{"id":7837,"date":"2024-09-17T17:08:54","date_gmt":"2024-09-17T15:08:54","guid":{"rendered":"https:\/\/www.ensec.ch\/managed-it-security\/was-ist-sase\/"},"modified":"2024-12-17T13:06:09","modified_gmt":"2024-12-17T12:06:09","slug":"was-ist-sase","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/managed-it-security\/was-ist-sase\/","title":{"rendered":"What is SASE"},"content":{"rendered":"<h1>Secure Access Service Edge SASE<\/h1>\n<h2>Optimised networks and security for all applications, users and locations \u2013 on a single, central platform.<\/h2>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<ul>\n<li>\n        <a href=\"\">Navigation:<\/a>\n    <\/li>\n<li>\n        <a href=\"#vorteile\">Advantages<\/a>\n    <\/li>\n<li>\n        <a href=\"#funktion\">Functional principle<\/a>\n    <\/li>\n<li>\n        <a href=\"#bestandteile\">Components<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<h2>What is SASE?<\/h2>\n<div>\n<p>The acronym SASE stands for &#8220;Secure Access Service Edge&#8221; and refers to a cloud-based solution that combines network and security functions in a single integrated service. It combines SD-WAN (Software-Defined Wide Area Network) with SSE (Secure Service Edge) functions such as secure web gateway, Zero Trust Network Access (ZTNA), Firewall as a Service, Cloud Access Security Broker (CASB) and more.<\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security_02.jpg\" alt=\"\"><\/p>\n<h3>The seven most important use cases for SASE<\/h3>\n<p>eBook Download<\/p>\n<p><a href=\"#\">Download now<\/a><\/p>\n<\/div>\n<h2>What advantages does SASE offer?<\/h2>\n<div>\n<p>The aim of SASE solutions is to ensure secure connectivity while reducing the complexity of security applications.<\/p>\n<\/div>\n<hr>\n<h3>Reduced complexity<\/h3>\n<div>\n<p>Combining security functions, for which a number of individual products from different manufacturers are traditionally used, with a single integrated and cloud-based solution significantly reduces complexity. This can massively reduce operating costs.<\/p>\n<\/div>\n<hr>\n<h3>Increased security<\/h3>\n<div>\n<p>With the increasing use of cloud services and remote employees, the attack surface has grown. SASE offers a comprehensive security solution designed to support and secure these scenarios. This protects data and applications from threats and unauthorised access, while functions such as ZTNA also secure remote access to company resources.<\/p>\n<\/div>\n<hr>\n<h3>Bessere Performance<\/h3>\n<div>\n<p>Traditional network architectures can be overloaded by increasing data traffic and the use of cloud services. SASE optimises network performance through the use of SD-WAN and the provision of security functions at the edge.<\/p>\n<\/div>\n<h2>The functional principle of SASE<\/h2>\n<div>\n<p><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/ensec_sase_funktionsprinzip.png\" alt=\"SASE functional principle diagram\"><\/p>\n<h3>United in one platform<\/h3>\n<p>SSE and SD-WAN<\/p>\n<div>\n<p>SASE combines network and security-as-a-service functions in one cloud platform. By consolidating these functions, companies can greatly simplify their security architecture while improving the security and performance of their networks. Expensive MPLS solutions can also be replaced.<\/p>\n<\/div>\n<\/div>\n<h2>What are the components of SASE?<\/h2>\n<ul>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/09\/mss_managed-sase_sse.svg\" alt=\"\"><\/p>\n<h3>SSE &#8211; Secure Service Edge as a Service<\/h3>\n<div>\n<p>Enables organisations to apply end-to-end security from the cloud and ensure access to applications distributed across multiple clouds, data centres and software-as-a-service applications.<\/p>\n<p>SSE extends security services to the edge of the network, closer to the user and device. This proximity improves performance, reduces latency and improves the overall user experience while ensuring security at the point of access.<\/p>\n<p>An SSE solution, when combined with an advanced SD-WAN, creates a SASE architecture that significantly improves the quality of experience for end users of applications hosted in the cloud.<\/p>\n<p>The following security aspects are typically integrated into an SSE solution:<\/p>\n<ul>\n<li>Zero Trust Network Access (ZTNA)<\/li>\n<li>Secure Web Gateway<\/li>\n<li>Secure Mail Gateway<\/li>\n<li>Firewall as a Service<\/li>\n<li>Data Loss Prevention (DLP)<\/li>\n<li>Cloud Access Security Broker (CASB)<\/li>\n<li>Remote Browser Isolation<\/li>\n<li>Extended Detection and Response (XDR)<\/li>\n<\/ul>\n<\/div>\n<\/li>\n<li>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/09\/sd-wan.svg\" alt=\"\"><\/p>\n<h3>Secure SD-WAN as a Service<\/h3>\n<div>\n<p>SD-WAN stands for Software Defined Wide Area Network. It is a technology that simplifies network management and operation by using software to control and manage WAN connections. Essentially, SD-WAN separates the control plane from the data traffic and enables centralised management and configuration of WAN resources.