SASE – Secure Access Service Edge

One of the hottest topics – and buzzwords – in the networking space today is “SASE,” or Secure Access Service Edge.

It is notable that the term SASE is given different definitions, depending on the SD-WAN solution vendors or security solution vendors. It is also characteristic that even industry analysts do not agree on a precise definition of SASE.

As a result of the above observations, there are many opinions, misunderstandings and questions about what the correct definition of SASE is. Here are some typical questions:

  • Is it a proposal to replace SD-WAN?
  • What are the network and security functions that make up a SASE architecture? Should I proceed with the implementation of SASE immediately and in full or can I do it gradually?
  • Will the proposed SASE solution be delivered by a vendor and why or why not?
  • Why do I still need a new network and security architecture?
  • What is SASE?

SASE or Secure Access Secure Edge, is a term first coined in Fall 2019 by Gartner in an article titled:

“The Future of Network Security is in the Cloud,”

To give a definition, we would say that it is a model, or a framework, or an architecture, that describes the necessary network functions, especially at the WAN edge, combined with security services provided by the cloud (Cloud-delivered security services). The common denominator is that all of these functions are offered and managed in the cloud.

It is obvious that none of the above constitute new technologies or capabilities. It is simply the integration of these network and security functions, for which the term SASE was given.

Specifically, the necessary functions at the WAN edge level include:

  • SD WAN
  • Routing, for the necessary communication of the WAN fabric with the outside world
  • Basic security functions in order to protect the branch from external threats, such as:
  • ZBFW (zone based firewall)
  • Advanced Segmentation
  • IDS / IPS
  • application and network visibility
  • WAN optimization

Ideally, all these functions are integrated and managed on a single platform (orchestrator), which significantly simplifies the management of the branch infrastructure.

These WAN edge functions are therefore combined with security functions provided by the Cloud and indicatively include:

  • FWaaS
  • SWG (secure web gateway)
  • Cloud Access Security Broker or CASBy
  • Zero Trust Network Access or ZTNA
  • Data Loss Prevention or DLP
  • Sandboxing,
  • Antivirus Intrusion detection and prevention

But why do we need SASE?

Why do we need a new security architecture?

The reason is that today, the DC is no longer the center of the universe for most businesses!

If we go back in time, going for example 10 years ago, all corporate applications were hosted on the DC.

All users, regardless of where they were, where they worked, needed to connect to the DC in order to access their business applications.

A business had to take all the necessary security measures around the DC to protect it.

Through an MPLS network and secure connections, users could connect to the central applications, either from within the organization’s branches, or remotely via secure VPN connections. This model worked well for many years.

But then came cloud applications (SaaS) such as:

  • Salesforce.com
  • ServiceNow
  • Drop Box
  • Unified Communications as a Service
  • Microsoft Office 365

Also, Infrastructure as a Service (IaaS) services began to be offered in the cloud by international providers such as:

  • Microsoft Azure
  • Amazon AWS
  • Google Cloud Platform and others

Therefore, the choice to send traffic with a final destination on the internet, through intermediate routing to the central DC of the company, was simply not logical and of course not efficient. Such routing resulted in the burden of traffic with greater delays, which cumulatively created on the one hand a dissatisfaction at the user level regarding the offered service and on the other hand consumed valuable bandwidth.

So what could be simpler than not using the internet to connect to applications hosted in the Cloud?

This thinking led us to rapidly adopt a smarter model based on SD-WAN technology.

But what about securing access for remote users who connect directly to cloud applications?

Traditional perimeter security is definitely not enough.

By transforming traditional WAN and Security architectures with the new SASE architecture, businesses can ensure immediate and secure access to applications and services in multi-Cloud environments, regardless of location or the devices used to access them.

Implementing and configuring security policy enforcement points directly in the cloud and constantly enriching them with the latest threat management tools is much easier than with firewall appliances deployed in hundreds or thousands of branch locations.

The response time of business applications is significantly improved by securely connecting users to cloud-hosted applications that are closer to where they work.

What are the Business Benefits?

The real goal of a SASE architecture is to connect users to their applications more intelligently without compromising security.

And the business benefits of SASE are many, including:

  • Improved business productivity and customer and user satisfaction
  • Improved, consistent enforcement of security policies across the enterprise
  • Reduced risk and protection of the corporate image from external malicious attempts
  • Increased IT efficiency and lower overall cost of operating the WAN and applied security through the ability to centrally manage
  • Ability to evaluate, adopt, and easily implement new, up-to-date security technologies
CBS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.