What makes up SASE network architecture?

December 05, 2022

What_makes_SASE_Network_Architecture_1

Secure Access Service Edge (SASE) is a customised cloud network architecture that can accelerate a company's digital transformation by connecting employees to the internet, cloud services, software and applications - from anywhere in the world. It is a highly secure network platform that is delivered from the cloud edge and provides cutting-edge cyber security to the user's device.

SASE was developed to address the particular needs of businesses in the remote working age. It emphasises security and cloud applications. Modern companies must ensure that their data is both secure and accessible as they migrate from on-premise servers to cloud platforms. It simplifies endpoint protection and enhances the user experience.

SASE network architecture is a cloud-native model, powered by Zscaler, which combines all security functions found in traditional architectures and delivers them from a global, multi-tenant cloud environment with 160 points of presence (PoPs). This reduces IT overheads, provides endpoint cyber security and boosts cloud performance through a purpose-built platform.

How does SASE work?

There are five core components to every SASE network:

  1. Secure web gateway (SWG) - These gateways stop unsecured internet traffic from entering a company’s internal network. An SWG shields employees from malicious traffic, vulnerable websites, viruses, malware and other cyber threats.
  2. Cloud access security broker (CASB) - These brokers prevent malware infections, data leaks and regulatory noncompliance by ensuring the safe use of cloud apps. CASBs secure these apps, which can be hosted on public clouds, private clouds or delivered as software-as-a-service (SaaS).
  3. Firewall-as-a-service (FWaaS) - FWaaS replaces physical firewalls with cloud-based ones that offer next-generation capabilities. These include improved access controls, URL filtering, advanced threat prevention and intrusion prevention.
  4. Zero trust network access (ZTNA) - A zero trust network model ensures that trust is never assumed. Even though network traffic may be coming from within the business, trust is not automatically given. It gives remote workers secure access to internal apps once they have been verified on the network.
  5. Centralised management - This involves managing all of the above services from a centralised console. This eliminates the challenges of policy management, change control, patch management and coordinating network outages.

These pillars serve as the framework for a network that is cloud-based, streamlined and secure. Enterprises stand to benefit from an improved cyber security posture while improving employee productivity, whether they are on-site or working remotely.

As a single-vendor system, this eliminates the need for multiple apps from different companies and also aids in reducing network friction. Since IT teams have a centralised view of the entire network, IT costs are kept to a minimum and network administration is made much easier. For more information or to get a quote for our SASE networking architecture services, email us at marketing@seacom.com or leave us a message.


SEACOM owns Africa’s largest network of information and communications technology (ICT) infrastructure, including fibre optic networks and subsea cables. We offer a wide range of industry-leading scalable ICT solutions for large companies that operate throughout the region.

SEACOM is privately owned - making it adaptable to the needs of the client. We are the preferred ICT and internet connectivity supplier for African enterprises. We can guarantee fast, reliable and secure internet and networking services at affordable prices.

For‌ ‌more‌ ‌information‌ ‌on‌ these solutions, ‌follow‌ ‌us‌ ‌on‌ ‌‌LinkedIn‌,‌ ‌‌Facebook‌ ‌or‌ ‌‌Twitter.‌ ‌Keep‌ ‌an‌ ‌eye‌ ‌on‌ ‌our‌ ‌‌news‌ ‌section‌‌ ‌for‌ ‌industry news and announcements on African ICT, internet connectivity, cloud services and security solutions.

In other news