<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/zta/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #ZTA</title><description>Cloud 9 Advisers - News #ZTA</description><link>https://www.cloud9advisers.com/News/tag/zta</link><lastBuildDate>Fri, 27 Feb 2026 01:42:13 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[SD-WAN and SASE]]></title><link>https://www.cloud9advisers.com/News/post/sd-wan-and-sase</link><description><![CDATA[SDWAN optimizes your network. SASE secures your edge. We demystify the two fastest-growing acronyms in networking, clarify their distinct benefits for single and multi-location companies, and explain the components that create a truly unified SASE platform.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1jXyK-BxSzyrWaKP8RqrUA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_iT5zEM8tTIydTEbJVk5i1A" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_gS4hskNZS06uKMpuP2R1QQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_5E1mk1d-aq_UX3M_nNC1YA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>SDWAN &amp; SASE: The Essential Guide to Converging Connectivity and Cloud Security</span></h1></div>
<div data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EaYOe5_uT1Wkw5nbmuKiqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><div style="color:inherit;"><div><span><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></span></div><div><span><span><br/></span></span></div><div><span><span><span><span>Cloud-first operations demand a new network model. Understanding the roles of Software-Defined Wide Area Networking (SDWAN) and Secure Access Service Edge (SASE) is the first step toward building a truly resilient and secure edge.</span></span><br/></span></span></div><div><span><span><span><span><br/></span></span></span></span></div><div><span><span><span><span><span><span>SASE and SDWAN represent the necessary convergence of security (the perimeter) and networking (the pathway) in the age of cloud and hybrid work.</span></span><br/></span></span></span></span></div></div></div>
</div><div data-element-id="elm_jkUNxYuneitwIK_sewBFAg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_jkUNxYuneitwIK_sewBFAg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"> [data-element-id="elm_BbiI0m9bI29ZdapwOsEbpw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dcjweYy9nV-YMoK-K7qnZA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_WblXvipEFTmJ2j7HnywXfw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WblXvipEFTmJ2j7HnywXfw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;"></span></p><div><h2><span>Beyond Buzzwords: What SDWAN and SASE Really Mean for the Modern Enterprise Network</span></h2><p><span>For many IT leaders, the networking and security landscape over the past few years has felt like an endless alphabet soup. Two acronyms, in particular, have dominated strategic conversations: </span><strong>SDWAN</strong><span> and </span><strong>SASE</strong><span>.</span></p><p><span><br/></span></p><p><span>Both are frequently discussed in the context of modernization, cloud migration, and supporting the hybrid workforce. This has led to widespread confusion, with many vendors incorrectly presenting them as competing solutions, or worse, claiming that one automatically includes the other without proper implementation.</span></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we act as pragmatic, expert advisers to help you cut through this noise. Simply put: </span><strong>SDWAN optimizes the network; SASE secures the edge.</strong><span> They are not competing technologies, but essential components that, when unified correctly, form the foundation of a modern, secure, and resilient network.</span></p><p><span>Understanding their individual roles is the first step to making the right strategic investment.</span></p><h3><span><br/></span></h3><h3><span>Part 1: Demystifying SDWAN (Software-Defined Wide Area Network)</span></h3><p><span>SDWAN is fundamentally a revolutionary approach to Wide Area Networking (WAN). Traditionally, WANs relied on complex hardware—specific routers, expensive leased lines (like MPLS), and manual configurations—to connect separate locations.</span></p><p><span><br/></span></p><p><span>SDWAN separates the control plane (the intelligence of the network) from the data plane (the physical connections). By shifting control to software, it gains two critical advantages: </span><strong>intelligence</strong><span> and </span><strong>flexibility</strong><span>.</span></p><p><span><br/></span></p><p><span>The SDWAN appliance at each location becomes application-aware, meaning it knows the difference between a voice packet, an email, or a large file download. This intelligence is then used to optimize traffic flow in real time across any combination of underlying links (fiber, broadband, 4G/5G, etc.).</span></p><h4><span><br/></span></h4><h4><span>The Pragmatic Benefits of SDWAN</span></h4><p><span>While SDWAN was originally designed to connect </span><strong>multiple locations</strong><span> effectively, it offers distinct and significant benefits even for </span><strong>companies with a single location</strong><span>:<br/><br/></span></p><table><tbody><tr><th style="width:13.516%;"><p><span style="font-weight:bold;">Audience</span></p></th><th style="width:25.137%;"><p><span>Primary Problem Solved</span></p></th><th style="width:59.5205%;"><p><span>Core SDWAN Benefit</span></p></th></tr><tr><td style="width:13.516%;"><p><strong>Single Location</strong></p></td><td style="width:25.137%;" class="zp-selected-cell"><p><span>Internet instability, QoS issues for real-time apps, reliance on expensive single circuits.</span></p></td><td style="width:59.5205%;"><p><strong>Reliability &amp; Efficiency:</strong><span> It aggregates multiple, low-cost internet links into a unified connection. It uses that power to ensure mission-critical applications (like UCaaS or a cloud ERP system) always have the bandwidth they need, while less critical traffic is given lower priority. It provides a more robust, stable connection than any single circuit ever could.</span></p></td></tr><tr><td style="width:13.516%;"><p><strong>Multiple Locations</strong></p></td><td style="width:25.137%;"><p><span>High cost of traditional WAN (MPLS), complex management, and traffic backhauling for security.</span></p></td><td style="width:59.5205%;"><p><strong>Virtual Network &amp; Cost Reduction:</strong><span> This is the original design intent. It creates a seamless, virtual network that spans multiple physical locations, making management centralized and simple. Critically, it allows companies to swap expensive MPLS with low-cost broadband, reducing ongoing network costs while improving agility and allowing for dynamic, automated routing around outages or congestion.</span></p></td></tr></tbody></table><p><span><br/></span></p><p><span>SDWAN’s value is in </span><strong>resilience</strong><span> and </span><strong>performance</strong><span>. It is the key to providing the high-quality, low-latency connectivity required for the sensitive, real-time applications we discussed in our last article on Call Survivability.</span></p><h3><span><br/></span></h3><h3><span>Part 2: Demystifying SASE (Secure Access Service Edge)</span></h3><p><span>If SDWAN is the intelligent highway, then </span><strong>SASE (Secure Access Service Edge)</strong><span> is the integrated, cloud-native security perimeter applied to that highway's entrance and exit ramps.</span></p><p><span><br/></span></p><p><span>SASE is an architectural framework, not a single product. It was introduced to address the reality that the traditional network perimeter—the firewall in your server room—is obsolete. Users now access corporate data from home, coffee shops, and client sites using personal devices, reaching applications hosted in multiple clouds.</span></p><p><span><br/></span></p><p><span>The goal of SASE is simple: </span><strong>Secure and reliable access to corporate resources from any location, without sacrificing user experience or performance.</strong></p><p><span><br/></span></p><p><span>A comprehensive, robust SASE solution is built upon the convergence of several key security and networking components, all delivered via a single, cloud-based platform. If a vendor is missing even one of these components, they are selling a partial, non-SASE solution.</span></p><h4><span><br/></span></h4><h4><span>The Five Essential Components of a True SASE Platform</span></h4><p><span>A good SASE solution brings together the following technologies into a unified stack:</span></p><ol><li><p><strong>Secure Web Gateway (SWG):</strong><span> Provides secure, cloud-based internet access. It acts as the first line of defense, blocking malicious websites, filtering URLs, and applying advanced malware detection before traffic even reaches the user’s device or the corporate network.</span></p></li><li><p><strong>Cloud Access Security Broker (CASB):</strong><span> The CASB provides critical visibility and control over cloud applications (SaaS). It monitors user activity within apps like Microsoft 365, Salesforce, and Dropbox, enforces security policies, and prevents data leakage by encrypting sensitive data both in transit and at rest.</span></p></li><li><p><strong>Firewall-as-a-Service (FWaaS):</strong><span> This replaces the traditional physical, on-premise firewall. FWaaS is a cloud-native security layer that controls access to corporate resources and blocks unauthorized traffic, applying consistent security policies to users regardless of their location.</span></p></li><li><p><strong>Zero Trust Network Access (ZTNA):</strong><span> This is the modern replacement for traditional VPNs. ZTNA is critical because it never grants blanket access to the entire network. Instead, it operates on a principle of &quot;never trust, always verify,&quot; granting users access only to the specific applications they need, only after identity verification, and only from a compliant device. This hides corporate resources from the public internet entirely.</span></p></li><li><p><strong>Identity and Access Management (IAM):</strong><span> An integral part of the Zero Trust model. IAM provides the centralized control over user identities, authentication (often multi-factor, or MFA), and authorization. It is the engine that validates who a user is and what they are allowed to access, enforcing policy consistently across the entire SASE stack.</span></p></li></ol><p><span><br/></span></p><p><span>And finally, the often-misunderstood component:</span></p><ul><li><p><strong>Software-Defined Wide Area Networking (SDWAN):</strong><span> A true SASE architecture </span><strong>includes</strong><span> SDWAN functionality. The networking side of SASE is responsible for optimizing the transport layer—selecting the best path for traffic based on business requirements and dynamically routing it across various links (broadband, 5G, private connections). It ensures the high-performance delivery of traffic to and from the secure SASE cloud edge.</span></p></li></ul><h3><span><br/></span></h3><h3><span>SDWAN + SASE: The Convergence Strategy</span></h3><p><span>The modern B2B enterprise is defined by dispersed data, dispersed users, and dispersed applications. The only way to manage this complexity effectively is through convergence.</span></p><p><span><br/></span></p><p><span>The strategic relationship can be summarized simply:</span></p><ul><li><p><strong>SDWAN is the foundation of high-performance connectivity.</strong><span> It delivers the path optimization, quality of service (QoS), and resilience (call survivability) that your business demands.</span></p></li><li><p><strong>SASE is the strategic security framework.</strong><span> It delivers the identity-centric access control (ZTNA), threat prevention (SWG, FWaaS), and data protection (CASB) that your business requires, regardless of where the user is located.</span></p></li></ul><p><span><br/></span></p><p><span>By consolidating these functions into a unified, cloud-based platform—the core tenet of SASE—businesses gain:</span></p><ol><li><p><strong>Simplified Management:</strong><span> Moving from managing six different boxes (router, firewall, VPN concentrator, web filter, etc.) to managing one policy stack in the cloud.</span></p></li><li><p><strong>Consistent Security:</strong><span> Every user, no matter where they are or how they connect, gets the exact same security inspection and policy enforcement.</span></p></li><li><p><strong>Cost Efficiency:</strong><span> Reducing hardware footprints and maintenance costs, leveraging lower-cost internet links, and consolidating vendor contracts.</span></p></li><li><p><strong>Agility:</strong><span> The network scales instantly to accommodate mergers, acquisitions, or sudden shifts to remote work, without needing to deploy physical hardware.</span></p></li></ol><h3><span><br/></span></h3><h3><span>Simplifying the Strategic Choice</span></h3><p><span>The choice between SDWAN and SASE is a false one; the correct answer is a converged solution.</span></p><p><span><br/></span></p><p><span>However, the vendor landscape is complex, with providers offering partial solutions that may excel at the &quot;SDWAN&quot; part but provide poor, bolt-on security, or vice versa. The strategic challenge is identifying the partner that can deliver a </span><strong>truly unified SASE platform</strong><span>—one where the networking and security components are built to work together seamlessly, eliminating gaps and preserving performance.</span></p><p><span><br/></span></p><p><span>Don’t get stuck in the alphabet soup of acronyms. Focus on the required outcomes: </span><strong>resilient performance and secure access from anywhere.</strong></p><p><span><br/></span></p><p><span>At Cloud 9 Advisers, we help technology leaders sift through the noise, evaluate the true integration level of SASE vendors, and select the platform that meets the specific demands of their single or multi-location business model.</span></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div><span style="font-size:12pt;"><br/></span></div>
</div></div><div data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_CV5VuMRYDmcEvhmfgMYM2w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sase" target="_blank"><span class="zpbutton-content">Learn more about SASE</span></a></div>
</div><div data-element-id="elm_FxB8pAckLtzq7zPAwodPLg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_FxB8pAckLtzq7zPAwodPLg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan" target="_blank"><span class="zpbutton-content">Learn more about SDWAN</span></a></div>
</div><div data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-M6o_rd5AoLrhwfddyyoDQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" title="The 'Real' SDWAN Test:" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div></div><div data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_bFHrnBjhtb96Vh5CJTGcZQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_oF0HDA0tROSZN17dhE2uvg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_oF0HDA0tROSZN17dhE2uvg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-left zpbutton-align-tablet-left"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 15 Jun 2023 09:40:58 -0500</pubDate></item><item><title><![CDATA[SASE, the next-gen SD-WAN?]]></title><link>https://www.cloud9advisers.com/News/post/Is-SASE-the-next-gen-SDWAN</link><description><![CDATA[Gartner claims SASE will make legacy networking obsolete. This is not hyperbole. We cut through the marketing noise to define the four non-negotiable requirements of a true SASE architecture and why identity, not the IP address, is the new network anchor.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_aVn03PLjTPC2C0--suORlg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_oY8K_nMGQwKzWiHm9mR4mA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YJlc6Aw3R--ufTdeEYFGlA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_UwRnoKqwSXqUs1DqV3gR6g"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span style="color:inherit;"><div><span>The Four Pillars of SASE: Why Your Legacy Network Architecture is Obsolete</span></div></span></h1></div>
<div data-element-id="elm_I1dOk7MZXI2b2D5bRFjL6g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="text-align:center;"><span>Gartner makes the claim that the shift to SASE will make obsolete existing networking and security models.</span><br/></p><p style="text-align:left;"><span><br/></span></p><p style="text-align:left;"><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter<br/></span></p><p style="text-align:left;"><span>A true SASE framework moves security policy from the physical office location to the user’s identity, fundamentally transforming how enterprises connect and protect their digital assets.</span></p></div><p></p></div>
</div><div data-element-id="elm_0RjKUZh11XaAKusROPkYlw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"] .zpimagetext-container figure img { width: 1024px !important ; height: 576px !important ; } } [data-element-id="elm_0RjKUZh11XaAKusROPkYlw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/infosecmonitoring.jpeg" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><span><span>The SASE architecture is a fundamental shift, moving the security perimeter from a physical location to a cloud-native, identity-centric service edge.</span></span></div>
</div></div><div data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_MiJR7M7sK9og5Q6EWEJbNQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_ziZwRssE0coI-arTeb4D0Q" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_ziZwRssE0coI-arTeb4D0Q"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_W8xv7NeDY6YcbyevKlOYZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><div></div><div><h2><span>Secure Access Service Edge (SASE): The Foundational Shift Driven by Cloud, Mobility, and the Demise of the Traditional Perimeter</span></h2><p><span>In 2019, Gartner introduced the Secure Access Service Edge (SASE) model, describing it as a fundamental architectural shift that would eventually render existing networking and security models obsolete. While many in the industry initially treated it as hype, the events of the last few years—namely, the explosion of cloud application usage and the permanence of the dispersed, mobile workforce—have made this prediction an undeniable reality.</span></p><p><span><br/></span></p><p><span>Today, every enterprise is facing unprecedented pressure on its legacy network and security architecture. Users, applications, and data have migrated from the confines of the corporate network to the cloud and the edge. This digital transformation improves agility and competitiveness, but it requires a corresponding evolution in how we connect and, more importantly, how we secure those connections.</span></p><p><span><br/></span></p><p><span>The SASE category represents this necessary evolution. It converges the capabilities of the WAN edge (networking) with network security (security) into a single, unified, cloud-native service. However, the market is crowded with vendors claiming SASE capabilities, when, in reality, they are offering little more than traditional products loosely &quot;service-chained&quot; together.</span></p><p><span><br/></span></p><p><span>To cut through this noise and ensure you are making a strategic, future-proof investment, you must evaluate solutions against the </span><strong>four non-negotiable pillars</strong><span> of a true SASE architecture.</span></p><h3><span><br/></span></h3><h3><span>The Problem: When SDWAN Alone Is Not Enough</span></h3><p><span>SDWAN is a critical part of the modern network, solving performance, resilience, and efficiency problems. But as valuable as it is, it is only </span><em>one part</em><span> of the larger SASE story.</span></p><p><span><br/></span></p><p><span>The traditional approach to security—regardless of whether you use SDWAN—was to </span><strong>backhaul</strong><span> all traffic from remote users and branch offices back to a central, on-premise security stack. This approach is fatally flawed today:</span></p><ol><li><p><strong>High Latency:</strong><span> For users accessing cloud applications like Microsoft 365, forcing traffic halfway across the country just to hit a corporate firewall and then turn back to the cloud introduces unacceptable latency and degrades performance.</span></p></li><li><p><strong>Inconsistent Security:</strong><span> Creating a patchwork of appliances (VPN concentrators, firewalls, web gateways) and physically stringing them together via &quot;service chaining&quot; results in fragmented visibility, inconsistent policy enforcement, and complex management. As Gartner noted, service chaining is emphatically </span><strong>not</strong><span> SASE.</span></p></li><li><p><strong>The IP Address Conundrum:</strong><span> Legacy security is tied to a network anchor, typically the IP address of a device or location. In a world where the office can be a coffee shop, an airport, or a home network, an IP address is useless as a hook for security enforcement.</span></p></li></ol><p><span>To overcome these structural limitations, the architecture must evolve beyond the old data center and embrace the cloud-native design principles of SASE.</span></p><h3><span><br/></span></h3><h3><span>Pillar I: Converged WAN Edge and Network Security</span></h3><p><span>A true SASE architecture is defined by convergence. It cannot be a collection of disparate appliances or services loosely managed by different dashboards.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> The WAN edge (SDWAN functionality, traffic optimization, and routing) and the comprehensive network security stack (Firewall-as-a-Service, Secure Web Gateway, CASB, ZTNA) must be folded into a single, cloud-native software fabric.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> This convergence delivers the simplicity, scalability, and pervasive security that customers demand. By operating as a single software stack, the platform can perform </span><strong>single-pass architecture</strong><span> inspection, where traffic is decrypted, inspected against all security and networking policies simultaneously, and then re-encrypted. This greatly reduces processing time and latency compared to chaining separate security devices, ensuring high performance while maintaining security coverage.</span></p><p><span><br/></span></p><p><span>In essence, SASE mandates that networking and security cannot be two separate domains managed by different tools; they must be a single, centrally controlled entity.</span></p><h3><span><br/></span></h3><h3><span>Pillar II: Cloud-Native, Global Service Delivery</span></h3><p><span>The nature of cloud applications—specifically, their sensitivity to latency—demands that networking and security be delivered as close to the endpoint as possible. The edge is the new cloud, and it requires a distributed approach.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE offerings must be purpose-built for </span><strong>scale-out, cloud-native, and cloud-based delivery</strong><span>. This means relying on a vast, globally distributed network of Points of Presence (PoPs) to minimize the physical distance between the user and the security enforcement point.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> The geographical footprint is critical. It is not sufficient to simply run the service on a hyper-scaler with a limited number of PoPs, as this still forces users in remote regions to connect over long distances. A true SASE solution requires providers with a deep, global footprint and the agility to instantiate a PoP in response to emerging customer demands. This optimized, low-latency delivery ensures that security inspection does not negatively impact the performance of real-time applications.</span></p><h3><span><br/></span></h3><h3><span>Pillar III: A Network Designed for All Edges</span></h3><p><span>The traditional network focused almost exclusively on the site (the branch office or the headquarters). The modern enterprise must focus on securing </span><strong>all edges</strong><span> equally—the site, the cloud, and the individual mobile user.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> SASE services must be capable of connecting and securing more than just physical sites. This requires an agent-based capability, managed as a cloud service, that can be installed on laptops and mobile devices to extend the full security stack to the individual user, regardless of their connecting network.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> Offerings that rely solely on on-premises, box-oriented delivery or only cater to a limited number of fixed cloud PoPs will inevitably fail to meet the requirements of an increasingly mobile workforce and emerging latency-sensitive edge applications. A genuine SASE architecture ensures that an employee working from a home office or a client site receives the same level of security and performance optimization as if they were sitting in the corporate headquarters.</span></p><h3><span><br/></span></h3><h3><span>Pillar IV: Identity and Real-Time Condition</span></h3><p><span>This is arguably the most revolutionary pillar of SASE, representing the complete departure from the legacy model.</span></p><p><strong><br/></strong></p><p><strong>The Requirement:</strong><span> Security access and policy enforcement must be based on the </span><strong>user's identity</strong><span> and their real-time context (device type, time of day, location, and posture of the device), not the static IP address.</span></p><p><strong><br/></strong></p><p><strong>The IP Address Conundrum:</strong><span> Anything tied to a physical IP address is useless for security policy enforcement when users and resources are constantly moving. The legacy data center is no longer the center of the network universe. The new center of secure access networking design is the </span><strong>Identity</strong><span>—with the policy following that identity wherever they go.</span></p><p><strong><br/></strong></p><p><strong>The Pragmatic Benefit:</strong><span> SASE allows IT leaders to customize the security level and network experience based on risk. For example:</span></p><ul><li><p><span>A user accessing a critical financial application from a corporate laptop in the office receives </span><strong>full access</strong><span>.</span></p></li><li><p><span>The same user attempting to access that application from an unmanaged personal device (different identity/condition) from a foreign country receives </span><strong>restricted, or zero, access</strong><span>.</span></p></li></ul><p><span>All policies are tied to the user's validated identity (which can be a person, a device, or an IoT entity), eliminating the vulnerability inherent in IP-based enforcement and fully embodying the principles of </span><strong>Zero Trust Network Access (ZTNA)</strong><span>.</span></p><h3><span><br/></span></h3><h3><span>A Pragmatic Call to Action</span></h3><p><span>The introduction of SASE is not marketing buzz; it is a true reflection of our times. The technologies have changed considerably, forcing a profound rethinking of legacy enterprise networks.</span></p><p><span><br/></span></p><p><span>As this market category matures, the marketing noise will continue to grow. Your responsibility as a technology leader is to move past the vendor claims and evaluate potential solutions against these four non-negotiable architectural pillars. If the solution cannot prove a </span><strong>cloud-native, globally converged architecture</strong><span> where policy is tied to </span><strong>identity</strong><span>, it will not deliver the simplicity, scale, or security your business needs to thrive in the cloud-first era.</span></p><p><strong><br/></strong></p><p><strong>KITS: Keep IT Simple.</strong></p></div><div></div>
</div></div><div data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_MJc7eDBKZTKrsZoU1epf0w"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_InOaHn6hN9Y0q2v9O4yaaw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/sase"><span class="zpbutton-content">Learn about &quot;Sassy&quot;</span></a></div>
</div><div data-element-id="elm_sNE3REWav7IN4moRylK3kA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_sNE3REWav7IN4moRylK3kA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_CM4zod7TxypCvspafJfz9w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p>See our other articles about SDWAN and SASE:&nbsp;</p><p><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel="">Redefining Connectivity in the Digital Age</a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age" rel=""><br/></a></p><p><a href="https://www.cloud9advisers.com/News/post/sdwan-call-survivability" rel="">The 'Real' SDWAN Test:</a><a href="https://www.cloud9advisers.com/News/post/sd-wan-and-sase" rel=""></a><br/></p><p><a href="https://www.cloud9advisers.com/News/post/never-trust-and-always-verify" rel="">Never Trust and Always Verify</a></p></div><p></p></div>
</div><div data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_bIxD0GfgDnkGtzPLuDaPyA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 15 Oct 2019 12:47:06 -0500</pubDate></item></channel></rss>