Skip to main content Skip to footer
CyberRatings
  • Research & Testing
    • Test Reports
      Browser Security
      Cloud Network Firewall
      Endpoint Protection
      Enterprise Firewall (formerly NGFW)
      Software-Defined Wide Area Network (SD-WAN)
      Security Service Edge (SSE) Threat Protection
      Zero Trust Network Access (ZTNA)
    • Mini TestsHow effective are the Cloud Service Provider (CSP) native cloud firewall offerings?What does "Secure by Default" mean for Security Service Edge solutions?
Our Ratings SystemResearch
  • Media
    • Blog
    • Press
    • Podcasts & Videos
  • Services
    • Test ToolsCyPerf Trial
  • NSS Labs Archive
0
Log inSign up
CyberRatings
Log inSign up
0
  • CyberRatings
  • Research & Testing
    • Browser Security
    • Cloud Network Firewall
    • Endpoint Protection
    • Enterprise Firewall (formerly NGFW)
    • Software-Defined Wide Area Network (SD-WAN)
    • Security Service Edge (SSE) Threat Protection
    • Zero Trust Network Access (ZTNA)
    • Mini Tests
    • How effective are the Cloud Service Provider (CSP) native cloud firewall offerings?
    • What does "Secure by Default" mean for Security Service Edge solutions?

    • Our Ratings System
    • Research
  • Media
    • Blog
    • Press
    • Podcasts & Videos
  • Services
    • Test ToolsCyPerf Trial
  • NSS Labs Archive
  • Log inSign up
  • CyberRatings
  • Research & Testing
    • Test Reports
    • Browser Security
    • Cloud Network Firewall
    • Endpoint Protection
    • Enterprise Firewall (formerly NGFW)
    • Software-Defined Wide Area Network (SD-WAN)
    • Security Service Edge (SSE) Threat Protection
    • Zero Trust Network Access (ZTNA)
    • Mini Tests
    • What does "Secure by Default" mean for Security Service Edge solutions?

    • Our Ratings System
    • Research
  • Media
    • Blog
    • Press
    • Podcasts & Videos
  • Services
  • NSS Labs Archive
  • Log inSign up

Read the press release on 2025 Cloud Network Firewall Test Results

Blog

« Back
« Back

SSE Implementation: Evasions and the Need for a Solid Defense

February 27, 2024CyberRatings.orgBlog

Continuing our deep dive into Security Service Edge (SSE), this blog post examines a critical aspect of SSE implementation: defending against layered evasions. These sophisticated tactics employed by cyber adversaries challenge the robustness of any security setup, including SSE’s advanced cloud-based protections.

Layered Evasions: A Multifaceted Threat

Layered evasions are complex attack strategies that combine multiple evasion techniques. They may span across various protocols and applications to obscure malicious activity, making detection and prevention significantly more challenging.

Evasion Techniques in Focus

  • HTTP Evasions: Attackers manipulate HTTP headers, utilize chunked encoding, or employ compression methods to bypass security measures. These tactics can alter how data appears during transmission, potentially slipping past initial security checks.
  • HTML, XML, JSON Evasions: These include employing different encoding methods, inserting misleading data formats, or using character encoding escape sequences to mask malicious intent within seemingly benign data structures.
  • Multipart/form-data Evasions: Malicious actors might use form-data ambiguities to obfuscate the true nature of uploaded data.
  • Portable Executable (PE) Evasions: By packing or archiving executable files, attackers can disguise malware in a format that evades detection by conventional security tools.

The SSE Defense Against Evasions

An SSE solution must be equipped to handle these types of evasions effectively:

  • Baseline Defenses: SSE should first establish a strong defense against known threats and evasion tactics.
  • Normalization and Analysis: The ability to normalize traffic—to decipher it into a standard format for analysis—is crucial. This allows the SSE to provide accurate alerts based on the true nature of the traffic, rather than just identifying anomalies.
  • Adaptive Learning: Utilizing machine learning algorithms helps SSE adapt to new threats over time, learning from each attempted evasion to improve defenses.
  • Shared Responsibility and Vendor Support: Recognizing that cybersecurity is a shared responsibility, organizations must collaborate closely with SSE providers to ensure constant vigilance and adaptive defense mechanisms.

Conclusion

Layered evasions represent a significant test of SSE’s adaptability and comprehensive protection. A robust SSE setup, backed by continuous learning and strong vendor support, is essential to thwart such advanced threats.

In our next posts, we’ll continue to explore the complexities of SSE and effective strategies to harness its full potential for a secure cyber environment. Stay tuned for more expert insights and practical tips.

Related content

Enterprise Firewall Comparative Test Results Show That Encryption and Evasions Matter

April 25, 2023
PRESS RELEASE

MEF and CyberRatings.org Partner on Groundbreaking SASE Certification Program

August 1, 2023
PRESS RELEASE

CyberRatings.org Announces “Spot Check” for Security Service Edge (SSE).

January 31, 2024
PRESS RELEASE

Zscaler Zero Trust Exchange Earns “AAA” Rating in CyberRatings.org Security Service Edge Threat Protection Test.

June 11, 2024
PRESS RELEASE

Security Service Edge (SSE) Threat Protection

Technology

Mini Test

October 2, 2024

The Hidden Danger of Evasions

March 19, 2025
BLOG

Sign up for our Newsletter

515 South Capital of Texas Highway
Suite 225
Austin, TX 78746

Phone: +1 (512) 333-1734

Fax: +1 (512) 727-2130

Contact Us

Research & Testing

  • Browser Security
  • Cloud Network Firewall
  • Endpoint Protection
  • Enterprise Firewall (formerly NGFW)
  • Software-Defined Wide Area Network (SD-WAN)
  • Security Service Edge (SSE) Threat Protection
  • Zero Trust Network Access (ZTNA)
Mini TestsHow effective are the Cloud Service Provider (CSP) native cloud firewall offerings?What does "Secure by Default" mean for Security Service Edge solutions?Our Ratings SystemResearch

Services

  • Test Tools
  • CyPerf Trial

Media

  • Blog
  • Press
  • Podcasts & Videos

About Us

  • Our Mission
  • Leadership

Research & Testing

  • Browser Security
  • Cloud Network Firewall
  • Endpoint Protection
  • Enterprise Firewall (formerly NGFW)
  • Software-Defined Wide Area Network (SD-WAN)
  • Security Service Edge (SSE) Threat Protection
  • Zero Trust Network Access (ZTNA)
Mini TestsHow effective are the Cloud Service Provider (CSP) native cloud firewall offerings?What does "Secure by Default" mean for Security Service Edge solutions?Our Ratings SystemResearch

Services

  • Test Tools
  • CyPerf Trial

Media

  • Blog
  • Press
  • Podcasts & Videos

About Us

  • Our Mission
  • Leadership

Copyright © 2022 - 2025 CyberRatings.org, All Rights Reserved. Use of this site governed by the Terms of Service

Privacy PolicyCopyright & Quote PolicyCookie Policy
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }