• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Search
Search
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Security
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Security for Chromebook
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella and Cisco Secure Access Packages
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
      • Cisco Umbrella for Government Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Your SSE journey with Cisco
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
      • Umbrella and Duo Layered Protection
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
        • – FTC Safeguards Rule Compliance 2023
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
      • Cybersecurity Webinars
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is DNS Security
      • What is a Secure Web Gateway
      • What is a Cloud Access Security Broker (CASB)
      • What is Security Service Edge (SSE)
      • What is Secure Access Service Edge (SASE)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Free Trial Quick Start Guide
      • Free Trial Help and Tips
  • Trends & Threats
    • Market Trends
      • Generative AI Cybersecurity Risks and Rewards
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Clearing search keywords
Spotlight

Where Do I Start With SASE Evaluations? Gartner® Report

Author avatar of Yuval YatskanYuval Yatskan
September 10, 2024 • 3 minute read
View blog >

Ransomware makes up 154 million of the threats Cisco blocks monthly; information stealers make up 246 million more. However, the continued evolution of online threats from ransomware and persistent bad actors is only one small piece of the risk management puzzle. Security leaders are not only responding to more sophisticated and expanding threats, but they’re also managing multiple security tools across multiple vendors and dealing with complex network setups across distributed workplaces. More and more, research is showing that complexity increases risk.

The Secure Access Service Edge (SASE) framework provides an answer to these challenges. By combining security and networking into a single, streamlined as-a-Service approach, it delivers advanced protection and connection capabilities from the cloud for hyper-distributed environments. Security service edge (SSE) is the “security side” of SASE – the subset of the SASE structure that focuses on cloud-delivered security capability. But while SASE, and by extension SSE, offers a simplified way to manage and deliver user and network protection, getting started with SASE can be daunting. This Gartner report can help.

Why SASE matters

SASE is transforming the way organizations handle network and security operations. By converging networking and security functions in the cloud, SASE connects users to the applications and data they need, wherever it lives, from wherever they are. SASE offers organizations a streamlined, efficient approach to managing critical security and networking functions, and allows for better integration, reduced complexity, and improved security posture. For security and risk management leaders, understanding and implementing SASE is crucial for building a modern, resilient security foundation and staying ahead of threats.

The Gartner report “Where Do I Start With SASE Evaluations: SD-WAN, SSE, Single-Vendor SASE, or Managed SASE?” offers security and risk management leaders the essential steps to begin their SASE evaluations.

Key insights from the Gartner report

  • Developing a SASE strategy — “Build a long-term SASE strategy first with a goal to consolidate down to a single SASE vendor or two explicitly partnered SASE vendors. Either solution can be done as self-managed or procured from a managed SASE provider.”
  • Evaluating SASE solutions — “Without clear requirements, organizations may evaluate vendors that charge a premium for advanced features that will go unused, or vendors that offer lower cost options but lack key functionality.”
  • Prioritizing key capabilities — “Prioritize two key capabilities to support cyber resilience as part of a long-term SASE framework — automation and orchestration.”
  • Vendor shortlisting — “Organizations that prioritize their requirements can narrow their prospective list of vendors by more than half.“

The number one recommendation from the 2024 Cisco Cybersecurity Readiness Index for security leaders is, “Continue to accelerate investment in protective cybersecurity measures across the board, including adopting a platform approach to ensure all solutions in the security stack can be leveraged to their maximum ability.” This Gartner report can help prioritize the right investments in the right areas for maximum impact.

The convergence of security and WAN edge technologies under the SASE framework offers a powerful solution for modern network and security challenges. Gartner’s “Where Do I Start With SASE Evaluations: SD-WAN, SSE, Single-Vendor SASE, or Managed SASE?” offers insight into evaluating SASE and modernizing network and security operations.

Download the report today.

Clickable banner that reads: Gartner Report: Where Do I Start With SASE Evaluations?

Gartner, Where Do I Start With SASE Evaluations: SD-WAN, SSE, Single-Vendor SASE, or Managed SASE, John Watts, Jonathan Forest, Esraa ElTahawy, 12 April 2024

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

For security and risk management leaders, understanding and implementing SASE is crucial for building a modern, resilient security foundation and staying ahead of threats.

Post this quote

Additional Resources

  • Gartner Report: Where Do I Start With SASE Evaluations?
  • Cisco Umbrella Free Trial

Suggested Blogs

  • Cisco Umbrella: A Leader in the GigaOm Radar for DNS Security June 26, 2024 3 minute read
  • The Perfect Blend: Qdoba’s SASE Transformation May 30, 2023 2 minute read
  • Creating a Cybersecurity Program That Complies With the FTC Safeguards Rule May 9, 2023 4 minute read

Share this blog

FacebookTweetLinkedIn
Subscribe to the Cisco Umbrella blog Subscribe

Follow Us

Facebook X LinkedIn Youtube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2025 Cisco Umbrella