Secure Access Service Edge

What is it, and does it make sense?

Over the past several years, many organisations have begun transitioning to cloud-based security services. How to secure them is an ongoing challenge.

By shifting into more platform as a service (PaaS) and infrastructure as a service (IaaS) workloads and services, many aspects of IT operations, architecture, and security are changing significantly. This shift is leading to the development of hybridcloud networks, requiring network engineering and security architecture teams to look at new controls and methods for developing and implementing network security practices in their environments.

As cloud services mature, however, there are more capable network security controls, platforms, and services that teams can employ to build and maintain robust network security architectures for a layered defense. Leading cloud service providers now offer highly capable cloud-native security controls, and third-party solution providers have adapted most network security platforms and services to cloud environments. Enterprises now have even more options for building secure network designs for hybrid and public cloud deployments.

In a modern hybrid-cloud model with routing and connectivity between data centers, branch offices, and cloud providers, most organizations are employing a layered defence model that includes cloud-native network access controls within the cloud service environments. This includes network traffic capture and security monitoring capabilities, and third-party platforms and services that can help to augment and centralise network security functions. Although there is no single network security architecture that works for all organisations, there are more options than ever for implementing a mature network security stack for cloud operations.


The solution

As organisations look to embrace more secure cloud-native and cloud-compatible connectivity and detection/response capabilities, it may make sense to review existing perimeter security technologies and consider a shift to a new combined option known as secure access service edge (SASE), which brings these capabilities and more together under a single provider.

Find out more about SASE

This guide from Amazon Web Services (AWS) whitepaper series in partnership with the SANS Institute, explores the rationale behind adopting SASE.

Security experts detail the critical design criteria for implementation and address operational challenges and optimisation strategies.

>Find out more about SASE
Related Articles
Modern Workplace The impact of migrating to the cloud
The impact of migrating to the cloud

How the cloud has become an extension of your attack surface, and how to secure it.

Cyber Security 2025 cyberthreat predictions
2025 cyberthreat predictions

Expert insights from Barracuda’s security frontline.

Modern Workplace Tired of playing whack-a-mole with cyber threats?
Tired of playing whack-a-mole with cyber threats?

Why incremental cyber security fixes don’t work.

Modern Workplace How to use AI to combat new cyberthreats
How to use AI to combat new cyberthreats

Efficiently empower defenders and disarm intruders.

Modern Workplace Uncovering M365’s security blind spots
Uncovering M365’s security blind spots

How to create a truly agile and secure M365 environment.

Devices The business value of Microsoft Surface
The business value of Microsoft Surface

Simplify management of your users' devices.

Devices Weighing up Microsoft Surface?
Weighing up Microsoft Surface?

IDC research paper into the business case.

Devices Empower your teams to do anything, anywhere
Empower your teams to do anything, anywhere

Best-in-class devices. Zero touch provisioning.

Devices How scalable is your digital transformation?
How scalable is your digital transformation?

Three ways Microsoft Surface is an ideal platform for retail digital transformation.

Devices The second wave of digital transformation
The second wave of digital transformation

How Surface helps retailers navigate it.

Devices How technology helps retailers meet sustainability goals
How technology helps retailers meet sustainability goals

What makes digital solutions the perfect option.

Devices Six ways IT can modernise retail
Six ways IT can modernise retail

How Microsoft Surface and 365 elevate employee and customer experiences - without breaking the bank.

Devices Six reasons to partner with SHI for Microsoft
Six reasons to partner with SHI for Microsoft

All the advantages that come by partnering with SHI for your Microsoft environment.

Devices Digital transformation and small business success
Devices What makes Microsoft Surface and 365 ideal for retailers?
What makes Microsoft Surface and 365 ideal for retailers?

The software to enhance and empower the way you use hardware.

Devices How cloud computing empowers retail
How cloud computing empowers retail

How to adopt, a ‘digital-first’ business strategy.

Devices The role of Microsoft 365 and Surface in boosting productivity
Devices Six ways Microsoft 365 and Surface work in unison
Six ways Microsoft 365 and Surface work in unison

Getting software and hardware working hand-in-hand.

Cloud Security Top trends in cybersecurity 2022: Vendor consolidation
Devices How cloud computing empowers hardware
How cloud computing empowers hardware

Do you have the systems to bring hardware to life?

Cloud Security Empowering the people
Empowering the people

Critical cyber security challenges.

Cloud Security Data in the cloud heightens the insider threat
Data in the cloud heightens the insider threat

The insider threat that caused the security vs usability conundrum.

Cloud Security Will the mid-market be left behind the cyber security curve?
Cloud Security Lighten your cybersecurity load
Lighten your cybersecurity load

How a consolidated approach works.

Cloud Security Platform perspective for the mid-market
Platform perspective for the mid-market

Key insights and recommendations from Gartner.

Cyber Security Why security portfolios will fail as platforms prevail
Managed Security Services Technology leaders' guide to SASE
Technology leaders' guide to SASE

The what, why and how of SASE

Cyber Security Red alert for cybersecurity
Red alert for cybersecurity

5 steps for defence

Cyber Security 7 cybersecurity challenges facing financial institutions
Cyber Security Cyber Security ABCDs
Cyber Security ABCDs

What they are and how to get them right

Managed Security Services Protecting the mid-market against ransomware
Protecting the mid-market against ransomware

"The biggest cyber threat facing the UK"

[Video] Plan smart: The future is SASE
[Video] Plan smart: The future is SASE

The perimeter is no longer “entombed in a box”

Cloud Security Censornet Platform Data Sheet
Censornet Platform Data Sheet

Freedom. Visibility. Protection.

Cloud Security Slam the door shut on cyber attacks
Slam the door shut on cyber attacks

with this all-in-one solution

⚠️ The UK Mid-Market on Code Red
⚠️ The UK Mid-Market on Code Red

The state of the UK’s cyber security response

Cloud Security Ten steps to prepare for SASE adoption
eBook
eBook

Zero Trust and Beyond

Cloud Security Webcast: Human Security and Risk Management
Webcast: Human Security and Risk Management

How to protect your users with email security

Devices See Microsoft Surface - in just 90 seconds
See Microsoft Surface - in just 90 seconds

Inspire creativity, innovation, and collaboration.

The Impact of Remote Working
Zero Trust, Maximum Security
Cloud Security Russia Arrests 14 members of Top Ransomware Gang in the World
Cloud Security CISOs:  Top 5 Concerns in 2022
Cloud Security Ukraine’s Digital Minister forms Social Media Army
Cloud Security Autonomous Cyber Security
Autonomous Cyber Security

Easing alert fatigue

Cloud Security Data in the Cloud
Data in the Cloud

And the heightened insider threat

Cloud Security Fortify the New Perimeter
Fortify the New Perimeter

Protect your data in the cloud

Cloud Security Hacking is a 24-hour business
Hacking is a 24-hour business

9-5 attention no longer cuts it

Cloud Security Is Cyber Security Complexity
Is Cyber Security Complexity

Threatening your business?

Cloud Security The Dangers of Ignoring Cyber Security Needs
Cloud Security Mid-Market's future
Mid-Market's future

If it's left behind the cybersecurity curve

Cloud Security Fortifying the New Perimeter
Fortifying the New Perimeter

Protect your data in the cloud

Share this story

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch