SASA Secure Networking

How SASE is Defining the Future of Secure Networking

As the digital transformation trend continues to highlight business agendas, now more than ever enterprises need infrastructure solutions that enable them to connect more locations at faster speeds – while keeping everything secure. As such, it’s no surprise that secure networking is one of the most critical areas of technology for organizations today. 

The COVID-19 pandemic has accelerated the industry need for not only secure networking, but also remote working. But prior to 2020, the market was already eyeing these requirements and vendors in the space were developing new services and solutions to address this growing demand. 

One of the most recent labels given to this trend is Secure Access Service Edge, known as SASE. SASE is not a new technology or product development – these solutions have been available for years – but an umbrella term coined by Gartner. Gartner predicts that at least 40 percent of enterprises will have strategies for adopting SASE by 2024 – up from just one percent at the end of 2018. 

With all this momentum, it’s important to understand what SASE is and why is it so important to the future of network security.

With SASE it’s all in the Integration

Remember, SASE refers to a collection of existing services that are integrated as a common set of functions and features. These services include wide area networking (WAN) and security solutions such as firewall-as-a-service (FWaaS) and Zero Trust that are integrated into a single service delivered through the cloud. This kind of integration often happens as technology develops and matures, and ultimately it provides users with more flexibility, accessibility and interoperability than services delivered separately do. This is the case for SASE. 

SASE creates easier management and reduces costs of multiple separate services when an organization has different networking security solutions that are integrated into one service. A single suite of security capabilities managed by a single unified solution can also deliver better threat detection and data protection. In addition, an integrated solution enables organizations to easily apply identity management and authentication policies across all their locations.

SASE can also help reduce latency and deliver significant improvements to connection speeds. With a single software stack, data no longer needs to pass through multiple devices, server stacks, virtual network functions (VNFs), and so on. When elements such as FWaaS and SD-WAN operate separately, it creates significant overlap and many steps are repeated, leading to latency, inefficiency and performance degradation. 

Cloud Delivers Benefits of SASE

Significant benefits of SASE are delivered from its cloud capabilities. An important example is the flexibility this enables, since enterprises can mix cloud and on-premises deployment to best address different needs.  

For example, an organization can deploy SASE capabilities with a heavy branch approach where applications are primarily run on-premises, or in a thin branch deployment where resources are delivered via a heavy cloud approach. In addition, SASE offers a hybrid approach that provides both thin and heavy branch delivery to separate locations with different needs. 

The Best Fits for SASE

SASE delivers important benefits to businesses in a wide variety of sectors due to its flexibility. However, organizations with a mixture of cloud and on-premises infrastructure with high security risk profiles have the most to gain.

For example, the banking sector provides a good use case for SASE. A large branch does much more than standard banking transactions, including business banking, mortgages, wealth management, brokerage services, and more. With all this traffic, a large branch requires robust security to protect all the sensitive client and financial data being transferred back and forth. This type of location is likely to deploy a heavy branch approach with most of the networking security elements on-premises, with some in the cloud. However, the same bank may also need to deploy multiple locations, such as smaller retail banking locations, with a thin branch approach. These locations offer fewer client services, with services almost entirely managed through cloud-based solutions.

In addition, the retail sector is another industry ripe for the benefits of SASE. Retailers are prime targets for cyber criminals since they collect and process large volumes of personal and financial data. Many retail brands also operate in multiple locations, which means the cost of any security solution is multiplied across a variety of areas. As a result, many retailers aim to reduce their footprint with a light branch approach that puts more of their networking security into the cloud. SASE enables retailers to consolidate multiple security solutions into a single software stack in the cloud and multiply it over many store areas to dramatically improve security and reduce costs. Because SASE can support both cloud and on-premises approaches in a single integrated service, it can handle the unique security needs of retailers.  

SASE During the COVID Crisis

While the SASE approach was already in the works to impact network security, the COVID crisis has certainly accelerated its growth. Many organizations were set up to support a small number of employees working remotely for a portion of the time, often using ineffective legacy VPNs. With the work-from-home (WFH) order, IT teams were not ready to rapidly transition into supporting a fully remote workforce to keep operations going. Average home IT security is usually weak, and hackers can target personal routers to compromise connected corporate devices. 

With SASE, organizations can deploy secure access to homes using a thin branch approach throughout the cloud, while simultaneously running a software stack on-premises for offices as needed. SASE is designed to be flexible and easily applied to any combination of laptops and mobile devices used by home workers. 

On the IT side, the WFH era has required an exorbitant number of man hours for IT departments to get employees and contractors set up with secure access. If you imagine that a single set-up may take around an hour, it’s easy to see that scaling to a global workforce of tens of thousands of employees is an insurmountable logistical challenge.

SASE, with multiple security solutions integrated into a single cloud-based service, can dramatically reduce the effort and time needed to get workers connected and secured. WFH employees can simply download from a client or app store to access security and software defined networking services. Based on identity, SASE instantly delivers secure, high performance and segmented access to individual employees. Since SASE is so scalable, it equips organizations for working environments in the coming months and years. Organizations can easily scale their deployments down and up, as workers return to the office or if new outbreaks occur and WFH is ordered.  

SASE and Cloud Driving Network Security

The rapid development and adoption of cloud over the past few years has been amazing. Humans and machines alike can access networking services from any device and any location in the world. This flexibility has been crucial to keeping economies and societies running during the COVID-19 crisis, and a trend put in practice by SASE. 

Even when COVID is finally behind us, the working world has been forever changed by challenges organizations had to overcome in 2020. Those businesses unprepared for the WFH shift have the opportunity to invest in long-term solutions to facilitate high quality, secure remote working. The flexibility and scalability of SASE is well suited to meet this need. SASE’s ability to deliver multiple integrated secure networking solutions through a single service has huge potential for banking, retail, and any other sector that must secure high-value data across multiple use cases and locations.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.