Decoding why SASE is SSE-first

Date: Thursday, March 31st at 11 a.m. PT / 2 p.m. ET

The pandemic brought a multitude of changes across every industry, including cybersecurity. The sudden shift to remote work led to the rapid adoption of cloud-based services and SaaS solutions. As businesses prepare to open up in the post-pandemic world, they've realized that conventional ideas of corporate perimeters have been altered permanently. Traditional network and security solutions are not cloud-compatible and are often hindered by geographical limitations. With the hybrid workplace model being implemented all over the world, the cybersecurity challenges that come with such a largely distributed workforce will be overwhelming for IT admins.

Secure access service edge (SASE) was introduced by Gartner in 2019 as a convergence of network and security functions to be delivered from a unified cloud-based platform. SASE was designed to revamp cloud security by enabling businesses to overcome the cybersecurity challenges arising from the cloud-driven world. Later in 2021, Gartner introduced security service edge (SSE), which incorporates the security half of SASE, and consists of secure web gateways, cloud access security brokers, and zero trust network access. Although they sound similar, SASE and SSE are not the same.

Watch this webinar to learn about:

  • Cybersecurity challenges in the post-pandemic world.
  • SASE: The long-term solution.
  • SSE: The security part of SASE.
  • SASE vs. SSE: A comparison.
  • SASE or SSE: Which should you choose?

Register now!

About the presenter:

Debs, Technical Evangelist, ManageEngine

Debanjali Ghosh (a.k.a Debs), a technical evangelist at ManageEngine, helps IT leaders and global enterprises to take on the evolving cybersecurity challenges. She is a sought speaker on the key IAM and cybersecurity trends in international conferences and summits. Her research studies on the topics of Zero Trust, advanced authentication, and building an enterprise-grade cybersecurity framework have received much acclaim internationally. Her insight and advice on leveraging the latest technology for better IAM and cybersecurity have helped many Fortune 500 companies.

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.