SlideShare a Scribd company logo
1 of 21
Download to read offline
The Emerging Market
For Secure Access
Service Edge:
Where We Are Now
Paula Musich
Research Director
pmusich@emausa.com
Watch the On-Demand Webinar
• Availability and Buying Options in the Emerging SASE Market On-Demand Webinar:
https://info.enterprisemanagement.com/availability-buyin-options-in-the-emerging-sase-market-webinar-ws
• Check out upcoming webinars from EMA here:
https://www.enterprisemanagement.com/freeResearch
Featured Speaker
Paula brings over 30 years of experience covering
the IT security and networking technology
markets. She has been an IT security analyst for
over ten years, including as a research director at
NSS Labs, and earlier as the principal analyst for
enterprise security for Current Analysis. As a
security technology analyst, Paula has tracked
and analyzed competitive developments in the
threat management segment of the information
security market, ranging from advanced anti-
malware to next-generation firewalls and intrusion
prevention systems to content security, data loss
prevention, and more.
© 2021 Enterprise Management Associates, Inc. 3
Paula Musich
Research Director
Security, Compliance and Risk Management
| @ema_research
Sponsors
© 2021 Enterprise Management Associates, Inc. 4
| @ema_research
Agenda
© 2021 Enterprise Management Associates, Inc. 5
| @ema_research
Introduction
1 2 3
Early Adopters The Expanding
Field of
Competitors
4
SASE
Approaches
and
Architectures
5
Comparing
Pricing and
Support
Models
Introduction to
Secure Access
Service Edge (Sassy)
6
New Network Traffic Patterns Make Hub & Spoke Architectures Obsolete
© 2021 Enterprise Management Associates, Inc. 7
| @ema_research
Functions That Should/Could Make Up A SASE Service
© 2021 Enterprise Management Associates, Inc. 8
| @ema_research
SASE Functions
Must Have
🔘 SD-WAN
🔘 SWG
🔘 CASB
🔘 ZTNA
🔘 FWaaS
🔘 ID Sensitive Data/Malware
🔘 Line rate/edge
🔘 Line rate/cloud
Nice to Have
🔘 WAAP
🔘 RBI
🔘 Recursive DNS
🔘 Network Sandbox
🔘 API Access to SaaS
🔘 Managed/Unmanaged
Device Support
And then Some
🔘 Wi-Fi Hotspot Protection
🔘 Network Obfuscation
🔘 Legacy VPN
🔘 Edge Compute Protection
🔘 UEBA
Early Adopters
Introduction to
Secure Access
Service Edge (Sassy)
Which Group is Leading SASE Adoption?
© 2021 Enterprise Management Associates, Inc. 10
| @ema_research
Which SASE Attributes Are Most Important?
© 2021 Enterprise Management Associates, Inc. 11
| @ema_research
The Expanding Field
of Competitors
12
© 2021 Enterprise Management Associates, Inc. 13
| @ema_research
© 2021 Enterprise Management Associates, Inc. 14
| @ema_research
Categorizing SASE Vendors
Standalone SASE
Specialists
Acquisitions by Large
Networking/Security
Vendors
Security Vendors
Partnering with SD-WAN
Providers
CDN Providers Adding
SASE Functions
Cato Networks Cisco/Viptela Forcepoint Akamai
Opoen Systems Fortinet/OOPAQ McAfee Cloudflare
Versa Networks Aruba (HPE) Silver Peak Netskope
Perimeter81 Palo Alto
Networks/CloudGenix
Symantec
Twingate Vmware/VeloColoud zScaler
Check Point
SASE Approaches
and Architectures
© 2021 Enterprise Management Associates, Inc. 16
| @ema_research
© 2021 Enterprise Management Associates, Inc. 17
| @ema_research
Comparing Pricing
and Support Models
Typical SASE Pricing Models
© 2021 Enterprise Management Associates, Inc. 19
PUPY*
PUPY +
Bandwidth
Per Appliance +
Bandwidth +
Support Options
Service Tiers +
Site-Specific
Throughput
*Per User/Per Year
| @ema_research
Compare SASE Support Offerings
© 2021 Enterprise Management Associates, Inc. 20
Basic Premium Onsite Support Response
Window
RMA SLA
Cato 24x7x365 Dedicated SE Via partner 99.999 (for
Umbrella services)
Cisco 24x7 phone +
online
Designated SM Via partner 99.999 (for
Umbrella services)
Cloudflare 24x7 White glove Via partner 100% uptime
Fortinet 24x7 Advanced SE Yes 4 hours – next day
w/ courier
99.999
Aruba (HPE) Silver
Peak
24x7x365 Deployment Help No 30 mins – 24 hours None
Palo Alto Networks 24x7 online 24x7 phone +
guidance
4 hours – 10 days 99.999
Versa 24x7 web+ phone 24x7 Yes 1-4 hours 99.999
Vmware 24x7 Root cause Analysis Optional 30 mins - *12 hours 4 hours – NBD** None
Zscaler 24x7 Level 2 Engineer No 15 mins – 48 hours 99.999
| @ema_research
Questions?
Get the report:
https://bit.ly/3elRQ1k
© 2021 Enterprise Management Associates, Inc. 21
| @ema_research

