SASE 101:: Getting Started Guide
SASE 101:: Getting Started Guide
The Palo Alto Networks SASE Platform . . . . . . . 12 There is not much consistency between vendors on
The Perimeter 81 SASE Platform . . . . . . . . . . . . . 15 what a SASE service should and could be, because
the technology is so early in its development and not
The Zscaler SASE Platform . . . . . . . . . . . . . . . . . . 17
standardized. That said, the Gartner description is the
closest there currently is to a standard.
About SDxCentral
SDxCentral is the leading resource for IT infrastructure
knowledge.
SD-WAN features, like bandwidth optimization and In other words, the functions that used to be executed
traffic prioritization, are used by SASE. However, in by point solutions are integrated into one cloud-native
an SD-WAN, virtualized devices spread throughout software stack. And since the engines in the software
the WAN execute these features. In SASE, the cloud stack are all from the same vendor, the data does not
or a security agent on an end user’s computer makes have to spend the time being sent back and forth
networking decisions, such as where to send different between vendor products.
applications’ traffic.
What is SASE: Key Takeaways
An element of SASE that sets it apart from SD-WAN
1. The analyst firm Gartner coined the term secure
is how it inspects traffic in an organization’s network.
access service edge in a 2019 Hype Cycle report.
Instead of using service-chained point solutions, as
SD-WAN does, SASE runs all security functions at once 2. SASE is a network architecture that integrates WAN
in multiple policy engines that make up a cloud-native capabilities with cloud-native security functions.
software stack.
3. With SASE, security services and networking
“Let’s say there’s an attachment in a conversation functions are run in the cloud or a security agent on
stream,” MacDonald said, “Now, you want to open up the end user’s device.
that attachment and inspect for sensitive data. That
4. SASE uses a software stack in the cloud to run
could be a point solution. But likewise, you might
multiple security functions on data at once in
want to take that same content and inspect it for
multiple engines.
malware. That’s another point solution. So what you
start to realize is, if you’re in these packets and in
these attachments, why daisy chain a bunch of point
solutions? It’s just going to slow you down. Why go
looking for patterns of goodness, and then jump to
another point solution look for patterns of badness?
Why don’t we do both at the same time? … Only open
the conversation once and do all of the things that you
need to do.”
• How traffic inspection is done SD-WAN technology was not designed with a focus
on security. Security is often delivered via secondary
SASE, SD-WAN, and the Cloud
features or by third-party vendors. While some
SASE uses one or more of the following: private data SD-WAN solutions do have baked-in security, this is not
centers, the public cloud, and colocation facilities. These in the majority. SD-WAN’s central goal is to connect
geographically separate offices to each other and to a Despite the different formats of the two infrastructures,
central headquarters, with flexibility and adaptability to they are both still virtualized. SD-WAN and SASE do
different network conditions. In an SD-WAN, security not rely on fixed-function proprietary boxes like a
tools are usually located at offices in CPE rather than on non-virtualized WAN. As previously stated, SASE runs
devices themselves. Networking decisions in an SD-WAN security and networking functions in a cloud or other
are made in the virtualized networking devices that are data center and in a security agent. For SD-WAN, the
spread throughout the network. network nodes, as well as the CPE, are software-defined.
In other words, the functions are running as software.
SASE vs SD-WAN Traffic Inspection
How Vendors are Selling SASE and SD-WAN
With SASE networks, traffic is opened up one time
and inspected by multiple policy engines at once. SASE is still an emerging technology. And to reflect that,
The engines run in parallel without passing the traffic many vendors are beginning to offer a SASE solution in
between them. This saves time because the traffic isn’t addition to their SD-WAN solution, or at least claiming
repeatedly accessed as it is passed from one security that what they have is SASE. For example, Cisco,
function to the next as is the case in an SD-WAN. VMware VeloCloud, and Open Systems are all practicing
Additionally, these policy engines do as much, if not this; among many others.
more, than the security tools in an SD-WAN.
There are other organizations that have put their
SD-WAN uses service chaining. Service chaining is where resources more into developing and deploying SASE
traffic is inspected by one security function at a time, services over SD-WAN. For example, Palo Alto and Cato
one after the other. These individual functions handle Networks.
one type of threat and are called point solutions. Each
SASE vs SD-WAN: Key Takeaways
point solution opens up the traffic, inspects it, closes it
up, and then forwards it to the next point solution until 1. SASE and SD-WAN are two different networking
the traffic has passed through all point solutions. technologies that use different means to get to
similar ends.
Similarities Between the Two Networking
Technologies 2. Both technologies are meant to connect
geographically distributed organizations in a flexible
Despite serving similar ends, SASE and SD-WAN do
and adaptable manner.
not have many architectural similarities. Some higher-
level similarities include how they are both wide-area 3. A SASE network is focused on providing cloud-
networks and their virtualized infrastructure. native security tools and has the cloud at the center
of the network.
Both SD-WAN and SASE are designed to cover a large
geographic area. What is different is in the infrastructure. 4. SD-WAN technology is focused on connecting
SASE’s infrastructure has private data centers, offices to a central headquarters and data center,
colocation facilities, or a cloud acting as endpoints. though it can also connect users directly to the
These are where the networking, optimization, and cloud.
security functions run. In an SD-WAN these functions run
in boxes at a branch and headquarters. Both SASE and
SD-WAN can be controlled from anywhere.
When Gartner coined SASE, Cato was offering an The Cato NGFW segments the LAN. No traffic can move
SD-WAN product that was converged with security between different segments. LAN connections can be
and delivered through a distributed network of PoPs. established through local segmentation rules and are
This was very close to SASE’s definition. This article will enforced by Cato Socket, the Cato local appliance.
look at the security services in Cato’s SASE platform, its Alternatively, WAN firewall rules can be enforced by the
network backbone, and edge appliances. Cato Cloud that performs full traffic inspection.
Cato SASE Platform Security as a Service The WAN firewall is also used by security administrators
to allow or block traffic between points in the
The Cato SASE platform has many security services.
organization’s network. If administrators prefer, it is
They are built directly into the cloud network and are
possible to blacklist certain types of traffic.
a tightly-integrated software stack. That architecture
puts the platform squarely within the Gartner definition The firewall applies rules that allow or block traffic
where multiple networks must be involved and the heading between network points. The firewall’s default
security functions must be integrated into one stack. state is to blacklist types of traffic. To block access,
Cato’s current services include: administrators must define rules that explicitly block
The deep packet inspection engine in the NGFW The deep packet inspection looks closely at both
classifies application traffic as early as the first packet, encrypted and unencrypted traffic. Files are taken out of
without performing secure socket layer (SSL) inspection. the traffic stream, inspected, and blocked if needed.
It uses information taken from network metadata and
True filetype detection is able to determine the actual
information that is correlated with the Cato Research
type of file traveling on the network no matter what the
Labs application database.
file extension or content-type header is. This tool is used
The user awareness capability is a combination of to combat evasion tactics used by attackers to mask
identity access management (IAM) and role-based high-risk file types.
The malware detection and prevention service has a from a country considered to be high-risk for attacks.
multi-featured engine that uses heuristics to review The IPS can do this because it has policies that use the
digital signatures. In this case, heuristics refers to the geolocation of traffic sources and destinations.
detection of malware based on contextual information
Finally, the Cato SASE IPS is able to detect and prevent
and the SASE system’s prior knowledge of existing
network scans with network behavioral analysis.
suspicious sites and attack methods. Threats reported
by global threat intelligence databases keep the Global PoP Network Backbone
engine up to date on possible threats. Cato partnered
As of this writing, there are over 50 PoPs in Cato’s global
with SentinelOne for machine learning and artificial
private network. All of the PoPs are able to run the Cato
intelligence (AI) technology. SentinelOne is able to
SASE platform cloud-native software stack. That stack
identify and block unknown malware.
executes all of the security functions mentioned above
The processing of these three anti-malware services and the networking services mentioned below. Multiple
happens in parallel during traffic inspection. This means customers can use a single PoP.
the traffic is opened up for inspection once, and all
The architecture of the network connects customers
services review it at the same time. By doing that instead
to the backbone via encrypted tunnels from a Cato
of one security function at a time, inspection takes
Socket — a zero-touch edge SD-WAN appliance —
less time. Parallel inspection is a key element of SASE
or from the device if it can use IPsec tunnels. Cloud
services, as defined by Gartner.
data centers connect to the network with an agent or
Intrusion Prevention System agentless configuration. Having both a private network
and a cloud network is a fundamental aspect of a SASE
The Cato SASE platform IPS is multi-layered. It offers
service, as defined by Gartner.
services covering behavioral signatures, reputation
feeds, protocol validation, known vulnerabilities WAN optimization is one of the networking services
protection, malware communication, geolocation, and available through a Cato SASE PoP. It uses TCP proxies
network behavioral analysis. and congestion management algorithms for the
optimization of key operations like file transfers.
Behavioral signatures are when the IPS searches for
deviations from the expected system or user behavior. The Cato PoP network has routing algorithms that factor
in latency, packet loss, and jitter to get traffic to and
Reputation feeds are collections of Cato’s and others’
from its destination optimally, favoring performance over
intelligence feeds that detect and alert organizations to
cost of transmission.
compromised resources. Feeds are updated hourly.
The connections between PoPs are completely
Protocol validation is when the IPS validates that
encrypted. Cato states that the strongest industry-
packets conform to protocols, which reduces the chance
standard ciphers are used.
of attack from exploits using anomalous traffic.
Cato Socket
Protection from known vulnerabilities means the IPS can
defend against common vulnerabilities and exposures. The Cato edge SD-WAN device, Cato Socket, is meant
The IPS can rapidly adapt when new vulnerabilities are for branch offices and data centers.
discovered, integrating the knowledge into the deep
The Cato Socket is capable of link aggregation, dynamic
packet inspection engine.
path selection, application identification, bandwidth
The IPS uses reputation feeds and network behavioral management, packet loss mitigation, and routing
analysis to stop outbound traffic from reaching protocol integration.
command and control servers used to spread malware.
Link aggregation makes MPLS, fiber, DSL, cable, and
The Cato SASE IPS can stop traffic if it is heading to or cellular connections available for traffic to use.
Cato Socket has dynamic path selection capabilities Cato SASE Platform: Key Takeaways
where traffic is routed optimally depending on the
1. The Cato SASE platform has an integrated cloud-
application, user, and the connection quality.
native security software stack that includes NGFW,
More critical applications passing through a Cato Socket SWG, anti-malware, and IPS services.
device always receive prioritized bandwidth capacity. All
2. The Cato SASE network consists of over 50 points of
other applications are served on a best-effort basis.
presence and cloud networks as well.
When a connection falters, packet loss mitigation
3. Cato Socket is an appliance for branches and data
ensures traffic is switched to better-performing links. At
centers that offers connection through multiple
the same time, packets can be proactively duplicated.
mediums including MPLS, DSL, and cellular
Routing protocol integration in the Cato Socket uses connections.
border gateway protocols to make informed routing
decisions. It can also integrate an organization’s existing
routing infrastructure into the Cato SD-WAN.
Umbrella, Viptela, and Duo Security together have A Cloud-Based Secure Web Gateway
elements of the SASE description written by Gartner in
The Umbrella SWG cloud proxy scans all files that are
August 2019.
uploaded and downloaded to and from the cloud for
The Secure Internet Gateway threats such as malware. Part of being able to scan files
includes SSL decryption, which Cisco says can protect
The Umbrella secure internet gateway (SIG) is where the
from hidden attacks.
security services are all integrated into a single cloud-
native software stack. Included in the SIG are services The SWG can block file types from being accessed
for: and block users from specific activities in different
applications. For example, .exe files can be blocked
• Domain name system (DNS) security
because of their increased risk of being malware. Also,
• A full proxy SWG users can be prevented from actions such as uploading
files to a storage system or posting to social media.
• CASB
Another blocking ability in the Umbrella SWG is to
• A cloud-delivered firewall
block traffic destinations that go against policies or
A SASE platform will open up traffic for inspection compliance regulations. Content filtering by website
and run all security functions once. In Umbrella, many category or specific URLs enables the SWG to determine
of the mentioned security functions will include traffic what destinations to block.
inspection as a feature for this reason.
Security teams that use the Cisco Umbrella SWG
Cisco Umbrella’s DNS Security received detailed reports that include full URL addresses,
network identities, the allow or block actions taken
Cisco describes DNS-layer security as the first line of
by the gateway, and the external IP addresses of the
defense because the first step to accessing the internet
accessed websites.
is with DNS resolution. In the Umbrella platform, the DNS
Security Advantage Package works at both the DNS and Cisco Umbrella’s CASB Offers Application
IP layers. Because of this, access requests to malware, Awareness
ransomware, phishing, and botnets are blocked before a
The CASB in Cisco Umbrella, like the DNS tool,
connection can be made.
gives security teams visibility into any shadow IT
Before an attack reaches a user, it hits a DNS server first that is happening by producing reports on all cloud
where the URLs, files, or domain goes through deeper applications being used throughout the cloud
inspection via antivirus engines, and advanced malware environment. The reports include information on each
application’s vendors, categories, name, and amount Duo Security and Zero Trust Access
of use. Additional information includes how risky an
Zero-trust is a security approach where all traffic and
application may be. Security teams can use the CASB
sources of traffic are suspect, even if the traffic source is
to establish policies for blocking or allowing different
a reliable employee. Umbrella is integrated with the zero
applications.
trust technology from Duo Security.
The CASB software offers granularity for what gets
To access the organization’s SASE network, employees
blocked or allowed. Individuals or groups can be
use multi-factor authentication, which ensures with
prevented from accessing specific SaaS applications.
greater certainty that the employee’s credentials are
A Firewall in the Cloud not compromised. To further ensure that devices
in the network are not compromised, device health
In its documentation for the Cisco Umbrella cloud-
is monitored in real-time. The amount of data and
delivered firewall, Cisco says the firewall secures 15%
resources an employee has access to can be applied
of traffic going through an Umbrella network. Cisco
differently via policies that are informed by where an
argues in the documentation that the amount of traffic
employee is located, what kind of device they are using,
the cloud-delivered firewall secures “is on the cusp of
or how recently the device was updated, along with
exploding,” as employees and students continue to move
other contextual information.
to use cloud-native applications for remote work and
study via their phones and laptops. These security policies from Duo Security add to the
overall security of the Cisco SASE offering that is
Like other security services mentioned above, the cloud-
integrated with Umbrella and Viptela.
delivered firewall enables visibility into traffic passing
through the network. Outbound internet traffic across all Cisco Umbrella: Key Takeaways
ports and protocols heads through the firewall because
1. Cisco Umbrella, Viptela, and Duo Security together
it works at Layer 3 and Layer 4. All such traffic activity is
create secure, cloud-based SASE networks for
logged by the firewall.
organizations.
Traffic can be sent to the firewall from any network
2. The secure internet gateway has security features
device via an IPsec tunnel.
that include DNS security, a secure web gateway,
This infographic depicts the flow of traffic as it passes a cloud access security broker, and a cloud-based
through the Cisco Umbrella cloud-based security tools firewall.
before reaching the internet. Source: Cisco
3. All of these security tools inspect traffic at once and
Networking via Viptela provide visibility into the whole cloud environment,
including cloud applications, services, and usage
The Viptela SD-WAN product within the Cisco portfolio
rates.
is used for the routing and other networking features
used by Umbrella. If an organization already has Viptela, 4. Cisco Viptela is how traffic is intelligently routed
then it can choose to expand the service to include throughout the SASE network.
Umbrella as well.
5. Duo Security is the zero-trust part of the Cisco
The network edge is a fundamental part of SASE, and SASE, which plays a large part in meeting the
Viptela can be used to route traffic to and from the Gartner definition of SASE.
edge. Network PoPs are edge locations where SASE
services are delivered. Cisco has scaled existing PoPs for
Umbrella in order to handle increased tunneling to the
SIG and increased traffic to the firewalls.
• DNS filter
• Firewall
• CASB
According to Palo Alto, their SASE service uses the DNS • Quality of service bandwidth management
security portions of the Palo Alto portfolio. The SASE
• CloudGenix’s SD-WAN
vendor’s DNS security service is capable of predictive
analytics, machine learning, and automation for Virtual Private Networks
preventing DNS-based attacks.
A VPN is a means of encrypting network traffic so it
Machine learning in particular is used to detect when can pass through a public network without being read
data theft via DNS tunneling is underway, allowing by other users on the network. In a SASE service, such
organizations to neutralize the attack. as Prisma Access, VPN technology is integrated into
the SASE agent on the user’s device so there is one less
Like the other security technologies mentioned, the DNS
security tool to manage separately from everything else.
security service is integrated into the Prisma Access
software stack. Quality of Service in Networking
Firewall-as-a-Service The measurements of a network’s quality of service
(QoS) are bandwidth, latency, jitter, and error rate. In
The Prisma Access firewall-as-a-service (FWaaS) is
Prisma Access, bandwidth management is accomplished
equivalent to an NGFW device in terms of security
through application whitelisting and blocking policies.
functions and capabilities.
Applications that are blocked are prevented from
However, FWaaS is entirely cloud-based. By using taking up or hogging bandwidth, so business-critical
FWaaS technology, organizations are able to aggregate applications can be provisioned more bandwidth.
traffic from the multiple sources within its network, such
The Prisma Access software stack is integrated with
as on-premises data centers, branch offices, remote
QoS policies so it can set priorities for which traffic to
workers, and the cloud itself. Organizations can also be
provision certain amounts of bandwidth.
consistent in the application and enforcement of security
policies throughout the network and for all users. The CloudGenix Brings in Robust SD-WAN
technology grants enhanced visibility and control of a
Prior to the acquisition of GlodGenix, Prisma Access
network without any physical appliances.
was focused largely on secure connecting remote
As mentioned, the Perimeter 81 network infrastructure Unified cloud management means all of the SASE
for its SASE platform consists of 25 different PoPs that security stack is managed via the cloud. The security
span the globe and are completely managed. In short, a functions are integrated so security personnel can have
cloud-centric SD-WAN has been integrated with security visibility across functions and monitor performance.
tools and functions to create a SASE platform.
Zero trust network-as-a-service takes all of the security
One of the security tools that Perimeter 81 uses in functions available on the Perimeter 81 network and
its SASE is a proxy server. A proxy server acts as a delivers them via the cloud, like a typical SASE platform.
barrier between the employee and any website or web
The firewall-as-a-service protects an organization’s
application the employee is accessing. Traffic goes to the
office networks. The firewall itself is a NGFW, which
proxy server, which is remotely viewed by the employee
employs virtualized and improved security features as
so no traffic goes directly from the host to the employee.
compared to a hardware-based firewall.
If there is malicious traffic received by the proxy server,
it can be detected by the SASE security stack at the PoP Cloud sandboxing is where unknown files are analyzed
and is kept from spreading through the network. in the cloud for any kind of attack or threat.
Not all of an employee’s work has to be done by DNS security uses information from global threat
accessing cloud-based resources like a website or web intelligence sources to identify malicious domains.
application. When a remote employee needs to access Employees cannot access known malicious domains.
For endpoint compliance, Perimeter 81scans for the 2. The vendor added integrated security functions
security features the customer organization has in their to its SD-WAN infrastructure to create the SASE
network to make sure that the organization is compliant platform
with appropriate regulations.
3. A major security feature Perimeter 81 built its SASE
What is Unique About the Perimeter 81 SASE off of is zero trust network access, where all traffic is
Platform? treated as suspicious.
In his interview with SDxCentral, Bareket said that what 4. What makes Perimeter 81’s SASE unique is that its
makes Perimeter 81’s SASE a unique service is how SD-WAN infrastructure includes Layer 3 to Layer 7
mature its network is. of the OSI model, which are used for transmitting
data differently.
“We are providing a true Layer 3 to Layer 7 network in
our cloud when other vendors took a web proxy and
added different security services on top,” he said, “which
is completely different.”
limit access to specific websites. The URL filtering can Zscaler SASE: Key Takeaways
be applied differently based on the user or group of
1. Zscaler focuses on providing security tools to
users. Bandwidth control is more of a networking tool
customers that align with the SASE model defined
than a security tool; however, the Zscaler Cloud Security
by Gartner.
Platform technology still uses it to prioritize business-
critical traffic. DNS filtering can prevent DNS requests 2. There is no networking infrastructure in the Zscaler
against malicious hosts. SASE service; instead, the security tools interoperate
with SD-WAN vendors’ networks.
Lastly, data protection includes cloud data loss
prevention with exact data matching (EDM), a CASB, 3. The Zscaler SASE is deployed at 150 PoPs across the
cloud security posture management, and cloud browser globe in internet exchanges.
isolation. Cloud data loss prevention can be scaled to all
4. The collection of integrated security tools in the
of an organization’s users. Fingerprinting data via EDM
Zscaler SASE service is called the Zscaler Cloud
improves the detection of data loss. A CASB prevents
Security Platform.
data exposure to malicious actors and secures cloud-
based applications that are known and unknown to the
organization. The cloud security posture management
tool extends data protection into an organization’s
cloud environment to mitigate app misconfiguration,
ensure compliance reporting is performed, and fix any
compliance violations. The cloud browser isolation tool
separates browsing activity from the end-user device so
users aren’t exposed to malicious web content.