<\/p>\n<p>Most enterprise networks utilise legacy carrier services such as managed MPLS, which are expensive and take weeks or months to set up. Even small changes by the service provider are often associated with long waiting times.<\/p>\n<p>SD-WAN technology offers a solution here by enabling flexibility and cost efficiency for IT networks. It connects locations via multiple internet connections and bundles them in an encrypted overlay. Guidelines, application-oriented routing and dynamic connection evaluation optimise the use of existing Internet connections.<\/p>\n<p>In addition, one of our SASE partners offers a last-mile service. The monitoring and management service for the last mile is operated from a Network Operation Centre (NOC) set up specifically for this purpose. The service monitors the SASE sockets and offers<br \/>Real-time detection of connection failures or degradations, proactive opening of tickets with the ISP and follow-up until the connection service is restored.<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p>\n    <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Secure Access Service Edge SASE\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Optimised networks and security for all applications, users and locations \\u2013 on a single, central platform.\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Call now\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\",\"modified\":\"2021-07-13T19:31:48.139Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"60\",\"css\":\".el-section {\\n\\tmargin-bottom:130px;\\n}\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"subnav\",\"props\":{\"subnav_style\":\"divider\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"active\":true,\"content\":\"Navigation:\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Advantages\",\"link\":\"#vorteile\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Functional principle\",\"link\":\"#funktion\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Components\",\"link\":\"#bestandteile\"}}]},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]}],\"props\":{\"column_gap\":\"large\"}},{\"type\":\"row\",\"props\":{\"column_gap\":\"large\",\"layout\":\"2-3,1-3\",\"margin\":\"large\",\"row_gap\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"What is SASE?\",\"id\":\"funktionsprinzip\",\"maxwidth\":\"2xlarge\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>The acronym SASE stands for \\\"Secure Access Service Edge\\\" and refers to a cloud-based solution that combines network and security functions in a single integrated service. It combines SD-WAN (Software-Defined Wide Area Network) with SSE (Secure Service Edge) functions such as secure web gateway, Zero Trust Network Access (ZTNA), Firewall as a Service, Cloud Access Security Broker (CASB) and more.<\\\/p>\",\"margin\":\"\",\"text_align\":\"left\",\"text_style\":\"lead\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"}}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"name\":\"eBook download \\u2013 einzeln\",\"type\":\"panel\",\"props\":{\"block_align\":\"center\",\"content\":\"\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"small\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-image {\\n\\tborder-radius:15px 0 0 15px;\\n}\\n\\n\\n.el-element a {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-element:hover {\\n   \\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n    transition:0.5s;\\n}\\n\\n.el-element:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security_02.jpg\",\"image_align\":\"left\",\"image_grid_breakpoint\":\"s\",\"image_grid_width\":\"2-5\",\"image_height\":800,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":800,\"link\":\"#\",\"link_margin\":\"medium\",\"link_size\":\"large\",\"link_style\":\"secondary\",\"link_text\":\"Download now\",\"margin\":\"default\",\"meta\":\"eBook Download\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"text-meta\",\"panel_expand\":\"image\",\"panel_image_no_padding\":true,\"panel_link\":true,\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"title\":\"The seven most important use cases for SASE\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_margin\":\"small\"}}]}],\"props\":{\"margin\":\"xlarge\",\"row_gap\":\"large\"}}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"60\",\"css\":\".el-section {\\n\\tmargin-bottom:130px;\\n}\",\"id\":\"vorteile\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":false,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"What advantages does SASE offer?\",\"margin\":\"large\",\"margin_remove_bottom\":true,\"maxwidth_breakpoint\":\"m\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"column_divider\":false,\"content\":\"\n\n<p>The aim of SASE solutions is to ensure secure connectivity while reducing the complexity of security applications.