The requirements for cyber security have changed in the past few years as more people can now work from anywhere—whether the office, at home, or another remote location. Since remote-access technologies are exposed to more security risks, many companies are considering how to ensure a secure work environment for employees working in different locations.
Secure Access Service Edge (SASE) is a service concept developed by Gartner in 2019 for organizing secure hybrid work. It ensures secure remote working by restricting access based on user, device, and application identity. The SASE solution identifies the user's rights, the context of use, and the company's security and compliance guidelines—and immediately alerts if a security breach takes place.
In the SASE architecture, the assessment of risk and trust is continuous: the technology allows identified users to access the information they need for their work, while preventing its misuse.
By 2025, at least 60% of companies will have an SASE strategy with a development roadmap, according to Gartner. Evidently, SASE is not just a passing fad, but a new way to respond to future cyber threats.
In a remote work environment, users often take a more relaxed approach to information security. They might click more lightly on links that can contain malware, or download risky applications. When companies don't have visibility to remote work environments and IT infrastructure, the damage often happens before anyone can interfere to prevent it.
Visibility into user activity is in the interest of both the company and the employees. The SASE solution offers a wide range of controls to identify users and security breaches, including location, time of day, and unusual behavior.
The SASE solution can be used to limit the downloading of files, applications from the internet, and to prevent harmful online content and sensitive data from ending up in the wrong hands.
When downloads are centrally monitored, employees don’t have to think about whether an application they use is secure. They also don’t have to stress about whether they’ll send sensitive data in the attachments of their personal email because SASE recognizes the content as confidential and blocks the transmission.
There are around a dozen different SASE solution providers to choose from. When evaluating different vendors, consider management interfaces and point of presence, meaning where in the world they have their own infrastructure such as servers and networks.
The level, quantity, and quality of support also varies between SASE service providers. Some vendors have more of their own data security technology than others, which can be connected and used with SASE.
From the user's point of view, the implementation process of SASE can simply mean the appearance of a new agent on the desktop or the change of the cloud login experience to a single login.
From the IT organization’s point of view, the scope of the implementation project depends on how widely the features of the SASE solution are taken into use. The key factors are the authentication of users when they log into services and strong authentication mechanisms, which might also be implemented at the same time.
Many companies start implementing SASE piece by piece. This is what gradually introducing SASE can look like:
When implementing SASE architecture and tools, it’s also worth making sure there’s a good flow of information towards the users. For example, if you implement network traffic filtering, the IT support organization should be ready to quickly answer any filtering-related questions.
Although SASE is generally referred to as a cloud-native service, some of the solutions on offer enable the continued use of on-premises services with the help of ZTNA without separate VPN software. However, for many companies, the introduction of SASE naturally coincides with changes in the IT infrastructure, in which case it’s worth giving up several old systems and ways of working.
You can start implementing SASE either with a partner or by yourself. Either way, keep in mind that SASE is not a single solution that solves all the information security concerns and challenges. As each company has their own unique IT architecture, the SASE solution must be built to fit the needs of each company.
Modern information security is fine-tuned, where all the settings have to be adjusted. You’ll want to consider if there’s enough time and skills for developing and improving the information security on a continuous basis in-house, or if it would be better to hand it over and work with a professional partner.