How Work From Home Shaped the Road to SASE for Enterprises

As SASE adoption grows, with its allure of simplified protection via one network and security experience for hybrid workers, remember: Have an overall plan, integrate and migrate to scale usage, and start small.

Amit Bareket, CEO and Co-Founder, Perimeter 81

November 22, 2022

5 Min Read
Cybersecurity concept art
Source: Anna Berkut via Alamy Stock Photo

Digital transformation is ubiquitous across nearly every sector from tech to healthcare to the public sphere, and the result is a new way of connectivity. Cloud migration, with resources moving from the offices to the cloud, and mobility, employees working outside the office, are both large factors in this transformation and have dissolved the perimeter we once knew. In turn, security needs to keep pace.

Midsize businesses have made themselves agile in protecting data, resources, and users by adopting secure access service edge (SASE) solutions. Gartner first coined the term back in 2019 and adoption was accelerated by pandemic-related closures, since remote access security is covered by SASE. Unlike many other shifts caused by the pandemic, SASE is not a temporary measure.

According to Gallup, 59% of employees prefer to work in a hybrid environment, nearly double the 32% that had the same preference in 2019. The CIO 2022 SASE Market Trends Study reports 94% of IT directors and enterprise leaders said the need to make remote work sustainable for the long term has accelerated their interest and investment in SASE. 

SASE Keeps Hybrid Work Sustainable

Hybrid work is here to stay, and many businesses are adjusting, now running their corporate networks over the Internet to cover both on-premises and remote users. SASE tools — such as secure Web gateways (SWGs) and zero-trust network access (ZTNA) solutions — are a means of protecting those networks.

SASE adoption is still on the rise. According to a report by Dell'Oro Group, SASE saw 30% growth in the second quarter, and SASE spending is on pace to top $6 billion this year. Modern businesses are adapting faster, while legacy enterprises are still planning the migration. 

The road has been paved for them to join the SASE movement. This has been the pattern with other tech trends, similarly to when Slack went from an underground communications tool to a mainstream necessity for all.

What's the best path for large enterprises' road to SASE? Let's look at three steps every business should take along the way.

Understand Your End Goal

It's hard to roll out any plan without a blueprint, including implementing SASE solutions. The objective is to have a unified network and security experience inside and outside the office. That doesn't mean you need to rip and replace all your existing infrastructure, though.

Any SASE vendor should be able to work with the resources you already have as a starting point. You may have even already implemented some of the individual components of SASE, such as a ZTNA tool for remote access, a secure Web gateway, or a cloud access security broker (CASB) to protect employees accessing the Internet and SaaS applications.

Getting all the components in place will properly secure the hybrid environment, which we know is the way of the future. Delaying implementation of these components has a ripple effect and it leaves your business underprotected, which will only cost you down the road.

Integrate and Migrate

Many businesses were forced to address remote access at the beginning of the pandemic, which is a well-documented access point for SASE. The other common challenge that leads businesses to adopt SASE is Internet security. SWGs can help you secure employees' Internet access, even outside of the office.

Some enterprises claim to be satisfied with what they currently have (because they've already invested time and money in these tools), but legacy solutions can't solve today's challenges. SASE gives you the opportunity to integrate and migrate new assets to the cloud so you can start small and scale your usage. It doesn't require many resources to get up and running.

All the SASE components can be delivered via cloud-based software, so there is no overhead cost involved for installing and maintaining hardware solutions in an office that may be empty. This modern approach to security complements the changing business landscape, where employees are moving outside the office and resources are migrating to the cloud.

Start Small

A common pain point for businesses that adopt SASE is how to get started. Don't try to boil the ocean. Begin implementing SASE for a specific group, such as third-party vendors, your developers, or your quality assurance team, then continue with other departments.

Another approach is to implement based on use case. You're setting up a new public cloud environment and want to ensure you have the proper protection, or you decide to just tackle a set of devices that will be doled out to employees. Implementing SASE step by step will keep you from having to boil the ocean. Once you get it right for a specific department or use case, you can easily expand implementation to other areas.

Taking this approach eases what can be an arduous process. Vendors that require installation of hardware on Day 0 only create complexity and add confusion. This is antithetical to the allure of SASE — simplified protection so there is only one network and security experience.

As SASE adoption continues, particularly in the realm of large enterprises, it will require a new mindset. The headaches of legacy hardware needing add-ons and extra configurability to solve modern problems no longer apply. A scalable, cost-efficient, and cloud-based service is the way of the future to provide simple yet comprehensive security no matter how large your business is or where you connect from.

About the Author(s)

Amit Bareket

CEO and Co-Founder, Perimeter 81

Amit Bareket is the CEO and co-founder of Perimeter 81. Amit is a cybersecurity expert with extensive experience in system architecture and software development. He is the author of eight patents issued by the USPTO for storage, mobile applications, and user interface. Prior to Perimeter 81, Amit founded SaferVPN, sold in 2019 to J2 Global, and worked as a software engineer for major enterprises including IBM XIV Storage and BigBand Networks. He served in the Israel Defense Force's elite cyber intelligence unit (Unit 81) and graduated cum laude with a B.Sc. in computer science and economics from Tel Aviv University.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights