Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Why SASE is the key to unlocking widespread Zero Trust adoption

By Amit Bareket
network access freepik

Background photo created by natanaelginting - www.freepik.com

May 28, 2021

Those who can recall the very earliest days of streaming in the mid-1990s might remember anxiously tapping a finger on their mouse while content buffered. Many with slower internet connections would spend more time watching the content download than actually watching the content.

Technology innovations, though, quickly led to increased commercialization investment in the internet, ushering in a new era of available bandwidth that infinitely improved access to audio and video by the early days of the 21st century.

Streaming - and really all content creators and consumers - would not have accelerated as it did without that much-needed bandwidth. In much the same way, we see the idea of Zero Trust Network Security, introduced more than a decade ago, needing its own boost for more widespread adoption. That help has arrived in the form of Secure Access Service Edge (SASE), the ideal framework for Zero Trust.

 

Why Zero Trust Matters

Since Zero Trust was coined in 2010, it has been proclaimed by the network security community as the ideal access model to adopt. Still, it’s only recently that businesses have started to implement Zero Trust for their network security frameworks. This advancement is largely due to the current rise of remote work, digital transformation, and cloud adoption.

Zero trust starts with the enforcement of device, system, and identity verification before granting access to the network -- preferably using an Identity Provider. This allows businesses to provide access to users based on their roles and the security status of their devices. It doesn’t give them wholesale access, but rather only to specified parts of the network such as relevant applications that they have been authorized to use for their daily tasks.

Alongside this “least privilege” principle, security teams must leverage micro-segmentation of network resources to defend their critical corporate resources in the case an unauthorized user exploits and infiltrates their network. Implementing Zero Trust can help businesses decrease the risks of multi-vector attacks while also reducing the ability of an attacker to move laterally once inside the network.

Despite Zero Trust’s advancement over the years, there have been challenges in presenting a larger framework in which to implement it. Companies can’t truly realize the benefits that Zero Trust has to offer if other parts of their network and security aren’t standardized. But now, there is a solution that is making this possible: Secure Access Service Edge.

With remote access and digitalization the issues of the day as our business environment continues to reset from the disruption caused by the coronavirus pandemic, SASE couldn’t have arrived at a better time for companies to benefit from its cloud-based network security model and Zero Trust’s user-centric approach.

 

Perfect Timing for SASE

When it comes to applying security controls across a corporate environment and implementing flexible policy features, the security space has always looked at integrations and partnering solutions as the quickest and most successful model. This is where SASE shows its value as the ideal framework for Zero Trust. 

SASE was coined by Gartner as a cloud-based network security model that combines multiple network technologies delivered as a service to support dynamic secure access to organizational assets. Companies value SASE for its inclusion of Zero Trust Network Access (ZTNA), which enables users to access internal resources while working away from the corporate office. Zero Trust within SASE’s framework can be a suitable fit for every business's network security no matter its industry, size, or specialty.

 

Zero Trust is the Mindset, SASE is the Backbone

Because Zero Trust is designed around data access controls and network visibility, it's easy to say that SASE is its perfect match. With every SASE platform, the major use case bound to emerge is multilayer encrypted network access from TCP/IP to HTTP, layer three to layer seven. SASE empowers IT and security teams to easily manage and maintain network visibility of user activity and access based on preset rules.

Remote work has driven more businesses to shift away from the site-centric model and toward a more user-centric model, where resources and applications are cloud-based and the location of the user cannot be assumed. This is why a new network security approach is needed. SASE is the approach that the entire security space has been waiting for, largely because it drives adoption of its most undersold bonus: Zero Trust access.

SASE gives businesses the power to easily manage and tweak their networking and security from one unified platform in the cloud, much like the rest of the service economy has moved cloudward. As businesses move toward SASE, the security and network space will see the value of this adoption in the reduced number of data breaches, and then finally Zero Trust will have its day.

KEYWORDS: cyber security network security risk management secure access service edge (SASE) zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Amit Bareket is CEO of Perimeter 81. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

American flag

ICE Acting Director Todd Lyons to Resign

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • laptop

    Making SASE and zero trust work for the enterprise

    See More
  • cyber-security-shield-freepik

    Zero Trust vs. SASE - Here’s what you need to know

    See More
  • cyber-frame

    If Michael Jordan is zero trust, then identity governance is Scottie Pippen — Why cybersecurity is a team sport

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The Complete Guide to Physical Security

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing