Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

64% of businesses are adopting or plan to adopt SASE in the next year

cyber software freepik

<a href='https://www.freepik.com/photos/computer'>Computer photo created by pressfoto - www.freepik.com</a>

June 16, 2021

Global research commissioned by Versa Networks examining the adoption of Secure Access Service Edge (SASE) by businesses during the lockdown revealed that the adoption of SASE has skyrocketed during the pandemic. Thirty-four percent of businesses claim to already be adopting SASE in the past year, and an additional 30% plan to do so in the next six to 12 months. However, despite this rapid uptake of SASE, the majority (69%) of IT and security professionals surveyed remain confused about its true meaning.

The research, conducted by Sapio Research across 500 security and IT decision makers working at mid to large enterprises in the US, UK, France, and Germany, revealed that 84% of businesses have accelerated their digital transformation and move to the cloud during the pandemic, and almost half (44%) of businesses anticipate their employees will continue to work remotely, either fully or part-time, once pandemic restrictions are lifted. Published today, the global digital transformation survey “Experiences and Attitudes Towards a Post-COVID Workforce” is available from Versa Networks.

Lessons learned during the pandemic have contributed to the adoption of SASE, which promises the best of seamless security and high performing, reliable connectivity across cloud, hybrid and on-premises networks. The survey findings revealed that IT and Security teams have struggled to deal with multiple complaints from workers; more than a third (36%) of respondents’ end users complained of dropped connections when using bandwidth-hungry applications such as videoconferencing, and others suffered from the lack of real-time tech support (31%). Security issues have abounded, including the inability to enforce security policies across the remote workforce (37%), or to spot new threats facing users (34%), according to respondents.

Given this picture of fractured security policies and failing connectivity, companies are moving towards SASE to fix the problems, with nearly 9 out or 10 companies (87%) re-evaluating their remote connectivity policy over the past year. SASE has overtaken VPNs as the connectivity of preference, with 23% implementing VPNs versus 34% choosing SASE.

However, despite its popularity, SASE remains misunderstood by the majority of IT and security professionals. A mere 31% of respondents were able to correctly identify the definition of SASE as “the convergence of networking and security services like CASB, FWaaS and Zero Trust into a single cloud-native service model”. Despite this confusion, the top reason for adopting SASE is clear – to improve the security of devices and applications used by remote users, according to 43% of the survey respondents. This was closely followed by 31% stating the desire to prioritize the performance and delivery of business-critical applications in the cloud, and the need to support more remote workers (31%) as key reasons behind SASE adoption.

Other interesting findings include the following:

  • Nine out of ten businesses prioritize security ahead of visibility and control, bandwidth and connectivity or user experience, when adopting SASE
  • While security is the most compelling reason for adopting SASE, for three in five businesses the responsibility for deciding to implement SASE rests with the IT team versus executive staff, the c-suite, or the board of directors
  • The IT team ranks way ahead (49%) of any other department as the most likely to complain about unreliable connectivity
  • Video conferencing and collaboration apps have posed the greatest challenges in terms of consistent performance and reliability, according to 36% of respondents

For a copy of the global digital transformation survey “Experiences and Attitudes Towards a Post-COVID Workforce,” see: https://versa-networks.com/resources/ebooks/experiences-and-attitudes-towards-a-post-covid-workforce/.

KEYWORDS: cyber security information security remote workforce risk management secure access service edge (SASE)

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • TrendMicroCRI

    80% of global businesses expect a breach of customer records in the next year

    See More
  • USA network of light

    What are the DoD's top four priorities in the next year?

    See More
  • security-risk-freepik1170x658x586.jpg

    Three network security principles for businesses to adopt in 2022

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing