Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

SASE is the security trend of the decade

By Patrick Dunn
cloudnetwork
October 5, 2020

Security Access Service Edge (SASE) is the latest security trend to hit the world of cybersecurity for enterprises. But unlike meaningless buzzwords, SASE looks set to become an essential toolkit for any cybersecurity framework.

SASE moves away from data center-orientated security. Instead, it unifies your network and security tools into a single service delivered via the cloud and provides edge-to-edge protection for remote users and data centers.

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) released chapter 2 of their Cyber Essentials Toolkit. CISA's Cyber Essentials is a guide for businesses and government agencies. It educates them on critical fundamental foundations needed for a robust cybersecurity framework, such as how to implement organizational cybersecurity practices and essential tools required.

They specifically mention that for an organization to reduce its risk from online threats, they need to embrace a holistic approach.

The main drawback of this policy is that it relies on multiple point solutions; typically, point solutions only fix one specific problem. The result is a technology stack that grows and grows as more threats and situations arise, and more point solutions are added.

 

Merging multiple tools into one

Combining multiple solutions into one tool isn't a new concept. Look no further than Service as a Software (SaaS) apps such as Microsoft office 365, which allows users to access Word, Excel, Outlook with a single login, and seamlessly share information and data between other users and between files.

Google's suite of applications offers similar features, with Gmail, Google Drive, and their host of analytical apps. With one login credential, Google users can access their apps from any remote location and any device.

SASE uses the same model by converging Wide Area Networking (WAN) with essential cloud security tools such as Zero Trust, FWaaS, and CASB. Similar to the examples above, the entire SASE service is delivered via the cloud. This allows an organization's employees to access their cloud's data and applications from any device, no matter where they're located.

 

The need for consolidation, cloud and convergence

There is a dire need for this solution because administrating and consuming security is more complicated than ever.

The use of cloud within organizations is rapidly increasing. Sometimes, up to 90% of workloads are taking place in the cloud.

Plus, network security is no longer only confined to the organization's data center. Employees are also leaving the traditional physical perimeter network and working from remote locations.

It's estimated that 50% of the workforce will be mobile/remote by 2021 and that more than half of the apps used by an organization will be SaaS. We already see an increase in the usage of cloud-based apps and SaaS, which takes place entirely on the cloud.

One of the effects of all this, is that for many businesses, the edges of their network have expanded further than the confines of their office premises and their data center. Center-orientated security solutions cannot provide adequate protection as they once used to.

 

Security teams can't keep pace

While security teams and point solutions try their best to keep pace with today's dynamic needs, it creates a fragmented approach, increasing their overall complexity. Security stacks that contain multiple tools are prone to receiving an overload of alerts regarding potential threats and general notifications.

  • Nearly 88% of businesses use more than 25 different security tools and point solutions
  • Close to 80% admit it's becoming harder and harder to manage the deluge of alerts
  • Just under 70% claim that each incident requires 2-3 employees to handle

As you can see, it's challenging for an organization to secure their network. It takes a lot of resources, time, and human resources. If a security team finds themselves over-extended, the peril of a successful attack dramatically increases.

The best solution is one that does more than fills in missing gaps. One that's able to consolidate multiple security components under one umbrella that's delivered from a unified cloud-service.

Converging multiple point solutions together allows an organization much greater flexibility and security. Over 90% of organizations agreed that cloud-security provides greater efficiency and allows IT security to focus on other vital areas.

Cloud-security solutions are easily deployable and allow the organization to extend its network protection to remote workers and their multiple endpoint devices.

 

The bottom line

SASE is still a fresh term, coined by Gartner in 2019. It's still unknown by many IT security teams, and many of its vital components, such as Zero Trust, are still gaining traction in the cybersecurity industry.

But it's only a matter of time before SASE becomes more than just a buzzword. It stands to become the new industry standard as organizations are looking to merge and converge their security into a single cloud solution.

A handful of companies offer a true SASE solution for businesses, and they are still growing. Both through M&As and tech partnerships. Doing so enables them to add more tools to their overall security stack, which means organizations have even more defenses at their disposal.

As businesses are increasingly switching to the cloud, and the number of remote and mobile workers continues to rise, there's an excellent chance that SASE will become the new status quo.

Its flexibility and agility mean it offers tangible benefits to IT security teams in all industries.

KEYWORDS: cyber security data protection information security Software-as-a-Service

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Patrick dunn headshot

Patrick Dunn graduated from UCLA with a Computer Science, B.S. started his career as a Web Developer then moved into Cybersecurity research. When he is not working, Patrick likes to read and write articles about Cybersecurity, Web Development, Startups.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • network access freepik

    Why SASE is the key to unlocking widespread Zero Trust adoption

    See More
  • The Long and Winding Road to Cyber Recovery

    Security from the Start: Why Cyber Awareness is Critical at the Initial Stages of Business

    See More
  • cyber hack

    Europol takes down one of the most significant botnets in the past decade: EMOTET

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing