Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Viewpoint on edge security: What to know about SASE

By Derek Granath
Cyber security network
January 14, 2022

SASE, or the secure access service edge, is a term coined by analysts at Gartner in 2019 representing a framework that describes the necessary branch WAN edge network functions combined with cloud-delivered security services and all managed in the cloud. The proper integration of these network and security functions is now commonly referred to as SASE.

SASE has emerged as a key concept in edge security

Security leaders should view SASE favorably for its capabilities to better support Software as a Service (SaaS), cloud computing and colocation-based, or identity-centric computing. SASE enables security functionality to embed into a global network fabric and have it scale for users who may be anywhere. Instead of a complex and endless line of software agents on each endpoint, the SASE approach offers a new dimension to identity-based protection and policy enforcement throughout enterprises.

In addition to SASE, enterprises should have a complementary zero trust security framework, often referred to as role-based access control, that can identify users, devices and respective roles to ensure they can only reach destinations — data and applications — on the network that are consistent with their role in the business.

Does SASE replace SD-WAN? 

The simple answer is no. It is best not to think of this transformation as “SASE vs. SD-WAN” because SD-WAN is a key, foundational component of a SASE architecture. The important takeaway is that the SD-WAN must be able to support adaptive internet breakout. This means the SD-WAN must be able to identify the application on the very first data packet in order to steer it to its proper destination.

Once a session or flow has been initiated, it can’t be moved to an alternate path. For example, a business might define security and quality-of-service policies to direct Microsoft 365 traffic or IP-camera security data directly to the SaaS provider to minimize delay and provide the best quality of experience for users but then direct Box, Dropbox, Facebook and LinkedIn traffic first to a cloud-delivered security service before handing off to the SaaS provider.

The emerging SASE framework, enabled by an open versatile SD-WAN infrastructure for distributed branch office settings, can best be labeled as a natural conclusion for the industry’s myriad challenges. This approach works directly in concert with the revolution that the industry has seen in adopting the cloud and mobile applications over the last decade. Organizations no longer have static and predictable data, and thus the network of the past simply cannot support it. After all, security is paramount to any cloud-backed connection.

How does SASE fit in 2022?

The short answer is that SASE makes sense today because so much has changed about the network edge over the past decade. If we look back a dozen years or so, all enterprise applications were hosted in the data center. All users and devices — regardless of where they were located — connected back to the data center to access their respective business applications. An enterprise could build a proverbial moat around the data center to protect it. Users connected from branch locations over secure private line connections or from remote locations across a virtual private network (VPN). This model worked fine — but then came the cloud and its decentralized approach. The data center as we have known it is no longer the center of the universe for most enterprises today. Quickly, SaaS apps like Salesforce, Service Now, Dropbox and unified communications including Ring Central, Zoom, Microsoft 365 and many others have come to dominate the everyday workflow of global business.

The cloud also includes Infrastructure as a Service providers (IaaS) like Microsoft Azure, Amazon Web Services, Google Cloud and others. However, sending cloud traffic that is destined for the internet back to headquarters simply doesn’t make sense. It adds delay that degrades application performance, and it consumes costly leased-line bandwidth.

Malicious attacks on the network are multiplying: The edge has evolved

To further challenge IT teams, network traffic is far more distributed than in the past, as enterprise applications continue to migrate to the cloud instead of being hosted in the corporate data center. As a result, the number of workers accessing enterprise applications remotely continues to increase, and the number of IoT devices connecting to the network keeps growing.

This creates a rather complex scenario of connectivity needs that must be satisfied in a secure and well-managed fashion. Better answers are required. Necessary WAN edge functions include SD-WAN; routing to communicate with the world outside the WAN fabric; basic security functions such as a zone-based firewall and segmentation to protect the branch from any incoming threats; IDS/IPS; application and network visibility; and even WAN optimization.

Ideally, all these functions are unified in a single WAN edge platform that greatly simplifies branch WAN edge infrastructure. Gartner calls this a “thin” WAN edge. WAN edge functions are married with cloud-delivered security functions that include Firewall as a Service (FWaaS), a secure web gateway (SWG), cloud access security broker (CASB), zero trust network access (ZTNA), data loss prevention (DLP), sandboxing, antivirus, intrusion detection and prevention (IDPS) and more.

Protecting from edge to cloud with SASE

With the increase in remote workers connecting directly to cloud applications, traditional perimeter-based cybersecurity is insufficient. By transforming WAN and security architectures with SASE, enterprises can ensure direct and secure access to applications and services across multi-cloud environments, regardless of location or the devices used to access them. Cloud-delivered security services place security enforcement closer to the user where they are working instead of backhauling traffic to a headquarters or hub site for inspection. Furthermore, cloud security enforcement points are usually deployed in the same data centers where common SaaS apps are hosted. Application response time is significantly improved by connecting users to security and cloud-hosted application doorsteps closer to where they are working, improving quality of experience and business productivity. And keeping cloud security enforcement points up to date with the latest threat intelligence and remediation measures is also far easier than doing so with firewalls deployed at potentially hundreds or thousands of branch locations.

The real goal of the SASE architecture is to connect users more intelligently to their applications without compromising any security. Business benefits of SASE are many, including: 

  • Improved business productivity and customer satisfaction
  • Enhanced, consistent security policy enforcement across the enterprise
  • Reduced risk and brand image protection
  • Increased IT efficiency and lower overall WAN and security costs through centralized management
  • Ability to evaluate and easily adopt new security technologies as they emerge

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cloud computing services cloud security cyber attack cyber security initiatives secure access service edge (SASE) software as a service zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek Granath is Senior Director Product and Technical Marketing at Aruba, a Hewlett Packard Enterprise company.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Red laptop

Cybersecurity leaders discuss Oracle’s second recent hack

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-security-shield-freepik

    Zero Trust vs. SASE - Here’s what you need to know

    See More
  • coronavirus

    What Law Enforcement and Security Personnel Need to Know about Coronavirus (COVID-19)

    See More
  • Laptop with desktop screen showing

    What leaders need to know about generational privacy preferences

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing