SD-WAN and SASE

    06/15/2023 9:40 AM By Chuck F

    SDWAN & SASE: The Essential Guide to Converging Connectivity and Cloud Security

    Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network

    Cloud-first operations demand a new network model. Understanding the roles of Software-Defined Wide Area Networking (SDWAN) and Secure Access Service Edge (SASE) is the first step toward building a truly resilient and secure edge.

    SASE and SDWAN represent the necessary convergence of security (the perimeter) and networking (the pathway) in the age of cloud and hybrid work.

    Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network

    For many IT leaders, the networking and security landscape over the past few years has felt like an endless alphabet soup. Two acronyms, in particular, have dominated strategic conversations: SDWAN and SASE.


    Both are frequently discussed in the context of modernization, cloud migration, and supporting the hybrid workforce. This has led to widespread confusion, with many vendors incorrectly presenting them as competing solutions, or worse, claiming that one automatically includes the other without proper implementation.


    At Cloud 9 Advisers, we act as pragmatic, expert advisers to help you cut through this noise. Simply put: SDWAN optimizes the network; SASE secures the edge. They are not competing technologies, but essential components that, when unified correctly, form the foundation of a modern, secure, and resilient network.

    Understanding their individual roles is the first step to making the right strategic investment.


    Part 1: Demystifying SDWAN (Software-Defined Wide Area Network)

    SDWAN is fundamentally a revolutionary approach to Wide Area Networking (WAN). Traditionally, WANs relied on complex hardware—specific routers, expensive leased lines (like MPLS), and manual configurations—to connect separate locations.


    SDWAN separates the control plane (the intelligence of the network) from the data plane (the physical connections). By shifting control to software, it gains two critical advantages: intelligence and flexibility.


    The SDWAN appliance at each location becomes application-aware, meaning it knows the difference between a voice packet, an email, or a large file download. This intelligence is then used to optimize traffic flow in real time across any combination of underlying links (fiber, broadband, 4G/5G, etc.).


    The Pragmatic Benefits of SDWAN

    While SDWAN was originally designed to connect multiple locations effectively, it offers distinct and significant benefits even for companies with a single location:

    Audience

    Primary Problem Solved

    Core SDWAN Benefit

    Single Location

    Internet instability, QoS issues for real-time apps, reliance on expensive single circuits.

    Reliability & Efficiency: It aggregates multiple, low-cost internet links into a unified connection. It uses that power to ensure mission-critical applications (like UCaaS or a cloud ERP system) always have the bandwidth they need, while less critical traffic is given lower priority. It provides a more robust, stable connection than any single circuit ever could.

    Multiple Locations

    High cost of traditional WAN (MPLS), complex management, and traffic backhauling for security.

    Virtual Network & Cost Reduction: This is the original design intent. It creates a seamless, virtual network that spans multiple physical locations, making management centralized and simple. Critically, it allows companies to swap expensive MPLS with low-cost broadband, reducing ongoing network costs while improving agility and allowing for dynamic, automated routing around outages or congestion.


    SDWAN’s value is in resilience and performance. It is the key to providing the high-quality, low-latency connectivity required for the sensitive, real-time applications we discussed in our last article on Call Survivability.


    Part 2: Demystifying SASE (Secure Access Service Edge)

    If SDWAN is the intelligent highway, then SASE (Secure Access Service Edge) is the integrated, cloud-native security perimeter applied to that highway's entrance and exit ramps.


    SASE is an architectural framework, not a single product. It was introduced to address the reality that the traditional network perimeter—the firewall in your server room—is obsolete. Users now access corporate data from home, coffee shops, and client sites using personal devices, reaching applications hosted in multiple clouds.


    The goal of SASE is simple: Secure and reliable access to corporate resources from any location, without sacrificing user experience or performance.


    A comprehensive, robust SASE solution is built upon the convergence of several key security and networking components, all delivered via a single, cloud-based platform. If a vendor is missing even one of these components, they are selling a partial, non-SASE solution.


    The Five Essential Components of a True SASE Platform

    A good SASE solution brings together the following technologies into a unified stack:

    1. Secure Web Gateway (SWG): Provides secure, cloud-based internet access. It acts as the first line of defense, blocking malicious websites, filtering URLs, and applying advanced malware detection before traffic even reaches the user’s device or the corporate network.

    2. Cloud Access Security Broker (CASB): The CASB provides critical visibility and control over cloud applications (SaaS). It monitors user activity within apps like Microsoft 365, Salesforce, and Dropbox, enforces security policies, and prevents data leakage by encrypting sensitive data both in transit and at rest.

    3. Firewall-as-a-Service (FWaaS): This replaces the traditional physical, on-premise firewall. FWaaS is a cloud-native security layer that controls access to corporate resources and blocks unauthorized traffic, applying consistent security policies to users regardless of their location.

    4. Zero Trust Network Access (ZTNA): This is the modern replacement for traditional VPNs. ZTNA is critical because it never grants blanket access to the entire network. Instead, it operates on a principle of "never trust, always verify," granting users access only to the specific applications they need, only after identity verification, and only from a compliant device. This hides corporate resources from the public internet entirely.

    5. Identity and Access Management (IAM): An integral part of the Zero Trust model. IAM provides the centralized control over user identities, authentication (often multi-factor, or MFA), and authorization. It is the engine that validates who a user is and what they are allowed to access, enforcing policy consistently across the entire SASE stack.


    And finally, the often-misunderstood component:

    • Software-Defined Wide Area Networking (SDWAN): A true SASE architecture includes SDWAN functionality. The networking side of SASE is responsible for optimizing the transport layer—selecting the best path for traffic based on business requirements and dynamically routing it across various links (broadband, 5G, private connections). It ensures the high-performance delivery of traffic to and from the secure SASE cloud edge.


    SDWAN + SASE: The Convergence Strategy

    The modern B2B enterprise is defined by dispersed data, dispersed users, and dispersed applications. The only way to manage this complexity effectively is through convergence.


    The strategic relationship can be summarized simply:

    • SDWAN is the foundation of high-performance connectivity. It delivers the path optimization, quality of service (QoS), and resilience (call survivability) that your business demands.

    • SASE is the strategic security framework. It delivers the identity-centric access control (ZTNA), threat prevention (SWG, FWaaS), and data protection (CASB) that your business requires, regardless of where the user is located.


    By consolidating these functions into a unified, cloud-based platform—the core tenet of SASE—businesses gain:

    1. Simplified Management: Moving from managing six different boxes (router, firewall, VPN concentrator, web filter, etc.) to managing one policy stack in the cloud.

    2. Consistent Security: Every user, no matter where they are or how they connect, gets the exact same security inspection and policy enforcement.

    3. Cost Efficiency: Reducing hardware footprints and maintenance costs, leveraging lower-cost internet links, and consolidating vendor contracts.

    4. Agility: The network scales instantly to accommodate mergers, acquisitions, or sudden shifts to remote work, without needing to deploy physical hardware.


    Simplifying the Strategic Choice

    The choice between SDWAN and SASE is a false one; the correct answer is a converged solution.


    However, the vendor landscape is complex, with providers offering partial solutions that may excel at the "SDWAN" part but provide poor, bolt-on security, or vice versa. The strategic challenge is identifying the partner that can deliver a truly unified SASE platform—one where the networking and security components are built to work together seamlessly, eliminating gaps and preserving performance.


    Don’t get stuck in the alphabet soup of acronyms. Focus on the required outcomes: resilient performance and secure access from anywhere.


    At Cloud 9 Advisers, we help technology leaders sift through the noise, evaluate the true integration level of SASE vendors, and select the platform that meets the specific demands of their single or multi-location business model.

    KITS: Keep IT Simple.