<\\\/p>\",\"margin\":\"default\",\"text_align\":\"left\",\"text_style\":\"lead\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"id\":\"vorteile\",\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"1-3,1-3,1-3\",\"margin\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\",\"margin\":\"default\",\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"content\":\"Reduced complexity\",\"margin_remove_top\":true,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Combining security functions, for which a number of individual products from different manufacturers are traditionally used, with a single integrated and cloud-based solution significantly reduces complexity. This can massively reduce operating costs.<\\\/p>\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\",\"margin\":\"default\",\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"content\":\"Increased security\",\"margin_remove_top\":true,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>With the increasing use of cloud services and remote employees, the attack surface has grown. SASE offers a comprehensive security solution designed to support and secure these scenarios. This protects data and applications from threats and unauthorised access, while functions such as ZTNA also secure remote access to company resources.<\\\/p>\",\"margin\":\"default\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"small\",\"margin\":\"default\",\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"content\":\"Bessere Performance\",\"margin_remove_top\":true,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Traditional network architectures can be overloaded by increasing data traffic and the use of cloud services. SASE optimises network performance through the use of SD-WAN and the provision of security functions at the edge.<\\\/p>\",\"margin\":\"default\"}}]}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-right-medium\",\"animation_delay\":\"100\",\"id\":\"funktion\",\"image_position\":\"center-center\",\"padding\":\"large\",\"style\":\"primary\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"The functional principle of SASE\",\"margin\":\"large\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"name\":\"Panel Slider Image Left\",\"type\":\"panel-slider\",\"children\":[{\"type\":\"panel-slider_item\",\"props\":{\"content\":\"\n\n<p>SASE combines network and security-as-a-service functions in one cloud platform. By consolidating these functions, companies can greatly simplify their security architecture while improving the security and performance of their networks. Expensive MPLS solutions can also be replaced.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/ensec_sase_funktionsprinzip.png\",\"image_alt\":\"SASE functional principle diagram\",\"meta\":\"SSE and SD-WAN\",\"title\":\"United in one platform\"}}],\"props\":{\"container_padding_remove\":true,\"content_column_breakpoint\":\"m\",\"icon_width\":80,\"image_align\":\"left\",\"image_grid_breakpoint\":\"s\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"1-2\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"900\",\"link_margin\":\"large\",\"link_style\":\"text\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"remove\",\"meta_style\":\"h4\",\"nav\":\"dotnav\",\"nav_align\":\"left\",\"nav_breakpoint\":\"\",\"nav_margin\":\"medium\",\"panel_card_offset\":true,\"panel_image_no_padding\":true,\"panel_link\":false,\"panel_match\":true,\"show_content\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"slidenav\":\"outside\",\"slidenav_breakpoint\":\"xl\",\"slidenav_margin\":\"medium\",\"slidenav_outside_breakpoint\":\"xl\",\"slider_autoplay_pause\":true,\"slider_center\":false,\"slider_finite\":true,\"slider_gap\":\"large\",\"slider_sets\":true,\"slider_width\":\"fixed\",\"slider_width_default\":\"1-1\",\"slider_width_medium\":\"4-5\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":true,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]},{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"}}]}],\"name\":\"Funktionsprinzip\"},{\"type\":\"section\",\"props\":{\"animation\":\"slide-left-medium\",\"animation_delay\":\"100\",\"id\":\"bestandteile\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/04\\\/seekarte_hintergrund-02.svg\",\"image_position\":\"top-right\",\"image_size\":\"contain\",\"padding\":\"large\",\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"\"},\"children\":[{\"type\":\"row\",\"props\":{\"width\":\"large\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"What are the components of SASE?\",\"margin\":\"large\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_end\":\"70vh + 70%\",\"parallax_opacity\":\"0.3,1\",\"parallax_y\":\"30,0\",\"text_align\":\"left\",\"title_element\":\"h2\",\"title_style\":\"heading-small\"}},{\"name\":\"Accordion Image Left\",\"type\":\"accordion\",\"children\":[{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>Enables organisations to apply end-to-end security from the cloud and ensure access to applications distributed across multiple clouds, data centres and software-as-a-service applications.<\\\/p>\\n\n\n<p>SSE extends security services to the edge of the network, closer to the user and device. This proximity improves performance, reduces latency and improves the overall user experience while ensuring security at the point of access.<\\\/p>\\n\n\n<p>An SSE solution, when combined with an advanced SD-WAN, creates a SASE architecture that significantly improves the quality of experience for end users of applications hosted in the cloud.<\\\/p>\\n\n\n<p>The following security aspects are typically integrated into an SSE solution:<\\\/p>\\n\n\n<ul>\\n\n\n<li>Zero Trust Network Access (ZTNA)<\\\/li>\\n\n\n<li>Secure Web Gateway<\\\/li>\\n\n\n<li>Secure Mail Gateway<\\\/li>\\n\n\n<li>Firewall as a Service<\\\/li>\\n\n\n<li>Data Loss Prevention (DLP)<\\\/li>\\n\n\n<li>Cloud Access Security Broker (CASB)<\\\/li>\\n\n\n<li>Remote Browser Isolation<\\\/li>\\n\n\n<li>Extended Detection and Response (XDR)<\\\/li>\\n<\\\/ul>\",\"image\":\"wp-content\\\/uploads\\\/2024\\\/09\\\/mss_managed-sase_sse.svg\",\"title\":\"SSE - Secure Service Edge as a Service\"}},{\"type\":\"accordion_item\",\"props\":{\"content\":\"\n\n<p>SD-WAN stands for Software Defined Wide Area Network. It is a technology that simplifies network management and operation by using software to control and manage WAN connections. Essentially, SD-WAN separates the control plane from the data traffic and enables centralised management and configuration of WAN resources.<\\\/p>\\n\n\n<p>Most enterprise networks utilise legacy carrier services such as managed MPLS, which are expensive and take weeks or months to set up. Even small changes by the service provider are often associated with long waiting times.<\\\/p>\\n\n\n<p>SD-WAN technology offers a solution here by enabling flexibility and cost efficiency for IT networks. It connects locations via multiple internet connections and bundles them in an encrypted overlay. Guidelines, application-oriented routing and dynamic connection evaluation optimise the use of existing Internet connections.<\\\/p>\\n\n\n<p>In addition, one of our SASE partners offers a last-mile service. The monitoring and management service for the last mile is operated from a Network Operation Centre (NOC) set up specifically for this purpose. The service monitors the SASE sockets and offers<br \\\/>Real-time detection of connection failures or degradations, proactive opening of tickets with the ISP and follow-up until the connection service is restored.<\\\/p>\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/09\\\/sd-wan.svg\",\"title\":\"Secure SD-WAN as a Service\"}}],\"props\":{\"collapsible\":false,\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tfont-size:2.3vh;\\n    padding-bottom:15px;\\n}\\n\\n.el-image {\\n\\tmargin-top:10px;\\n}\\n\\n.el-content {\\n\\tmax-width:80%;\\n}\\n\\n.uk-child-width-expand {\\n\\tpadding-bottom:50px;\\n}\",\"image_align\":\"left\",\"image_border\":\"rounded\",\"image_grid_breakpoint\":\"s\",\"image_grid_width\":\"1-4\",\"image_height\":\"200\",\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_vertical_align\":false,\"image_width\":\"250\",\"link_margin\":\"small\",\"link_style\":\"text\",\"link_text\":\"Read more\",\"margin\":\"default\",\"margin_remove_top\":false,\"multiple\":false,\"show_image\":true,\"show_link\":true,\"title_element\":\"h3\"}}]}]}],\"name\":\"Bestandteile\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"100\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":true,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\",\"title_style\":\"h1\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"ensec \\u2013 Call to action\"}],\"version\":\"4.4.16\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Secure Access Service Edge SASE Optimised networks and security for all applications, users and locations \u2013 on a single, central platform. Our IT security experts will be happy to advise you. Call now Navigation: Advantages Functional principle Components What is SASE? The acronym SASE stands for &#8220;Secure Access Service Edge&#8221; and refers to a cloud-based [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7803,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7837","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7837"}],"version-history":[{"count":8,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7837\/revisions"}],"predecessor-version":[{"id":7857,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7837\/revisions\/7857"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7803"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}