Home SecurityNetwork Security The evolution to Secure Access Service Edge (SASE) is being driven by necessity

The evolution to Secure Access Service Edge (SASE) is being driven by necessity

by ethhack

The WAN consists of network and security stacks, both of which have gone through several phases of evolution. Initially, we began with the router, introduced WAN optimization, and then edge SD-WAN. From the perspective of security, we have a number of firewall generations that lead to network security-as-a-service. In today’s scenario, we have advanced to another stage that is more suited to today’s environment. This stage is the convergence of network and security in the cloud.

For some, the network and security trends have been thought of in terms of silos. However, the new market category of secure access service edge (SASE) challenges this ideology and recommends a converged cloud-delivered secure access service edge.

Gartner proposes that the future of the network and network security is in the cloud. This is similar to what Cato Networks has been offering for quite some time – the convergence of networking and security-as-a-service capabilities into a private, global cloud.

We all know; when we employ anything new, there will be noise. Therefore, it’s difficult to dissect the right information and understand who is doing what and if SASE actually benefits your organization. And this is the prime motive of this post. However, before we proceed, I have a question for you.

Will combining the comprehensive WAN capabilities with comprehensive network security functions be the next evolution? In the following sections, I would like to discuss each of the previous network and security stages to help you answer the same question. So, first, let’s begin with networking.

The networking era

The router

We started with the router at the WAN edge, configured with routing protocols. Routing protocols do not make a decision on global information and are limited to the routing loop restrictions. This restricts the number of paths that the application traffic can take.

Source link

Related Articles

Leave a Comment