All articles
Secure Access Service Edge (SASE) explained
Web & Networking

Secure Access Service Edge (SASE) explained

Secure Access Service Edge (SASE) is a new network architecture model that aims to simplify and enhance security, performance, and…

By Luis SoaresApril 7, 2023Original on Medium

Secure Access Service Edge (SASE) is a new network architecture model that aims to simplify and enhance security, performance, and management in the era of cloud computing, remote work, and edge computing.

Coined by Gartner in 2019, SASE combines various networking and security functions into a single, unified cloud-native service.

This article will delve into the details of SASE, its components, benefits, and how it differs from traditional security models.

What is Secure Access Service Edge (SASE)?

SASE is an integrated approach to providing security and network services at the edge of an organization's network, as close to the users, devices, and applications as possible. It converges the functionality of multiple standalone products into a single, cloud-based platform.

SASE helps organizations adapt to the increasing need for remote work and secure access to cloud-based applications by delivering these services in a cloud-native, as-a-service model.

Components of SASE

SASE incorporates various networking and security functions, including:

a. Software-Defined Wide Area Networking (SD-WAN): SD-WAN technology is the foundation of SASE, enabling dynamic and optimized routing of network traffic, ensuring better application performance and reduced latency.

b. Secure Web Gateway (SWG): SWG provides URL filtering, content inspection, and malware detection to protect users from accessing malicious or unauthorized websites.

c. Cloud Access Security Broker (CASB): CASB offers visibility, control, and data security for cloud-based applications, preventing unauthorized access and data leakage.

d. Zero Trust Network Access (ZTNA): ZTNA ensures secure access to internal applications by verifying the identity of users and devices and granting access on a need-to-know basis.

e. Firewall-as-a-Service (FWaaS): FWaaS delivers traditional firewall capabilities, such as intrusion prevention, in a cloud-native, as-a-service model.

Practice what you learned

Reinforce this article with hands-on coding exercises and AI-powered feedback.

View all exercises

f. Data Loss Prevention (DLP): DLP prevents sensitive data from being leaked or stolen by monitoring, detecting, and blocking the transmission of sensitive information.

g. Advanced Threat Protection (ATP): ATP offers real-time detection and response capabilities for advanced threats, including targeted attacks, ransomware, and zero-day exploits.

Benefits of SASE

a. Simplified Management: SASE reduces the complexity of managing multiple networking and security products by integrating them into a single, unified platform.

b. Enhanced Security: SASE provides end-to-end security for all traffic, whether it originates from on-premises, remote users, or cloud applications, ensuring consistent security policies across the entire network.

c. Improved Performance: By delivering services at the network edge, SASE reduces latency and improves application performance for users, regardless of their location.

d. Scalability: SASE's cloud-native architecture allows organizations to quickly scale their network and security services as their needs grow.

e. Cost Savings: SASE eliminates the need for deploying and maintaining multiple, separate security appliances, reducing capital and operational expenses.

SASE vs Traditional Security Models

Traditional security models rely on perimeter-based defences, such as firewalls and VPNs, designed for a time when most applications and data reside within an organization's data centre.

However, with the rise of cloud computing, remote work, and edge computing, the traditional perimeter has become increasingly irrelevant.

SASE addresses these new challenges by adopting a cloud-native, as-a-service model that delivers networking and security services at the network's edge.

This approach ensures consistent security and optimal performance for users, regardless of their location or the applications they access.

Practice what you learned

Reinforce this article with hands-on coding exercises and AI-powered feedback.

View all exercises

Want to practice Rust hands-on?

Go beyond reading — solve interactive exercises with AI-powered code review on Rust Lab.