Trust Me – I’m a SASE Solution

January 12, 2023

As we get ready to wish the term SASE a happy 4th birthday, it seems odd that there is still a great deal of confusion in the market about what SASE really is and how it relates to a ‘Zero Trust’ architecture. For many, SASE is a framework for secure network design; for others, it’s seen more as an architectural approach to delivering Zero Trust.

So why do we have this confusion when Gartner defined SASE back in 2019? From my perspective, vendor marketing has caused some of this confusion. Many vendors have adapted their messaging to leverage the hype created around the term SASE and, moreover, how their solutions deliver Zero Trust.

So what is SASE? And can it help deliver a Zero Trust model for your organization? The answer, like so many things in life, is – it depends.

If we break it down, SASE is just a set of technologies you can put together to secure your network and deliver a Zero Trust approach to network security. As your network topology, security policy, and application delivery requirements are unique, how you leverage so-called SASE technologies must be unique to you. Therefore, it is imperative that before embarking on any SASE projects or considering the move to a Zero Trust architecture, you need to know your network and have clearly identified your technical, operational, regulatory, and commercial objectives first.

In my experience, most firms have a really good idea about what their requirements are and, often, what they don’t want. However, as Donald Rumsfeld once said: “As we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know.”

This is where working with a partner, and I emphasize a partner, not a vendor here, to create a detailed Solution Requirements Document (SRD) to ensure that the unknown unknowns are addressed and accounted for when selecting a technology vendor(s) and architecting a solution.

When selecting a technology vendor(s), one key consideration is the importance of consolidation. I have seen some organizations trying to deliver Zero Trust by using Next Generation Firewalls from ‘Vendor A’ in critical locations, layer 4 Firewalls in small offices from ‘Vendor B’, cloud-based proxy services for remote users from ‘Vendor C’, and native security from Cloud and SaaS providers.

The cost and complexity of creating and deploying consistent least privileged access policies for a hybrid workforce in that type of environment does not bear thinking about. Even Gartner now recommends keeping to one or possibly two vendors and predicts that 80% of enterprises will have adopted a strategy to unify web, cloud services, and private application access using a SASE/security service edge (SSE) architecture by 2025.

However, choosing and using a technology are two very different things and while a SASE solution from ‘Vendor A’ and ‘Vendor B’ might tick all the boxes on paper, how they deliver in the real world is often very different. For example, some solutions use a proxy, while others provide inline security functionality. This impacts how least privileged access can be maintained once a session is running. The best approach is to run a Proof of Concept with clearly defined success criteria based on your solution requirements document.

In summary, I can not recommend enough the importance of working with a partner that will help you to understand your network and requirements, work with you to navigate the marketing claims, and engage in a detailed Proof of Concept to verify that you can trust the SASE solution you have chosen.

Find out more about how Teneo can support your SASE strategy.

Author: Brett Ayres, VP of Product, Teneo

Contact us - We’d love to help you





    Teneo collects your personal data when you complete our online forms. We will use this information to provide an accurate response to your questions or requests and we will keep a record of your form completion in our CRM system. By submitting this form, you agree to us contacting you for the purpose of our response. For more information explaining how we use your personal data, please see our Privacy Policy.

    Cookie Policy

    This website uses cookies so we can provide you with the best user experience possible.

    Cookies are small files containing information that enables a website to recognise you. They’re downloaded to the device you use when you visit a website and sent back to that website each time you re-visit, or sent to another website that recognises the same cookie.

    Our cookie policy tells you how and why we use cookies, and how this allows us to improve your online experience. You can read our full Cookie Policy here.

    Strictly Necessary Cookies

    Strictly necessary cookies include session cookies and persistent cookies. Session cookies keep track of your current visit and how you navigate the site. They only last for the duration of your visit and are deleted from your device when you close your Internet browser. Persistent cookies last after you’ve closed your Internet browser and enable our website to recognise you as a repeat visitor and remember your actions and preferences when you return.

    Third Party Cookies

    Third party cookies include performance cookies and targeting cookies. Performance cookies collect information about how you use a website, e.g. which pages you go to most often, and if you get error messages from web pages. These cookies don’t collect information that identifies you personally as a visitor, although they might collect the IP address of the device you use to access the site. Targeting cookies collect information about your browsing habits. They are usually placed by advertising networks such as Google. The cookies remember that you have visited a website and this information is shared with other organisations such as media publishers.

    Keeping these cookies enabled helps us to improve our website and display content that is more relevant to you and your interests across the Google content network.