• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Secure
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Umbrella and SecureX
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella Package Comparison
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
      • What is Security Service Edge (SSE)
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • Security Definitions
      • What is Secure Access Service Edge (SASE)
      • What is Security Service Edge (SSE)
      • What is a Cloud Access Security Broker (CASB)
      • Cyber Threat Categories and Definitions
    • For Customers
      • Support
      • Customer Success Webinars
      • Cisco Umbrella Studio
  • Trends & Threats
    • Market Trends
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Security

What is Gartner’s SASE model, and how will it affect your security stack?

Author avatar of Chloe WhitakerChloe Whitaker
Updated — February 24, 2023 • 5 minute read
View blog >

The way we think about networking and cybersecurity has changed dramatically in recent years. The rise of remote workers, coupled with the growing push of company data and infrastructure into the cloud, prompted Gartner to outline a new approach to networking and security: Secure Access Service Edge (SASE). Where an organization’s networking and security solutions were once siloed, Gartner’s SASE model converges this critical infrastructure into a single, cloud-delivered service. 

The benefits of a SASE solution – its rapid time to value, its streamlined deployment and management, its cloud-native architecture – speak for themselves. Oftentimes, though, organizations lack the resources to jump straight into upgrading their entire infrastructure. What’s more, today’s SASE vendors  may lack the resources necessary to offer a truly integrated solution. While some vendors can provide an integrated networking and security architecture, others will offer a SASE solution that integrates their own offerings with that of other vendors. For businesses owners and security teams, this usually means that upgrading to Gartner’s SASE framework happens in stages: a security refresh that will eventually lead to a network upgrade or a network refresh that integrates security solutions over time.

While there’s much to be said about the benefits of configuring your network with SASE in mind, today we’ll be focusing on the security elements of a SASE solution. Starting your journey towards SASE by converging your siloed security solutions into a single, cloud-delivered stack can streamline deployment and management for your security team while also enhancing cybersecurity for any remote employees or digital nomads working at your company.

We go into detail on how you can use Cisco Umbrella to streamline cloud security and begin your journey towards Gartner’s SASE architecture in our eBook How to streamline cloud security and embrace SASE. But if you’d like to learn more about what is included in a SASE security stack – and how one of these solutions works – we’ve put together this helpful guide.

The modern cybersecurity landscape

We’ve come a long way since the first ransomware attack crippled a network after being distributed via hand-delivered floppy disks. These days, your network probably isn’t even located in a single place – Gartner forecasts that 51% of global knowledge workers will be full-time remote by the end of 2021.1 And this prediction only factors in full-time remote workers – Forbes reports that 97% of employees would prefer some flexibility when dividing their time between an office building and their home office.2

A graphic that shows stylized industrial buildings, small businesses, homes, and office buildings with arrows connecting them to the cloud. In the cloud, text reads: "SaaS, Office 365, Salesforce, IaaS, AWS, Azure, and Internet" Over the arrows, text reads: 75% of enterprise traffic goes to the internet."

This shift in employee location is enabled by the growing popularity of SaaS, PaaS, and IaaS solutions amongst business leaders. However, while this push to the cloud may streamline business processes, it also leaves sensitive data and company networks vulnerable to bad actors. In fact, security teams often find themselves managing many cybersecurity solutions in order to protect company data stored with third-party providers and accessed over the Internet.

This isn’t easy on SecOps teams. In fact, a 2020 Cisco CISO Benchmark study3 recently revealed that 16% of enterprise security teams field more than 100,000 alerts on a daily basis! With functionality like this, it’s no wonder that many SecOps teams find themselves facing:

  • Gaps in visibility and coverage, leading to inevitable breaches 
  • Slow deployment times, as updating or upgrading multiple cybersecurity solutions requires coordination
  • Limited budgets and resources, since multiple cybersecurity tools require multiple subscriptions

Fortunately for today’s frantic SecOps teams, Gartner’s SASE model presents a solution to these security challenges.

What is the SASE difference?

Think of your cybersecurity stack like a group project – great in theory, but capable of quickly turning into an exercise in frustration. Some of the group members contribute more than others, everyone experiences communication troubles, work gets doubled up on – or forgotten entirely – and no one is entirely sure what they’re supposed to be focusing on. This is the picture of a siloed security stack. 

Siloed security stacks are labor intensive, because moving threat data between multiple security solutions is either difficult or impossible. Your security team has to create policies in multiple systems, some of which are more useful than others. These solutions also generate a barrage of notifications, making it difficult to identify real threats. And at the end of the day, most of the effort is focused on securing company data centers as opposed to securing the cloud, despite the fact that employees spend more time in the cloud on a daily basis. 

Compare this to what a group project should be: a coordinated team where every member performs a unique task, sharing the results with other team members in order to create a focused, optimized, and functional project. This is a security stack built on Gartner’s SASE model.

A graphic that illustrates how a SASE solution interacts provides protection at the cloud edge (where users interact with the Internet, SaaS solutions, and IaaS solutions). Remote workers receive protection through a SASE solution, as do campus/branch, colocation, and hosted data centers which are using integrated SD-WAN fabric.

Gartner defines the SASE concept as “an emerging offering combining [wide-area network] capabilities with comprehensive network security functions…to support the dynamic secure access needs of digital enterprises.”4 In a SASE solution, every element of your security stack comes from the same provider and is designed to fill a specific need. The different security solutions also function together seamlessly. For example, data provided by a robust threat intelligence network can inform a secure web gateway (SWG) to block web activity associated with files hosted on a known malicious domain. If the nature of the files can’t be identified, the SWG can send them to the cloud sandbox to determine their capabilities and block future attempts to connect to the domain if necessary.

Best of all, a security stack built for a SASE solution allows teams to manage all of these functionalities through a single, easy-to-navigate interface. Here, security teams can create and implement policies designed to provide protection at the cloud edge, where most user activities occur. All SASE security functionality is both identity-centric and cloud-native, with security measures focusing on the identity of the user or device instead of on the data center. A zero-trust network access (ZTNA) solution plays an important role here, as it helps determine whether a user should have access to data and applications.

The benefits of Gartner’s SASE security model speak for themselves. They include the:

  • Reduction in cost and complexity of cybersecurity systems
  • Enablement of secure remote and mobile network access
  • Improvement of security across the board by use of consistent policies
  • Improvement of secure, seamless network access for users

So, how does one evaluate whether a cybersecurity solution has all of the components necessary as part of a SASE system?

Understanding the the security parts of a SASE solution

A true SASE system ought to include several different types of threat protection. At minimum, a SASE security stack should include:

  • Secure web gateway (SWG)
  • Cloud access security broker (CASB)
  • Data loss prevention (DLP)
  • Cloud-delivered firewall (FaaS)
  • Zero-trust network access (ZTNA)

For maximum protection and control, however, your SASE security stack should also include:

  • DNS-layer security
  • Remote browser isolation (RBI)
  • Detection for malware in cloud storage
  • Interactive threat intelligence

As mentioned above, all of these security solutions should integrate seamlessly with SD-WAN functionality that comes from the same provider. Additionally, a security team should find it simple to the manage entire system from an easy-to-manipulate and easy-to-understand interface.

This fluid convergence of cybersecurity and networking is what makes Gartner’s SASE security model shine. Ultimately, it’s also what helps many CISOs and security teams go from asking, “What is SASE?” to asking, “How can I get a SASE system for my network?”

Are you ready to update your cybersecurity with a SASE solution?

Download our ebook How to streamline cloud security and embrace SASE today to get the tools you need to evaluate different SASE providers. Or, explore how Cisco Umbrella can streamline your cybersecurity setup by signing up for a free trial.

Learn what to look for in a cloud security solution - Get the ebook

1 Gartner, Gartner Forecasts 51% of Global Knowledge Workers Will Be Remote by the End of 2021. Laurence Goasduff, 22 June 2021.
2 Forbes, 5 Statistics Employers Need to Know About The Remote Workforce. Ashira Prossack, 10 February 2021.
3 Cisco, Cisco 2020 CISO Benchmark Report. 2020. 
4 Gartner, The Future of Network Security Is in the Cloud. 2019.

In a SASE solution, every element of your security stack comes from the same provider and is designed to fill a specific need. The different security solutions also function together seamlessly.

Tweet this quote

Additional Resources

  • Ebook: How to streamline cloud security and embrace SASE
  • Report: TEI study of Cisco Umbrella by Forrester Research

Suggested Blogs

  • Cisco Umbrella Delivered Better Cybersecurity and 231% ROI February 21, 2023 2 minute read
  • Cisco Listed as a Representative Vendor in Gartner® Market Guide for Single-Vendor SASE January 26, 2023 3 minute read
  • How to Evaluate SSE Vendors: Questions to Ask, Pitfalls to Avoid June 23, 2022 5 minute read

Share this blog

FacebookTweetLinkedIn

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2023 Cisco Umbrella