CyberArk Glossary >

What is SASE (Secure Access Service Edge)?

Secure Access Service Edge (SASE) is a transformative framework that combines network security functions and wide-area network (WAN) capabilities into a unified cloud service. Pronounced “sassy,” SASE provides a flexible, centralized solution for securing and connecting remote employees, branch offices, and cloud-based resources.

In the past, network security relied heavily on a centralized data center model. All traffic was directed through a central data center where firewalls, intrusion detection systems, and other security tools could be applied. This worked well when employees operated within a secure, controlled network environment, but it falls short in today’s world where employees access corporate resources from various locations. SASE integrates security directly into the cloud, enabling secure, seamless access for users, no matter where they are.

How Does SASE Work?

SASE integrates networking and security functions directly in the cloud, establishing a “secure edge” for all connections. When users access applications or resources, SASE applies security policies in real time, regardless of the user’s location. This approach ensures that all connections are secure and that users enjoy fast, reliable access to the applications they need, wherever they are.

SASE operates by dynamically routing traffic across a network of cloud-based security services, using multiple nodes to enforce security and optimize connectivity. This cloud-native framework enables organizations to deploy a consistent security policy across their entire network, delivering visibility and protection that adapts to each user’s context, from location to device type.

Key Components of SASE

SASE brings together several cutting-edge technologies into a single architecture. Each component has a unique role in supporting secure, reliable connectivity:

Software-Defined Wide Area Network (SD-WAN)

SD-WAN is the backbone of SASE’s networking capabilities. Unlike traditional WANs that rely on dedicated hardware and leased lines, SD-WAN uses software to control traffic routing across various network connections, including broadband, LTE, and MPLS.

With SD-WAN, SASE can dynamically optimize traffic flows to enhance performance and maintain reliability, even across geographically dispersed networks.

Secure Web Gateway (SWG)

A Secure Web Gateway (SWG) acts as a filter for internet-bound traffic, blocking access to malicious websites and filtering out potentially harmful content before it reaches the user. SWGs use URL filtering, anti-malware, and data loss prevention (DLP) techniques to control which sites employees can access, preventing accidental exposure to threats like malware and phishing attacks.

In the SASE model, SWG ensures that all internet-bound traffic from any location passes through this protective filter, reducing the risk of web-based threats.

Cloud Access Security Broker (CASB)

A Cloud Access Security Broker (CASB) acts as an intermediary between cloud applications and users, enforcing security policies and monitoring access. CASB provides visibility into cloud usage, detecting and preventing unauthorized access, data sharing, or suspicious activity. In SASE, CASB strengthens cloud security by enabling secure access to cloud resources.

Zero Trust Network Access (ZTNA)

Zero Trust Network Access (ZTNA) is based on the principle that no one, inside or outside the network, should be trusted by default. Instead, access is granted only after verifying the user’s identity and ensuring they have the right level of permission.

By combining ZTNA with other SASE components, organizations can create a network environment where users only access the resources they need, significantly lowering the attack surface.

Firewall as a Service (FWaaS)

Traditional firewalls, which once required physical hardware and manual configuration, are now available as a cloud-based service through Firewall as a Service (FWaaS). FWaaS provides advanced firewall capabilities at the network’s edge, filtering traffic and blocking unauthorized access to applications.

With FWaaS in place, SASE delivers scalable, distributed firewall protection, allowing organizations to enforce consistent security policies across all locations.

How to Implement SASE

Interested in implementing SASE across your organization? Here are some steps to get started.

Step 1: Assess and Plan
Start by assessing your organization’s current network and security posture. Identify gaps in connectivity, cloud usage, and existing security solutions. Consider how well your current setup supports remote work and whether it can scale to meet future needs. This assessment will help you determine if SASE is a fit and identify priority areas.
Step 2: Choose the Right Provider
Choosing a SASE provider is a critical step, as each vendor offers a unique blend of features and capabilities. Evaluate providers based on factors like ease of integration, scalability, customer support, and compliance with industry standards. The right provider should align with your specific security needs and be capable of growing with your organization.
Step 3: Deploy and Train
Work with your chosen provider to implement SASE seamlessly across your organization and existing infrastructure. Training employees on the basics of SASE, including its benefits and usage, will help encourage user adoption and maximize its effectiveness.

Learn more about machine identity security, and how it can benefit your organization!

OTHER GLOSSARY ENTRIES