Secure Access Service Edge (SASE)

Secure Access Service Edge (SASE) is a buzzword created by Gartner to cover hardware and services responsible for ensuring and managing edge security, delivered largely via a cloud-delivered service model.

With enterprises across the world increasingly relying on the cloud, edge applications, and mobile devices for access to networks, SASE and similar edge security solutions have emerged to manage the more complex security challenges compared to securing more traditional on-premises data and applications.

What Exactly Is SASE?

Pronounced sassy, SASE offerings deliver comprehensive WAN capabilities with advanced network security functions like secure web gateways (SWG), firewalls-as-a-service (FWaaS), Cloud Access Security Brokers (CASB), and Zero Trust Network Access (ZTNA) to facilitate the dynamic secure access needs of edge security.

Secure Access Service Edge

SASE Image Source: Cato Networks

Gartner coined SASE in an August 2019 report titled The Future of Network Security in the Cloud and defined SASE as security technology offerings that include SD-WAN, SWG, CASB, ZTNA, and FWaaS as core abilities, with the ability to identify sensitive data or malware and the ability to decrypt content at line speed, with continuous monitoring of sessions for risk and trust levels.

Gartner forecasts that by 2024 more than 40% of enterprises will have defined strategies in place to adopt SASE. And while the market is a nascent one, security vendors like Cisco, Cato, VMware, Palo Alto Networks, VMware, Zscaler, and Perimeter 81 are quickly ramping up comprehensive SASE solutions to meet enterprise needs.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...