Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Viewpoint on edge security: What to know about SASE

By Derek Granath
Cyber security network
January 14, 2022

SASE, or the secure access service edge, is a term coined by analysts at Gartner in 2019 representing a framework that describes the necessary branch WAN edge network functions combined with cloud-delivered security services and all managed in the cloud. The proper integration of these network and security functions is now commonly referred to as SASE.

SASE has emerged as a key concept in edge security

Security leaders should view SASE favorably for its capabilities to better support Software as a Service (SaaS), cloud computing and colocation-based, or identity-centric computing. SASE enables security functionality to embed into a global network fabric and have it scale for users who may be anywhere. Instead of a complex and endless line of software agents on each endpoint, the SASE approach offers a new dimension to identity-based protection and policy enforcement throughout enterprises.

In addition to SASE, enterprises should have a complementary zero trust security framework, often referred to as role-based access control, that can identify users, devices and respective roles to ensure they can only reach destinations — data and applications — on the network that are consistent with their role in the business.

Does SASE replace SD-WAN? 

The simple answer is no. It is best not to think of this transformation as “SASE vs. SD-WAN” because SD-WAN is a key, foundational component of a SASE architecture. The important takeaway is that the SD-WAN must be able to support adaptive internet breakout. This means the SD-WAN must be able to identify the application on the very first data packet in order to steer it to its proper destination.

Once a session or flow has been initiated, it can’t be moved to an alternate path. For example, a business might define security and quality-of-service policies to direct Microsoft 365 traffic or IP-camera security data directly to the SaaS provider to minimize delay and provide the best quality of experience for users but then direct Box, Dropbox, Facebook and LinkedIn traffic first to a cloud-delivered security service before handing off to the SaaS provider.

The emerging SASE framework, enabled by an open versatile SD-WAN infrastructure for distributed branch office settings, can best be labeled as a natural conclusion for the industry’s myriad challenges. This approach works directly in concert with the revolution that the industry has seen in adopting the cloud and mobile applications over the last decade. Organizations no longer have static and predictable data, and thus the network of the past simply cannot support it. After all, security is paramount to any cloud-backed connection.

How does SASE fit in 2022?

The short answer is that SASE makes sense today because so much has changed about the network edge over the past decade. If we look back a dozen years or so, all enterprise applications were hosted in the data center. All users and devices — regardless of where they were located — connected back to the data center to access their respective business applications. An enterprise could build a proverbial moat around the data center to protect it. Users connected from branch locations over secure private line connections or from remote locations across a virtual private network (VPN). This model worked fine — but then came the cloud and its decentralized approach. The data center as we have known it is no longer the center of the universe for most enterprises today. Quickly, SaaS apps like Salesforce, Service Now, Dropbox and unified communications including Ring Central, Zoom, Microsoft 365 and many others have come to dominate the everyday workflow of global business.

The cloud also includes Infrastructure as a Service providers (IaaS) like Microsoft Azure, Amazon Web Services, Google Cloud and others. However, sending cloud traffic that is destined for the internet back to headquarters simply doesn’t make sense. It adds delay that degrades application performance, and it consumes costly leased-line bandwidth.

Malicious attacks on the network are multiplying: The edge has evolved

To further challenge IT teams, network traffic is far more distributed than in the past, as enterprise applications continue to migrate to the cloud instead of being hosted in the corporate data center. As a result, the number of workers accessing enterprise applications remotely continues to increase, and the number of IoT devices connecting to the network keeps growing.

This creates a rather complex scenario of connectivity needs that must be satisfied in a secure and well-managed fashion. Better answers are required. Necessary WAN edge functions include SD-WAN; routing to communicate with the world outside the WAN fabric; basic security functions such as a zone-based firewall and segmentation to protect the branch from any incoming threats; IDS/IPS; application and network visibility; and even WAN optimization.

Ideally, all these functions are unified in a single WAN edge platform that greatly simplifies branch WAN edge infrastructure. Gartner calls this a “thin” WAN edge. WAN edge functions are married with cloud-delivered security functions that include Firewall as a Service (FWaaS), a secure web gateway (SWG), cloud access security broker (CASB), zero trust network access (ZTNA), data loss prevention (DLP), sandboxing, antivirus, intrusion detection and prevention (IDPS) and more.

Protecting from edge to cloud with SASE

With the increase in remote workers connecting directly to cloud applications, traditional perimeter-based cybersecurity is insufficient. By transforming WAN and security architectures with SASE, enterprises can ensure direct and secure access to applications and services across multi-cloud environments, regardless of location or the devices used to access them. Cloud-delivered security services place security enforcement closer to the user where they are working instead of backhauling traffic to a headquarters or hub site for inspection. Furthermore, cloud security enforcement points are usually deployed in the same data centers where common SaaS apps are hosted. Application response time is significantly improved by connecting users to security and cloud-hosted application doorsteps closer to where they are working, improving quality of experience and business productivity. And keeping cloud security enforcement points up to date with the latest threat intelligence and remediation measures is also far easier than doing so with firewalls deployed at potentially hundreds or thousands of branch locations.

The real goal of the SASE architecture is to connect users more intelligently to their applications without compromising any security. Business benefits of SASE are many, including: 

  • Improved business productivity and customer satisfaction
  • Enhanced, consistent security policy enforcement across the enterprise
  • Reduced risk and brand image protection
  • Increased IT efficiency and lower overall WAN and security costs through centralized management
  • Ability to evaluate and easily adopt new security technologies as they emerge

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cloud computing services cloud security cyber attack cyber security initiatives secure access service edge (SASE) software as a service zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek Granath is Senior Director Product and Technical Marketing at Aruba, a Hewlett Packard Enterprise company.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cyber-security-shield-freepik

    Zero Trust vs. SASE - Here’s what you need to know

    See More
  • coronavirus

    What Law Enforcement and Security Personnel Need to Know about Coronavirus (COVID-19)

    See More
  • What You Need to Know about IT and IT Security

    See More

Related Products

See More Products
  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing