SASE: Secure Access Service Edge for Cloud-Delivered Security
SASE (Secure Access Service Edge) is a cloud architecture model that converges wide-area networking (SD-WAN) with security functions like ZTNA, SWG, CASB, and FWaaS into a unified cloud service. It delivers identity-driven secure access regardless of user location.
SASE: Secure Access Service Edge for Cloud-Delivered Security
SASE (Secure Access Service Edge) is a cloud architecture model introduced by Gartner that converges wide-area networking (WAN) and network security functions into a unified, cloud-delivered service. SASE combines SD-WAN (Software-Defined WAN) with security capabilities including Zero Trust Network Access (ZTNA), Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), and Firewall as a Service (FWaaS). The result is a single, globally distributed cloud platform that provides identity-driven, low-latency secure access for users, devices, and branches regardless of location.
To understand SASE properly, it helps to be familiar with zero trust security, cloud deployment models, and network security concepts.
┌─────────────────────────────────────────────────────────────────────────┐
│ SASE Architecture │
├─────────────────────────────────────────────────────────────────────────┤
│ │
│ Remote Users ──┐ │
│ Branch Offices ─┼──→ ┌─────────────────────────────────────────────┐ │
│ Cloud Services ─┘ │ SASE Cloud Platform │ │
│ │ ┌───────────────────────────────────────┐ │ │
│ │ │ Global PoP Network │ │ │
│ │ │ (Low-latency, everywhere) │ │ │
│ │ └───────────────────────────────────────┘ │ │
│ │ ┌───────────────────────────────────────┐ │ │
│ │ │ Networking Layer │ │ │
│ │ │ SD-WAN │ │ │
│ │ └───────────────────────────────────────┘ │ │
│ │ ┌───────────────────────────────────────┐ │ │
│ │ │ Security Layer │ │ │
│ │ │ ZTNA │ SWG │ CASB │ FWaaS │ DLP │ │ │
│ │ └───────────────────────────────────────┘ │ │
│ └─────────────────────────────────────────────┘ │
│ │ │
│ ▼ │
│ ┌─────────────────────────┐ │
│ │ Enterprise Apps │ │
│ │ (Cloud & On-Prem) │ │
│ └─────────────────────────┘ │
│ │
└─────────────────────────────────────────────────────────────────────────┘
What Is SASE?
SASE is a cloud-native architecture that delivers converged networking and security functions as a single service from a globally distributed cloud platform. Traditional models routed traffic from remote users back through corporate data centers for security inspection, creating latency and poor user experience. SASE moves security inspection to the cloud, inspecting traffic at the nearest cloud point of presence (PoP) before routing to its destination. SASE is identity-driven, using user and device identity, not just IP addresses, to enforce policies.
- Identity-Driven: Policies based on user identity, device posture, and context, not just network location.
- Cloud-Native: Built on cloud architecture with global points of presence for low-latency inspection.
- Converged: Networking (SD-WAN) and security (ZTNA, SWG, CASB, FWaaS) provided from single platform.
- Edge-Delivered: Security and networking functions executed at network edge closest to user.
- Globally Distributed: Hundreds of PoPs worldwide ensure consistent performance for any location.
- Zero Trust Ready: SASE natively implements zero trust principles by design.
Why SASE Matters
Traditional hub-and-spoke network models where all traffic backhauls through corporate data centers are breaking in the age of cloud and remote work.
- Cloud Migration: Applications moved from data centers to SaaS and cloud. Backhauling traffic from remote users through data center to access cloud apps creates unnecessary latency, known as tromboning or hairpinning.
- Remote Workforce: VPN concentrators cannot scale to millions of remote workers. Global workforce needs local performance everywhere.
- Complex Security Stacks: Separate appliances for firewall, web gateway, CASB, ZTNA create management overhead and inconsistent policies. SASE converges these functions into single platform.
- Poor User Experience: Traditional security inspection adds latency. SASE's distributed PoPs minimize latency by inspecting traffic locally.
- Shadow IT Risks: Users bypass security controls to access cloud apps. CASB integration in SASE provides visibility and control over unsanctioned cloud usage.
- Branch Complexity: Branch offices require SD-WAN, firewall, routing. SASE delivers all from cloud, simplifying branch infrastructure.
Traditional Hub-and-Spoke: SASE Cloud-Delivered:
User → VPN → DC Firewall → Cloud User → SASE PoP → Cloud
(Backhaul) (Direct)
Remote Office → MPLS → DC → Internet Remote Office → SASE PoP → Internet
Problems with Traditional: SASE Solutions:
- High latency (backhaul) - Low latency (edge inspection)
- Limited scalability (VPN concentrators) - Elastic cloud scaling
- Complex appliance management - Single cloud management
- Poor user experience - Optimized user experience
SASE Components
Networking Components
SD-WAN (Software-Defined WAN) is the networking foundation of SASE. It provides intelligent path selection, load balancing, and traffic steering across MPLS, broadband, LTE/5G. SD-WAN reduces branch complexity by replacing expensive MPLS with cheaper broadband.
Security Components
Component Full Name Primary Function
─────────────────────────────────────────────────────────────────────────────
ZTNA Zero Trust Network Access Application-level access,
replaces VPN
SWG Secure Web Gateway Web traffic inspection,
URL filtering, threat protection
CASB Cloud Access Security Broker Visibility and control over
SaaS/cloud apps
FWaaS Firewall as a Service Cloud firewall for network
traffic (L3-L4)
DLP Data Loss Prevention Prevent sensitive data exfiltration
DEM Digital Experience Monitoring User experience visibility,
performance optimization
Zero Trust Network Access (ZTNA)
ZTNA provides application-level access without network exposure. Users connect only to specific applications they need, not entire network. ZTNA replaces VPNs in SASE architecture. Features include identity-based access, device posture checking, and continuous verification. Covered in zero trust guide.
Secure Web Gateway (SWG)
SWG secures web traffic by filtering malicious URLs, enforcing acceptable use policies, and inspecting HTTPS traffic for threats. It blocks access to malicious sites, phishing domains, and non-compliant categories. SWG integrates with threat intelligence feeds.
Cloud Access Security Broker (CASB)
CASB provides visibility and control over cloud and SaaS application usage, detecting shadow IT and enforcing security policies. It monitors user activity in sanctioned and unsanctioned cloud apps. CASB protects data in cloud applications.
Firewall as a Service (FWaaS)
FWaaS delivers network firewall capabilities from the cloud, including stateful inspection, IP reputation filtering, and intrusion prevention. It replaces on-premise firewalls for distributed environments. Centralized policy management across all locations.
SASE Delivery Models
| Model | Description | Best For |
|---|---|---|
| Single Vendor SASE | Single vendor provides all components integrated natively | Simplified management, single support, consistent policy |
| Multi-Vendor SASE | Best-of-breed components orchestrated together | Specialized needs, existing vendor relationships |
| DIY SASE | Customer assembles cloud services and SD-WAN | Strong internal integration capabilities |
SASE vs Traditional Security Architectures
Aspect Traditional SASE
─────────────────────────────────────────────────────────────────────────────
Security Location On-premise appliances Cloud PoP
Inspection Point Data center backhaul Distributed edge
Remote Access VPN concentrator ZTNA
Branch Security Local firewall + DIA Cloud FWaaS + SWG
Web Security On-prem web proxy Cloud SWG
Cloud Apps Backhaul or direct CASB + direct
Policy Management Multiple consoles Single cloud console
Scalability Hardware limited Elastic cloud
Latency High (tromboning) Low (edge inspection)
Benefits of SASE
- Improved Performance: Traffic inspected at nearest PoP instead of backhauling to data center. Reduced latency for remote users accessing cloud apps. Optimized routes via SD-WAN.
- Better Security: Consistent policies everywhere regardless of user location. Zero trust access replacing broad VPN access. Uniform inspection for all traffic (web, cloud, private apps).
- Operational Simplicity: Single management console for networking and security. Unified policy engine across all functions. Reduced appliance sprawl in branches and data centers.
- Elastic Scalability: Global PoP network automatically scales with demand. No capacity planning for VPN concentrators or firewalls. Pay-as-you-go consumption model.
- Better User Experience: Faster access to cloud and SaaS apps. No clunky VPN client with full tunnel. Consistent experience from any location or device.
- Cost Efficiency: Reduce or eliminate MPLS with broadband + SD-WAN. Consolidate multiple security appliances into single subscription. Lower operational overhead for managing distributed infrastructure.
SASE Anti-Patterns
- VPN as ZTNA in SASE: Using VPN instead of ZTNA in SASE still grants broad network access. SASE requires application-level access (ZTNA), not network-level tunnels.
- Point Products Called SASE: Single security function (SWG or CASB alone) not SASE. True SASE requires converged networking and security from same cloud platform.
- On-Premise SASE: SASE is cloud-delivered by definition. Running on-premise appliances is not SASE, regardless of marketing claims.
- No Identity Integration: SASE is identity-driven. Without strong identity (MFA, passkeys, SSO), cannot enforce zero trust policies.
- Ignoring SD-WAN: SASE requires networking component. Security without SD-WAN convergence is just cloud security, not SASE.
Phase 1: Assess & Plan (Months 1-3)
- Inventory users, devices, applications, branches
- Identify traffic patterns and latency pain points
- Evaluate SASE vendors (single vs multi-vendor)
- Define migration strategy
Phase 2: Pilot & Verify (Months 3-6)
- Deploy SASE for IT department or pilot group
- Migrate specific app or remote user group
- Test performance and security effectiveness
- Develop operational procedures
Phase 3: Expand & Migrate (Months 6-12)
- Expand to all remote users
- Migrate branches from MPLS + appliances to SD-WAN + SASE
- Replace VPN with ZTNA
- Decommission legacy appliances
Phase 4: Optimize & Automate (Months 12+)
- Full convergence of networking/security
- Automated policy enforcement
- Continuous monitoring and optimization
SASE Providers and Vendors
| Vendor | Type | Key Strengths |
|---|---|---|
| Zscaler | Security-first SASE | Strong ZTNA, SWG, CASB, largest PoP network |
| Cato Networks | Single-vendor SASE | Converged networking + security from day one |
| Netskope | Security-first SASE | Strong CASB, data protection, DLP |
| Cloudflare | Network-first SASE | Global anycast network, developer-friendly |
| VMware (Aviator) | SD-WAN plus security | Strong SD-WAN, multi-cloud networking |
| Entra ID integration | Identity-centric, Microsoft ecosystem |
SASE Best Practices
- Start with Identity: Strong identity foundation (MFA, SSO, passwordless). Integrate identity provider with SASE platform. Implement device posture checking.
- Phased Migration: Start with remote users and cloud apps, then branches, then data centers. Migrate one user group or app at a time, not big bang.
- Embrace Zero Trust: Replace VPN with ZTNA, not just move VPN to cloud. Enforce least privilege access. Continuously verify, not just once at login.
- Simplify Branch Networking: Replace MPLS with broadband + SD-WAN where possible. Use cloud FWaaS instead of local firewalls. Centralized branch management.
- Unified Policy Management: Use single policy engine across all SASE functions. Avoid siloed policies for ZTNA, SWG, CASB, FWaaS.
- Monitor User Experience: Track user experience metrics (latency, throughput, errors). Use Digital Experience Monitoring (DEM) tools. Alert on performance degradation.
- Train Operations Teams: SASE convergence requires both networking and security skills. Cross-train teams on SD-WAN and security functions. Update incident response for cloud-delivered model.
- Plan for Multi-Cloud: SASE should secure access to multiple clouds (AWS, Azure, GCP) and on-prem. Ensure consistent policies across all environments.
Level 1: Legacy
- On-premise firewalls and proxies
- VPN for remote access
- MPLS for branches
- Separate management consoles
Level 2: Partial Adoption
- Some security functions in cloud (SWG, CASB)
- VPN still used for remote access
- Basic SD-WAN in branches
- Partial integration
Level 3: SASE Infrastructure
- ZTNA replacing VPN
- Full SD-WAN deployment
- Cloud firewall (FWaaS)
- Converged management portal
Level 4: Optimized SASE
- Full convergence (networking + security)
- Identity-driven policies everywhere
- Automated orchestration
- Continuous monitoring and optimization
SASE vs SSE vs ZTNA
| Term | Definition | Includes |
|---|---|---|
| SASE (Secure Access Service Edge) | Converged networking + security | SD-WAN + ZTNA + SWG + CASB + FWaaS |
| SSE (Security Service Edge) | Security part of SASE only | ZTNA + SWG + CASB + FWaaS (no SD-WAN) | ZTNA (Zero Trust Network Access) | Application-level access only | Application access without network exposure |
Frequently Asked Questions
- What is the difference between SASE and zero trust?
Zero trust is a security model requiring continuous verification. SASE is an architecture that delivers zero trust capabilities through converged cloud services. SASE is one way to implement zero trust at scale. Zero trust can be implemented without SASE, but SASE makes zero trust easier for distributed environments. - Is SASE only for large enterprises?
No. Small and medium businesses benefit from SASE by reducing appliance footprint, simplifying management, and accessing enterprise-grade security without on-premise hardware. Many SASE vendors offer consumption-based pricing appropriate for smaller deployments. - Do I need to replace my existing firewalls?
Not immediately. Most organizations adopt SASE gradually. Start with remote users and branches where backhaul is problematic. Retain on-premise firewalls for data center during transition. Migrate when SASE maturity increases. - What is the difference between SASE and SSE?
SSE is security service edge: the security components of SASE (ZTNA, SWG, CASB, FWaaS) without SD-WAN. SASE includes both networking (SD-WAN) and security. Choose SSE if you only need cloud security, not SD-WAN. - How do I choose a SASE vendor?
Evaluate based on PoP coverage in regions where users and branches are located. Assess native integration between networking and security components, not just acquisitions. Consider single-vendor vs multi-vendor. Test user experience with your real applications. - What should I learn next after SASE?
After mastering SASE, explore zero trust architecture, ZTNA implementation, SD-WAN fundamentals, CASB for cloud security, secure web gateway, and cloud security posture management (CSPM) for comprehensive protection.
