What is Secure Access Service Edge (SASE)

Secure Access Service Edge (SASE) – defined by Gartner – is an emerging framework for the convergence of networking and network security services within a global cloud-based platform.

The traditional network perimeter is dissolving

Conventional security measures presumed that applications and users would be inside the network perimeter, which is no longer true. Corporate data is moving to the cloud, employees are increasingly working remote, and digital transformation initiatives require IT organizations to be nimble to capitalize on new business opportunities.


As a result, the traditional network perimeter is dissolving, and new models for access controls, data protection and threat protection are necessary. In light of these changes, organizations are finding that their existing collection of standalone point products such as firewalls, secure web gateway, dlp and casb, are no longer applicable in a cloud-first world.

What does a SASE architecture look like?

Secure Access Service Edge, or SASE, unifies networking and security services in a cloud-delivered architecture to protect users, applications and data everywhere. Given that users and applications are no longer on a corporate network, security measures can’t depend on conventional hardware appliances at the network edge. Instead, SASE promises to deliver the necessary networking and security as cloud-delivered services. Done properly, a SASE model eliminates perimeter-based appliances and legacy solutions. Instead of delivering the traffic to an appliance for security, users connect to the SASE cloud service to safely use applications and data with the consistent enforcement of security policy.

What does a SASE architecture look like?

Le modèle SASE combine les technologies suivantes

Une architecture SASE est en mesure d'identifier les utilisateurs et les périphériques, d'appliquer des contrôles de sécurité basés sur des politiques et de fournir un accès sécurisé aux données et applications appropriées. Le SASE permet de fournir un accès sécurisé, quel que soit l'emplacement des utilisateurs, des données, des applications ou des périphériques.

  • Microservices cloud-native réunis en une seule et même plateforme
  • Possibilité d'inspecter le traffic chiffré SSL/TLS dans le cloud
  • Proxy inline capable de décoder le traffic cloud et Web (NG SWG)
  • Pare-feu et protection contre les intrusions pour tous les ports et protocoles (FWaaS)
  • Intégration de l'API du service cloud managé pour les données au repos (CASB)
  • Évaluation continue de la sécurité du cloud public IaaS (CSPM)
  • Protection avancée des données en transit et au repos (DLP)
  • Protection contre les menaces avancées, notamment IA/ML, UEBA, sandboxing, etc. (ATP)
  • Partage d'informations sur les menaces et intégration dans EPP/EDR, SIEM et SOAR
  • Software defined perimeter with zero trust network access, replacing legacy VPNs (SDP, ZTNA)
  • Protection for the branch, including support for branch networking initiatives such as SD-WAN
  • Carrier-grade, hyper scale network infrastructure with a global POP footprint

Gartner SASE predictions

20 %

des entreprises adopteront des technologies SWG, CASB, ZTNA et FWaaS d'ici 2023

Source: Gartner report: The Future of Network Security is
in the Cloud

40 %

des entreprises mettront au point des stratégies d'adoption de l'architecture SASE d'ici 2024

Source: Gartner report: The Future of Network Security is
in the Cloud

SASE Benefits



Offre un accès « direct-to-net » ou « direct-to-cloud » depuis n'importe quel emplacement, contrairement au hair-pinning traditionnel qui relie le trafic au datacentre


Réduction des coûts

Élimine les dépenses d'investissement pour les infrastructures locales, et génère des dépenses d'exploitation réduites et prévisibles en raison de son modèle Security-as-a-Service



Enables organizations to shift security staff from managing appliances to focusing on delivering policy-based security services; and unified policy enforcement simplifies SecOps


Augmentation des performances

Améliore et accélère l'accès aux ressources Internet à travers une infrastructure réseau mondiale, optimisée pour offrir une faible latence, une capacité élevée et une haute disponibilité


Accès réseau zéro-confiance

Provides secure, contextual access to private apps in public/private clouds


Protection contre les menaces

Stops cloud and web attacks such as cloud phishing, malware, ransomware, and malicious insiders


Protection des données

Protects data everywhere it goes, inside and outside of the organization, including within public clouds as well as between company and person instances of cloud apps

How to get started with SASE

At the core of SASE is an integrated, extensible architecture that redefines security defenses in the cloud as a service. To get started, consider the following questions.

Do you currently have a single inline proxy solution capable of decoding thousands of cloud apps and web traffic using APIs and JSON?

Consider consolidating your secure web gateway (SWG) and cloud access security broker (CASB). This will provide critical visibility and control for data loss protection (DLP) and advanced threat protection (ATP) defenses that are also cloud-hosted in the same platform. Along with retiring your legacy SWG appliances, migrate to zero trust network access (ZTNA) to replace your legacy VPN appliances to modernize your overall secure access posture.

Can your current security stack provide cloud-scale SSL/TLS decryption and inspection?

The majority of cloud traffic is encrypted, and a growing number of attackers are leveraging the cloud to evade traditional network controls. Using cloud-scale SSL/TLS inspection helps you stay on top of the threat landscape.

Does your current MPLS / private network support high performance and availability?

Your users expect high performance with low latency, because if the SASE is slow, users will be unhappy. In order to deliver great user experience, make sure that your SASE solution is engineered for high performance and located in the places that your users are.

How many consoles and policies do you currently have to use to manage your existing security stack?

Many vendors are adapting or virtualizing their software and calling it a cloud-based solution. If it isn’t designed to be a SASE, you may end up with multiple administrative consoles, complex policies that are hard to manage, and time-wasting tools for conducting investigations. Choose a solution that has a single management console, single client, and a single policy to make sure that your SecOps teams can stay on top of security in your organization.


Redéfinissez votre périmètre.