Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

What Is Secure Access Service Edge (SASE)?

Secure access service edge (SASE) is a network architecture that combines VPN and SD-WAN capabilities with cloud-native security functions such as secure web gateways, cloud access security brokers, firewalls, and zero-trust network access. These functions are delivered from the cloud and provided as a service by the SASE vendor.

What is driving adoption of SASE?

With the digital transformation of businesses, security is moving to the cloud. This is driving a need for converged services to reduce complexity, improve speed and agility, enable multicloud networking and secure the new SD-WAN-enabled architecture.

How can I benefit from a SASE model?

The SASE model consolidates numerous networking and security functions--traditionally delivered in siloed point solutions--in a single, integrated cloud service. By consolidating with SASE, enterprises can:

  • Reduce costs and complexity
  • Provide centralized orchestration and real-time application optimization
  • Help secure seamless access for users
  • Enable more secure remote and mobile access
  • Restrict access based on user, device, and application identity
  • Improve security by applying consistent policy
  • Increase network and security staff effectiveness with centralized management 

What are the challenges to realizing SASE?

Gartner considers SASE to be a vision of future secure networking model for enterprises to strive for. It is not currently a reality from any vendor. Today SASE is best represented by the convergence of cloud-managed SD-WAN and cloud-delivered security.

Moving to a SASE model will be a gradual process as IT rethinks how to connect a remote workforce to the distributed information resources they need. There will also likely be an increasing demand for "as-a-service" procurement models that offer more flexibility.

 

Components of the SASE model

SD-WAN

SD-WAN is a cloud-delivered, overlay WAN architecture that provides the building blocks for cloud transformation at enterprises. It helps ensure a predictable user experience for applications and provides a seamless multicloud architecture while integrating robust, best-in-class security.


Cloud security

Cloud security is a set of technologies and applications that are delivered from the cloud to defend against threats and enforce user, data, and application policies. It helps you better manage security by extending controls to devices, remote users, and distributed locations anywhere in minutes.


Zero trust network access 

Zero trust network access verifies users' identities and establishes device trust before granting them access to authorized applications. It helps organizations prevent unauthorized access, contain breaches, and limit an attacker's lateral movement on your network.