Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How Secure Access Service Edge (SASE) Enables New Edge Computing Paradigms
Edge Computing

How Secure Access Service Edge (SASE) Enables New Edge Computing Paradigms

Leonard LeeBy Leonard LeeFebruary 7, 20232 Mins Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email

In episode 16 of The Cutting Edge Podcast, Leonard Lee discusses the secure access service edge (SASE) framework and describes the concept within the context of edge computing.

Highlights

00:49 — In principle, SASE is about enabling secure, anywhere, anytime access from any device, according to Gartner, the research firm that coined the term, acronym, and concept back in 2019. In practice, SASE is a conceptual architecture; think of it as a cloud-managed, enterprise-wide area network that supports any access modality. Further, it leverages advancements in cloud computing and provides tools for implementing zero trust frameworks.

02:19 — Leonard has identified five core SASE capabilities:

  1. Software-defined wide-area network
  2. Secure web gateway (SWG)
  3. Cloud access service breaker (CASB)
  4. Firewall-as-a-Service
  5. Zero trust network access

04:46 — Vendors approach the implementation and interpretation of SASE in product portfolios differently from other vendors. Some of the prominent SASE players are Netskope, McAfee, and Palo Alto Networks. Leonard says these vendors are trying to create the ERP of networking and security for the enterprise.

05:44 — What does SASE have to do with edge computing? SASE sits on top of the access network, enabling new edge paradigms, and providing users and endpoint devices with secure access to a fast, expanding range of cloud and on-premise applications.

06:21 — Leonard says this provides IT organizations with integrated, flexible security and network management features that give users access to enterprise resources that they may not have had before.

Key Takeaways for C-suite

07:31 — SASE is a relatively difficult transformation journey for many IT organizations that have a long legacy of “older stuff” in their data centers and networks. Only a small fraction of enterprises have migrated to the cloud — most organizations will have “a long journey writing up the SASE maturity curve,” notes Leonard.

08:15 — SASE is expensive, and it can be hard to find a vendor that can deliver against “the future state of SASE.” Leonard encourages organizations to find a partner to support their SASE journey.


Watch more cutting edge episodes

Cutting Edge Cybersecurity edge computing security The Cutting Edge Podcast zero trust
Share. Facebook Twitter LinkedIn Email
Analystuser

Leonard Lee

Managing Director & Founder
neXt Curve

Areas of Expertise
  • Cybersecurity
  • Edge Computing
  • Website
  • LinkedIn

Leonard Lee is an Acceleration Economy Analyst focusing on Edge Computing for the enterprise market and founder/managing director of neXt Curve, a research advisory firm focused on cross-domain ICT technology and industry research. neXt Curve advises some of the leading technology companies, regulators and enterprises. Leonard has 30 years of experience as a management consultant and industry analyst, Mr. Lee is a former managing partner with Gartner Inc. and partner/principal with IBM and PwC who has advised and delivered emerging technology and digital business solutions to leading enterprises across a broad range of industries and has worked closely with numerous Global 500 companies in driving business innovation and value through digital technologies and reinvention.

  Contact Leonard Lee ...

Related Posts

Google Cloud’s Sovereignty Explorer: Why Aren’t There More Tools Like This?

March 29, 2023

Why Vendors and CIOs are Moving Towards Data Lakehouses

March 29, 2023

Why It’s Time to Move Away From Microsoft Excel to Low-Code/No-Code and RPA Tools

March 29, 2023

Chainguard Research Highlights How Customers Secure Software Supply Chains

March 29, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Google Cloud’s Sovereignty Explorer: Why Aren’t There More Tools Like This?
  • Why Vendors and CIOs are Moving Towards Data Lakehouses
  • Why It’s Time to Move Away From Microsoft Excel to Low-Code/No-Code and RPA Tools
  • Chainguard Research Highlights How Customers Secure Software Supply Chains
  • Google Cloud Simplifies Sovereignty

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.