up a certain percentage of characteristics of some type of malformed package. You can use AI to predict that type of malformation in a zero-day type of new malformed packet that evolves. You can predict that the new packet that has not been documented yet is probably bad. Overall, I rate the solution ten out of ten.
Find out what your peers are saying about Lumen Technologies, Cato Networks, Zscaler and others in Secure Access Service Edge (SASE). Updated: November 2024.
SASE is a new approach to network security that converges network and security capabilities into a single, cloud-delivered service. SASE provides a number of benefits over traditional network security solutions.
Lumen SASE is a global solution. It's a conglomeration of networks acquired over the years, and it can connect you to most locations globally. The next version of the solution would include enhancements that keep pace with the cybersecurity capabilities as they evolve and the network as it expands. It would improve everything, such as computing, networking, and cybersecurity. There's a Fortinet version of Lumen where they manage the Fortinet equipment that's in the network. If you do it yourself, you have to manage the Fortinet equipment. You can plug in a Fortinet and manage it all by yourself. However, that requires a certain amount of expertise, and that's where you get into the cost of the IT people. You don't have to configure the hardware yourself if you're using SASE. It's all optimized and put together in a schematic that the engineers have worked out. You don't have to try to learn for yourself for the first time because they've been doing it for a long time and have everything already worked out. I would recommend the solution to other users because it's the most complete, flexible, and best implementation of SASE out there. It's based on a leading hardware manufacturer that fits into the core of the Lumen network. It gives you a lot of flexibility that many other SASE providers don't provide because they're not using that level of equipment. A lot of AI has been built into Fortinet's cybersecurity services for a long time. AI is running in Fortinet and Lumen SASE. That's just evolving as a way to use the data for threat intelligence. AI can leverage what's known about cybersecurity vulnerabilities and extrapolate from that what a future vulnerability would look like. It can do so by matching up a certain percentage of characteristics of some type of malformed package. You can use AI to predict that type of malformation in a zero-day type of new malformed packet that evolves. You can predict that the new packet that has not been documented yet is probably bad. Overall, I rate the solution ten out of ten.