What is it?
Secure Access Service Edge or SASE is a relatively new concept. The goal is to connect users from anywhere to applications, data and services hosted in any place (Cloud, corporate data centers or Software-as-a-Service platforms). The basic idea is to simplify technology infrastructure by combining commonly-used network and security services in a single platform and deliver this service from the Cloud.
What would it take to implement a SASE strategy?
Many vendors have started creating their “SASE platform” that include technologies such as SD-WAN, Cloud based firewall, Zero Trust networking, Cloud Access Security Broker (CASB), Secure Web Gateways (SWG) and others. However, a SASE strategy goes beyond technology platforms and must include the following four components:
- SASE technology and platform that integrates individual SASE components and is delivered from Cloud.
- The underlying network transport (Dedicated internet, broadband, wireless, private network, etc.) that enables SASE.
- Managed network service combined with a SASE platform to provide a fully managed SASE service.
- Threat monitoring, detection, and response
Why should you care?
At this point, the SASE market is evolving and almost all vendors are struggling to build their “SASE story”. Businesses, who are consumers of these platforms, are also confused about their long-term strategy and which vendor to pick from an evolving “me-too” marketplace.
Which SASE providers are likely to succeed?
Businesses who rely on their technology partners for managed services will tend to look at network/telecom service providers (to acquire all four components of a SASE strategy as listed above). Businesses who manage their network and security internally are most likely to go with SASE vendors that focus on user experience and simplicity through a common management platform (single pane of glass) that provides integrated SASE management and monitoring options.
Latest Posts
- GenAI Risk Categories
- Ten Best Practices for Cybersecurity Risk Management
- Run LLM Models on Macbook – Part II
- Post-Quantum Cryptography Resources
- Run LLM Models on a Macbook