Secure access service edge (SASE) is an architecture that delivers converged network and security as a service capabilities including SD-WAN and cloud native security functions such as secure web gateways, cloud access security brokers, firewall as-a-service, and zero-trust network access. These functions are delivered from the cloud and provided as a service by the SASE vendor. No matter where you are on your SASE journey, Cisco has the right solution to meet your needs.
With the digital transformation of businesses, security is moving to the cloud. This is driving a need for converged services to reduce complexity, improve speed and agility, enable multicloud networking and secure the new SD-WAN-enabled architecture.
The SASE model consolidates numerous networking and security functions--traditionally delivered in siloed point solutions--in a single, integrated cloud service. By consolidating with SASE, enterprises can:
Gartner considers SASE to be a vision of a future secure networking model for enterprises to strive for. It is not currently a reality from any vendor. Today SASE is best represented by the convergence of cloud-managed SD-WAN and cloud-delivered security.
Moving to a SASE model will be a gradual process as IT rethinks how to connect a remote workforce to the distributed information resources they need. There will also likely be an increasing demand for "as-a-service" procurement models that offer more flexibility.
SD-WAN is a cloud-delivered, overlay WAN architecture that provides the building blocks for cloud transformation at enterprises. It helps ensure a predictable user experience for applications and provides a seamless multicloud architecture while integrating robust, best-in-class security.
Security Service Edge is the portion of the SASE architecture that provides a converged set of security services delivered and managed from the cloud to defend against threats and enforce user, data, and application policies. It helps you better manage security by extending controls to devices, remote users, and distributed locations anywhere in minutes.
Zero trust network access verifies users' identities and establishes device trust before granting them access to authorized applications. It helps organizations prevent unauthorized access, contain breaches, and limit an attacker's lateral movement on your network.