Gartner coined the Secure Access Service Edge term in 2019 for an approach that uses cloud-based services to protect people consistently no matter where they are. Just a few years later, almost every security vendor has jumped into the market. However, while SASE is newly defined, organizations have been moving toward the model for a long time—which became a sprint as a result of the pandemic.
A SASE architecture moves security from the data center to the cloud, reinventing technologies that used to be separate and isolated into converged Security-as-a-Service. It enables people anywhere—the new hybrid workforce—to get to and use data safely, everywhere. By centralizing the administration of security, it reduces the effort and complexity of connecting people to the internet with technologies such as Software-Defined Wide Area Networking (SD-WAN) and keeping them safe as they use business data.
SASE isn’t a single product; it’s an architecture or philosophy, according to Gartner analyst Nat Smith. Many vendors now offer bundled solutions that can fast-track a company’s ability to use SASE to support remote workers.
Adoption of SASE services usually happen incrementally—addressing immediate business needs first, then expanding to solve other problems over time. At Forcepoint, our customers are seeing distinct and early advantages in incorporating cloud-delivered security capabilities such as Secure Web Gateway (SWG), Cloud Access Service Broker (CASB), and others that act as their on-ramp to SASE.
This is the first part of a six-part blog series that we'l be rolling out over the next several weeks.
- Part Two - Protect Remote Workers Anywhere
SASE: A Philosophy, not only a Platform
Who’s accessing business systems and information is just as important as what’s stored inside. With over 75% of workforces expecting to work on a hybrid schedule, that access is increasingly coming outside the traditional boundaries of the enterprise, whether at home, in non-corporate offices, or even on the road—areas that are difficult to secure.
For many companies, this results in the sources of risk moving from the center of their infrastructure to the outskirts and beyond. SASE uses next-generation network technologies and cloud-based security solutions to extend protection to those edges, without compromising on performance or user experience.
Forcepoint offers a broad range of SASE capabilities, but what truly makes us different is the way we put securing the usage of data at the center of our SASE platform. This data-first mindset is key to safeguarding business information and enabling people to work anywhere—remotely, in the office, even on the road—by tightly integrating security for both accessing and using sensitive data. Where other vendors see stopping threats as people go to the web, cloud, or private data center apps as the finish line, we see it as the starting line. The true value of security extends beyond simply protecting people online; with the right strategy in place, security enables people to be more productive, using data safely in new ways while keeping the company safe.
At Forcepoint, we’ve detailed the five steps to SASE in depth. Our blog and webinar series about them describe the most common use cases for cloud-based security solutions organizations employing with SASE:
- Protect remote workers on the web and in the cloud
- Control access to cloud and private apps without a Virtual Private Network
- Safeguard usage of data everywhere
- Connect and protect brand offices
- Continuously monitor user risk
Driving Business Value with SASE Philosophy
Many Forcepoint customers around the world are meaningfully improving user productivity while maintaining a high-level of security using Forcepoint’s cloud-based SASE services. In most cases they didn’t choose them because they were based on a SASE architecture; they simply were the best way to solve a pressing business need.
In subsequent parts of our series on the value of SASE, we’ll share multiple examples of organizations that will hopefully resonate with any business attempting to manage security for an increasingly hybrid workforce. Next up: Part 2 will look at how security teams are protecting remote workers in the web and cloud—and delivering increased value across the company because of it.