Skip to main content

SASE

Secure Access Service Edge converging network and security functions

SASE Buying Guide

SASE Buying Guide: Secure Access from Anywhere

Secure Access Service Edge (SASE) is a cloud-native architecture that converges networking and security functions into a single, integrated platform. It's designed to provide secure and efficient access to applications and data for users, regardless of their location or device. As organizations increasingly adopt cloud services and remote work models, SASE offers a holistic approach to securing distributed environments.

What SASE Does

SASE consolidates several traditional security and networking tools into a unified, cloud-edge service. This includes:

  • Software-Defined Wide Area Network (SD-WAN): Optimizes network traffic routing and connectivity.
  • Secure Web Gateway (SWG): Protects against web-borne threats and enforces internet usage policies.
  • Cloud Access Security Broker (CASB): Secures cloud application usage, monitors data in cloud apps, and prevents data loss.
  • Zero Trust Network Access (ZTNA): Provides granular, identity-aware access control to applications and resources, replacing traditional VPNs.
  • Firewall as a Service (FWaaS): Delivers firewall capabilities from the cloud edge, protecting users and branches without dedicated hardware.

By integrating these capabilities, SASE simplifies security management, improves network performance, and enhances the overall security posture for modern, distributed enterprises.

Key Features to Evaluate

When evaluating SASE solutions, consider these critical features:

  • Unified Policy Management: A single console for managing all security and networking policies across the entire SASE stack. This reduces complexity and human error.
  • Global PoP (Point of Presence) Footprint: Extensive global network of PoPs for low-latency access and optimal performance for users worldwide.
  • Integrated Threat Protection: Advanced threat prevention capabilities, including anti-malware, intrusion prevention, sandboxing, and data loss prevention (DLP), across all security services.
  • Granular Access Control (ZTNA): Identity-based, context-aware access policies that grant least-privilege access to specific applications, not entire network segments.
  • SD-WAN Integration: Seamless integration with SD-WAN for intelligent traffic steering, quality of service (QoS), and application optimization.
  • Visibility and Analytics: Comprehensive logging, reporting, and dashboard capabilities to monitor network performance, security events, and user activity.
  • Scalability and Elasticity: Ability to effortlessly scale up or down based on organizational growth and changing traffic demands without infrastructure limitations.
  • API Integrations: Open APIs for integration with existing security tools, identity providers (IdP), and SIEM/SOAR platforms.

Use Cases

SASE is ideal for organizations facing these challenges:

  • Securing Remote and Hybrid Workforces: Providing secure, high-performance access to corporate resources from any location.
  • Cloud-First Strategies: Protecting data and applications hosted in public cloud environments.
  • Branch Office Connectivity: Replacing legacy MPLS and firewalls with more agile and cost-effective cloud-native solutions.
  • Mergers & Acquisitions: Quickly integrating new networks and users under a unified security policy.
  • Reducing Operational Overhead: Consolidating multiple security vendors and management consoles into a single platform.

Implementation Considerations

Successful SASE implementation requires careful planning:

  • Phased Rollout: Start with a pilot group or specific use case (e.g., ZTNA for remote users) before a full organizational deployment.
  • Network Assessment: Understand your current network architecture, application dependencies, and user locations.
  • Identity Integration: Ensure seamless integration with your existing identity provider (e.g., Okta, Azure AD) for single sign-on and policy enforcement.
  • Bandwidth Requirements: Assess current and future bandwidth needs, especially for branch offices consolidating internet breakout.
  • Security Policy Review: Re-evaluate and adapt existing security policies for the SASE model, focusing on zero-trust principles.
  • Training and Change Management: Educate IT staff and end-users on the new system and any changes to their access methods.

Pricing Models

SASE pricing typically follows these models:

  • Per-User/Per-Month: Most common model, pricing based on the number of active users accessing the SASE platform. Tiers may exist based on feature sets.
  • Per-Device/Per-Month: Less common, but some vendors may offer this for specific device types (e.g., IoT).
  • Per-Bandwidth (Less Common for SASE core): Some components like SD-WAN or specific data transfer-heavy services might have consumption-based charges.
  • Feature-Based Tiers: Different packages offering varying levels of features (e.g., basic FWaaS vs. advanced threat protection with DLP).
  • Hybrid Models: A combination of user subscriptions with additional charges for advanced features or specific add-ons.

Expect annual or multi-year contracts, often with discounts for longer commitments. Evaluate total cost of ownership (TCO) including potential reductions in hardware, legacy software, and operational costs.

Selection Criteria

  • Vendor Vision and Roadmap: Does the vendor have a clear vision for the evolving SASE market and a strong roadmap for new features?
  • Solution Completeness: How many core SASE components does the vendor natively offer versus relying on third-party integrations? Native integration is generally preferred for ease of management and performance.
  • Performance and Latency: Evaluate the vendor's PoP footprint and average latency to your user bases.
  • Management Experience: Does the unified console provide an intuitive, comprehensive, and efficient management experience?
  • Support and SLAs: What are the vendor's support offerings, response times, and service level agreements (SLAs)?
  • Proof of Concept (PoC) and Trials: Does the vendor allow for a PoC or trial period to thoroughly test the solution in your environment?
  • Compliance Certifications: Does the vendor meet relevant industry and geographic compliance standards (e.g., SOC 2, ISO 27001, GDPR)?

Need help evaluating SASE solutions?

Independent. Vendor-funded. Expert-backed.

Our advisory team has deep expertise in SASE. We'll help you find the right vendor, negotiate better terms, and ensure a successful implementation.

Get Our Recommendation