Some call it the future of network security. Others roll their eyes and file it under "yet another acronym".
But when you strip out all the buzzwords and think about the realities, SASE is trying to solve a very real, very common problem in that most of us didn't plan to end up with - a patchwork of tools. It just happened over time.
Typically, this means teams of a certain size have
So what you end up with is a bunch of overlapping tools, scattered policies, and very little visibility. This means, if you're responsible for keeping things secure and usable, it's a daily balancing act. So my question isn't "should we care about SASE?, it's "Are we happy managing this chaos indefinitely?"
If we forget the vendor definitions for a moment, the core idea behind SASE is this: One cloud-based service that handles both secure access and network performance, wherever your users are. Instead of stringing together five different products, you manage one.
That usually includes:
Is it a silver bullet? No. But it is a way to reduce the sprawl and regain some sanity.
Mostly it feels like the vendors of such products because we think we've already got much of it covered and we're doing just fine. But one thing I've come to realise is, SASE isn't just for enterprises with 50 sites and global networks. It’s especially relevant for:
If you're managing access and control across multiple tools, locations, and cloud platforms, SASE might not be a "future state", it might just be a smarter starting point.
That depends on what you’re looking to solve. If your current setup works and users are happy, you probably don’t need to rip it all up. But if you're spending too much time stitching things together, SASE isn’t hype; it’s a simplification.
It's not about buying a whole new platform tomorrow. It's about starting to think differently and how to use technology to make us more efficient and ask ourselves
From speaking with cyber security leaders in networking events I've been to recently, it seems people approach the move to SASE using different paths:
What’s clear is that teams who’ve started the journey aren’t looking back. Not because it’s trendy, but because it’s removed friction. For users. For admins. For compliance. So if your current model is a stack of workarounds, ask yourself: what’s the cost of standing still?
Vendors will always give you their version. But the most useful insights come from peers who’ve been there. This is what I can personally recommend
No one these days has the budget to buy for the sake of it. We buy because our teams need better ways to secure, connect, and scale.
This guide from Amazon Web Services (AWS) whitepaper series in partnership with the SANS Institute, explores the rationale behind adopting SASE.
Security experts detail the critical design criteria for implementation and address operational challenges and optimisation strategies.
Why SMBs are thinking SASE over patchwork tools
The perimeter is no longer “entombed in a box”
The what, why and how of SASE
View white paper
Share this story
We're a community where IT security buyers can engage on their own terms.
We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.