What is SASE?
What is SASE?
Secure access service edge, or SASE, is a cloud-based IT model that bundles software-defined networking with network security functions and delivers them from a single service provider. Gartner, a global research and advisory firm, coined the term "SASE" in 2019.
A SASE approach offers better control over and visibility into the users, traffic, and data accessing a corporate network — vital capabilities for modern, globally distributed organizations. Networks built with SASE are flexible and scalable, able to connect globally distributed employees and offices across any location and via any device.
What security capabilities does SASE include?
What security capabilities does SASE include?
Secure web gateways (SWG)
An SWG prevents cyber threats and data breaches by filtering unwanted content from web traffic, blocking unauthorized user behavior, and enforcing company security policies. SWGs can be deployed anywhere, making them ideal for securing remote workforces.
Cloud access security broker (CASB)
A CASB performs several security functions for cloud-hosted services, including revealing shadow IT (unauthorized corporate systems), securing confidential data through access control and data loss prevention (DLP), and ensuring compliance with data privacy regulations.
Zero trust network access (ZTNA)
ZTNA platforms lock down internal resources from public view and help defend against potential data breaches by requiring real-time verification of every user and device to every protected application.
Firewall-as-a-Service (FWaaS)
FWaaS refers to firewalls delivered from the cloud as a service. FWaaS protects cloud-based platforms, infrastructure, and applications from cyber attacks. Unlike traditional firewalls, FWaaS is not a physical appliance, but a set of security capabilities that includes URL filtering, intrusion prevention, and uniform policy management across all network traffic.
What are the advantages of a SASE framework?
What are the advantages of a SASE framework?
Identity-based Zero Trust network access.
Blocking attacks against network infrastructure.
Preventing malicious activity.
Streamlined implementation and management.
Simplified policy management.
Latency-optimized routing.
How does SASE compare to traditional networking?
How does SASE compare to traditional networking?
How organizations can implement SASE
How organizations can implement SASE
Many organizations take a piecemeal approach to SASE implementation. In fact, some may have already adopted certain SASE elements without knowing it. Key steps organizations can take towards fully adopting a SASE model include: