SASE Access Architecture Becomes the Future of Cloud Security
Knowledge

SASE Access Architecture Becomes the Future of Cloud Security

Remote access and cloud computing access have become the new normal of global business after the epidemic. Enterprises are faced with many problems such as hybrid cloud configuration, diversified network access, key data security protection, and network access management.
Published: Jul 07, 2021
SASE Access Architecture Becomes the Future of Cloud Security

How to Remote access?

"Remote access" network security protection is the most concerned market. Mobile users access important enterprise applications, transfer key enterprise application data to cloud computing, or enterprise adopts hybrid cloud architecture, all of which connect the network infrastructure. The demand for the integration of online functions and network security functions has emerged. In response to this trend, Gartner has defined a SASE (Secure Access Service Edge) model based on cloud service SD-WAN technology and centered on user identity, which is considered the most important development trend of network security access architecture.

Remote access and cloud computing access have become the new normal of global business after the epidemic. Enterprises are faced with many problems such as hybrid cloud configuration, diversified network access, key data security protection, and network access management. Secure Access Service Edge (SASE) seems to be the best solution for cloud security at present. It integrates the needs of today’s enterprises for the network as a service and information security as a service and integrates comprehensive wide area network WAN functions (including SD-WAN, CDN, etc.) Integrating with network and cloud security functions (such as SWG, CASB, FWaaS, and ZTNA), is based on user identity (maybe specific individuals, branch employees, third-party vendors, specific IoT devices) at the edge of the network. Network access permissions are shunted, and then applications or smart data are accessed directly to corporate data centers or public cloud applications or platforms, instead of importing network traffic to the head office and then transferring it to the cloud, which would increase data transmission risks from attack.

SASE network edge security access service architecture introduction:

Under the impact of the 2020 epidemic, VPN (Enterprise Virtual Private Network) was the first remote access solution for enterprises. However, with the new normal operating model of a remote office, enterprises are accelerating the deployment of many cloud services and applications. With the rapid development of cloud data centers and mobile offices, VPNs are facing great challenges by breaking the familiar network boundary protection. Only by establishing a "trusted" security management model can the user's authentication and authorization be credible, and the information flow and information security risks can be visible, controllable, and manageable.

The Zero Trust network security framework (Zero Trust) believes that any network access requirements should be preset to be untrustworthy, and only after authentication can they be accessed by the management policy authority. However, the zero-trust architecture does not refer to a specific technology, but the concept of application integration of multiple technologies. Therefore, the SASE (Secure Access Service Edge) market has become the best practice for "zero-trust" security in enterprises now.

What is SASE?

SASE is to implement identity management on the terminal equipment and the edge of the network, while network traffic is diverted to the application cloud platform or the data center in the enterprise according to the identity management policy, and the network security functions and equipment are all Built-in cloud solutions. Especially in the long-distance working mode after the epidemic and the advent of the 5G era, this trend will become more and more obvious, and the market demand will continue to grow. Under the new normal, the use of traditional network access mode in this environment will bring very complex network management configuration problems. With SASE architecture, wide area network connection capabilities (such as SD-WAN) and network security protection capabilities (such as SWG, CASB, FWaaS) are integrated, thereby effectively reducing the complexity of network control. Not only can it provide a flexible and expandable network, but it can also provide software-defined security access services based on user rights policies. This flexible network provides unprecedented network visibility and manageability for the security teams of digitally transformed enterprises. The network connection can be precisely specified according to the user identity and the context of the packet content. The security team can provide secure data access, QoS performance, reliability, and security for mobile users, and branch teams, with cloud-based application services, to safely realize the dynamic storage required for digital transformation.

The SASE network edge secure access service architecture has the following characteristics:
  1. Focus on user identity: Network Edge Secure Access Service (SASE) is a new center for using identity as the access decision-making center, not the access authority of the enterprise data center. Therefore, network access permissions are based on identities such as user identity, connected device identification, and application access permissions, rather than the IP address or geographic location of the device as in the past. It is this logic-level conversion of defined policies that greatly simplifies security policy management.
  2. Take the cloud application as the native architecture: The biggest assumption of SASE is that enterprises will gradually cloud important data and services, or directly adopt public cloud SaaS services (such as CRM, Mail, office software...), so they are outside the company. Mobile users or overseas branch offices will not redirect all network traffic back to the headquarters due to the use of VPN, nor will they allow free access to wide-area network services and lose network security protection. SASE makes full use of the main features of cloud computing in its architecture, such as flexibility, self-adjustment, automation, self-healing ability, and self-maintenance.
  3. Simplified architecture of network security equipment and configuration: By integrating secure access services from third-party security product providers, it will effectively reduce the total number of suppliers and reduce the number of physical or virtual security devices in overseas branches. This will reduce the number of agents required on the user’s terminal device. At the same time, the integration of supplier equipment will have the opportunity to use the "single-pass" architecture for network content inspection. Under this architecture, all packets at the network session layer will be decrypted at once and checked once in parallel using multiple security policy engines (FW, IDS) instead of multiple security check engines for serial check, which would increase the delay time. This will provide users with a consistent network access experience no matter where the user is, what site they are visiting, or where the site is located.
SASE architecture is the integration of network services and security services

The SASE architecture represents the structural integration trend of corporate networks and security systems. It is suitable for the trend of remote access and corporate services on the cloud under the current epidemic. It integrates security and network access and can be applied to any type of terminal access method. Enterprises do not need to place an agent on the device, and do not need to connect to the VPN and then reroute all traffic to the Internet. The SASE architecture brings security to each access service. It is estimated that by 2024, at least 40% of enterprises will adopt SASE-based cloud services.

It is not easy to build a complete SASE access service platform, as it requires extensive and diversified technologies. At present, few vendors can provide complete solutions in the market. This technology is still in its infancy, but as cloud services continue to grow, the SASE access service platform will drive the demand for edge computing equipment, and future growth is still expected.

Published by Jul 07, 2021 Source :moea

Further reading

You might also be interested in ...

Headline
Knowledge
Essential for Precision Machining: A Complete Guide to Tungsten Carbide Center Drills
In modern manufacturing, precision is the core standard by which product quality and performance are measured. From aerospace components to medical devices, even a minor deviation can lead to serious consequences. When it comes to precision drilling, a critical challenge is ensuring that a drill bit can be accurately positioned at the start of a cut while maintaining stability during high-intensity operations. The tungsten carbide center drill is the professional tool engineered specifically to solve this problem.
Headline
Knowledge
From Cavitation Effect to Industrial Applications: The Secrets of Ultrasonic Cleaning
When your glasses, tableware, or electronic components are stained with stubborn dirt, what can you do? Traditional methods often require vigorous scrubbing or even harsh chemical solvents, which are not environmentally friendly and may scratch the item. At this moment, ultrasonic cleaning acts like an “invisible little helper”, reaching deep into grooves and gaps to gently yet effectively remove contaminants.
Headline
Knowledge
The “Spark Magician” of Metalworking
Electrical Discharge Machining (EDM) is a non-traditional machining process that removes metal through electrical sparks. Unlike conventional methods, it is not limited by material hardness and can precisely create deep cavities, micro-holes, and complex structures in hardened steel, tungsten carbide, or superalloys. The three main types of EDM include wire cutting, die-sinking, and hole drilling, which are widely applied in mold making, aerospace, automotive, and medical industries. Although EDM has a slower processing speed, works only with conductive materials, and requires consideration of electrode wear and surface treatment, its advantages in high precision, zero cutting force, and superior surface finish make it an indispensable technology in precision manufacturing. Moreover, it continues to evolve in line with the trend toward smart manufacturing.
Headline
Knowledge
Press Brake vs Shearing Machine: Functional and Technical Comparison of Industrial Processing Equipment
Press Brake and Shearing Machine are two essential types of equipment in the field of machine tools, widely used in the processing of metal, wood, and other materials. They play critical roles in manufacturing, enabling efficient and precise material forming and cutting. This article introduces the definitions, functions, technical features, and applications of folding and cutting machines, offering neutral and practical knowledge sharing.
Headline
Knowledge
Master Chuck Types & Selection: The Essential Guide for Machinists
In the world of precision manufacturing, every minute detail can determine the quality of the final product. The chuck is a critical yet often overlooked component—it's not just a tool for holding a workpiece, but the very heart of ensuring machining accuracy, efficiency, and safety. This article will take you on a deep dive into the diverse universe of chucks, covering their operating principles, design philosophies, common types, and how to select the right jaws and chucks for different needs. Whether you're new to the industry or a seasoned engineer, this guide will unlock the intricate secrets of chucks, helping you master every detail on your path to manufacturing success.
Headline
Knowledge
An Overview of Electrical Discharge Machining (EDM)
Electrical Discharge Machining (EDM) is a non-traditional manufacturing process that utilizes electrical sparks to remove material from a workpiece. Unlike conventional machining methods such as milling or turning, which rely on physical contact between a tool and the material, EDM operates without direct contact, making it ideal for processing hard or brittle materials that are difficult to machine otherwise. The process involves generating a series of rapid electrical discharges between an electrode and the workpiece, submerged in a dielectric fluid, which erodes the material through thermal energy. This technique has revolutionized precision manufacturing by enabling the creation of complex geometries with high accuracy.
Headline
Knowledge
Applications of Machine Tools in the Aerospace Industry
The aerospace industry is a highly specialized and technology-driven sector, encompassing the design, manufacturing, and maintenance of aircraft, spacecraft, satellites, and related equipment. Machine tools play a critical role in this field, enabling the precision machining of complex metal and composite material components. These tools enhance production efficiency while ensuring the accuracy and reliability required to meet the stringent safety and performance standards of aerospace. This document outlines the key applications, technologies, benefits, and future trends of machine tools in the aerospace industry.
Headline
Knowledge
Smart Healthcare Uncovered:How AI Is Transforming Clinical Practice?
With the rapid rise of artificial intelligence (AI), the healthcare industry is undergoing a disruptive transformation. AI is significantly improving diagnostic accuracy and treatment efficiency while profoundly redefining healthcare professionals’ roles and patient experiences. A comprehensive understanding of the core technologies and clinical applications behind this transformation is essential for grasping the future trends and strategic directions of smart healthcare.
Headline
Knowledge
Principle and Applications of Laser Cutting Machines
As the global manufacturing industry advances toward higher precision and efficiency, laser cutting technology has become a key enabler of industrial upgrading. Compared with traditional shearing, stamping, and mechanical cutting, laser cutting offers non-contact processing, higher accuracy, and greater flexibility. It significantly improves productivity while reducing secondary finishing. Today, it is widely adopted in metalworking and increasingly applied in electronics, aerospace, medical, and architectural design industries.
Headline
Knowledge
Why Are High-Quality Cutting Fluids Critical for Machining Quality?
In CNC and metalworking, cutting fluid is no longer just a coolant—it plays a critical role by providing lubrication, chip removal, and corrosion protection. With the right formulation and concentration, it can reduce cutting heat, minimize friction, extend tool life, and maintain workpiece accuracy. High-pressure cooling further enhances efficiency in deep-hole and high-speed machining. The pairing of tool material with the proper cutting fluid is equally crucial; correct selection and maintenance ensure process stability, prolong equipment life, and improve the overall work environment. Cutting fluid has become an indispensable investment in modern precision manufacturing.
Headline
Knowledge
Introduction to Emerging Printing Technologies: Opening New Horizons for the Future of Printing
With rapid technological progress and increasingly diverse market demands, traditional printing techniques are no longer sufficient to meet modern industry’s requirements for precision, efficiency, and sustainability. As a result, emerging technologies such as UV printing, 3D printing, and Nanoimprint Lithography (NIL) have risen to prominence, offering solutions with higher precision, broader applications, and lower production costs. These innovations have already demonstrated value across packaging, advertising, healthcare, semiconductors, and construction. In the following sections, we will explore their technical features and real-world applications, highlighting the advantages and future potential of these cutting-edge printing technologies.
Headline
Knowledge
The Core Standard for Life-Critical Systems: A Complete Guide to IPC Classification
In high-risk fields such as medical, aerospace, and automotive, IPC classifications determine PCB reliability and safety. Class 3 represents the highest standard, requiring zero tolerance for defects, complete via filling, adequate copper annular rings, and rigorous inspections to ensure operation under extreme conditions, while Class 2 suits long-term use in non-critical equipment with minor cosmetic flaws allowed. Class 3’s strict criteria cover component placement, soldering, plating thickness, and environmental testing—adding cost and production time, but far outweighing the risks of failure in life- or safety-critical systems. Thus, defining high-risk equipment as Class 3 during design is essential, making IPC classification a core safeguard rather than an option.
Agree