Buyer’s Guide to SASE
Converging a wide swath of network and security components can be a challenge. You need a provider with a broad set of skills, extensive partnerships, and delivery expertise. Here are some key considerations.
SASE takes SD-WANs to the next level with the integration of security and the shift to cloud-native platforms and cloud-management solutions. Implementing a SASE solution must be a top initiative for IT and business leaders.
Zeus Kerravala
Founder and Principal Analyst
ZK Research
SASE Buyer Guide
Multi-cloud companies need a new category of solutions
GET THE GUIDE
of IT leaders express an interest in SASE services
IDG: 2020 SD-WAN Market Trends Survey
Considerations when evaluating solution providers
Unified Security from Top Leaders
It’s difficult for SASE providers to combine multiple security products from a variety of vendors, which explains why many avoid consolidation by building their own security products. However, consolidation is better for clients, because you get proven protections from top leaders.
Reliable Performance
With SASE so dependent on cloud services, network stability is crucial. Most enterprises will want a provider with a service-level agreement (SLA) and high-availability options that connect via multiple last-mile providers to redundant security points of presence and power supplies.
Evolving Innovation
Look for a provider with a roadmap that advances SASE solutions, evolving them with additional security capabilities as well as AI-based technological innovations. Think endpoint protection, machine learning, behavioral analytics, and AI for IT operations.
Cloud Options
SASE should be deployed and managed in the cloud. Components should run on globally distributed infrastructure administered from a centralized, cloud user interface. Also beneficial: the flexibility to deploy firewalls in the cloud or on-premise, as cloud-managed appliances.
Managed Services
By sourcing a SASE solution from a managed service provider, companies can have a turnkey deployment with 24/7 network monitoring and management included, as well as built-in security threat detection and response services.
91%
85%
80%
75%
70%
65%
60%
55%
50%
45%
40%
35%
30%
25%
20%
15%
10%
05%
00%
90%