More Related Content

More from Enterprise Management Associates

Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Enterprise Management Associates
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesEnterprise Management Associates
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...Enterprise Management Associates
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Enterprise Management Associates
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Enterprise Management Associates
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Enterprise Management Associates
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessEnterprise Management Associates
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...Enterprise Management Associates
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...Enterprise Management Associates
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...Enterprise Management Associates
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceEnterprise Management Associates
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Enterprise Management Associates
 
Multi-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the FutureMulti-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the FutureEnterprise Management Associates
 

More from Enterprise Management Associates (20)

Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
Navigating the Complexity of Distributed Microservices across AWS, Azure, and...
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Kubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and OpportunitiesKubernetes Unveiled: Trends, Challenges, and Opportunities
Kubernetes Unveiled: Trends, Challenges, and Opportunities
 
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-...
 
Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...Challenges and Best Practices for Securing Modern Operational Technology Netw...
Challenges and Best Practices for Securing Modern Operational Technology Netw...
 
CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery CMDB in Cloud Times: Myths, Mistakes, and Mastery
CMDB in Cloud Times: Myths, Mistakes, and Mastery
 
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
Modernizing Network Engineering and Operations in the Era of Hybrid and Remot...
 
Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?Why Should Organizations Consider Extended Detection and Response (XDR)?
Why Should Organizations Consider Extended Detection and Response (XDR)?
 
Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023Five Managed SD-WAN Trends to Watch in 2023
Five Managed SD-WAN Trends to Watch in 2023
 
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network AccessMoving Beyond Remote Access: Discover the Power of Zero Trust Network Access
Moving Beyond Remote Access: Discover the Power of Zero Trust Network Access
 
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
[Analyst Research Slides] Build vs. Buy: Finding the Best Path to Network Aut...
 
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...The Critical Role of Workload Automation in Achieving Successful Digital Tran...
The Critical Role of Workload Automation in Achieving Successful Digital Tran...
 
AI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network ManagementAI-Driven Networks: Leveling Up Network Management
AI-Driven Networks: Leveling Up Network Management
 
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
WAN Transformation with SD-WAN: Establishing a Mature Foundation for SASE Suc...
 
Identity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SMEIdentity Management Buyer’s Guide for the SME
Identity Management Buyer’s Guide for the SME
 
Automation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOpsAutomation, AI, and the Rise of ServiceOps
Automation, AI, and the Rise of ServiceOps
 
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant IntelligenceCyber Threat Intelligence: Transforming Data into Relevant Intelligence
Cyber Threat Intelligence: Transforming Data into Relevant Intelligence
 
Debunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research SlidesDebunking the Myths Around API Security Research Slides
Debunking the Myths Around API Security Research Slides
 
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?Secure Coding Practices – Growing Success or Zero-Day Epidemic?
Secure Coding Practices – Growing Success or Zero-Day Epidemic?
 
Multi-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the FutureMulti-Cloud Networking: Connecting and Securing the Future
Multi-Cloud Networking: Connecting and Securing the Future
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Availability and Buying Options in the Emerging SASE Market

  • 1. The Emerging Market For Secure Access Service Edge: Where We Are Now Paula Musich Research Director pmusich@emausa.com
  • 2. Watch the On-Demand Webinar • Availability and Buying Options in the Emerging SASE Market On-Demand Webinar: https://info.enterprisemanagement.com/availability-buyin-options-in-the-emerging-sase-market-webinar-ws • Check out upcoming webinars from EMA here: https://www.enterprisemanagement.com/freeResearch
  • 3. Featured Speaker Paula brings over 30 years of experience covering the IT security and networking technology markets. She has been an IT security analyst for over ten years, including as a research director at NSS Labs, and earlier as the principal analyst for enterprise security for Current Analysis. As a security technology analyst, Paula has tracked and analyzed competitive developments in the threat management segment of the information security market, ranging from advanced anti- malware to next-generation firewalls and intrusion prevention systems to content security, data loss prevention, and more. © 2021 Enterprise Management Associates, Inc. 3 Paula Musich Research Director Security, Compliance and Risk Management | @ema_research
  • 4. Sponsors © 2021 Enterprise Management Associates, Inc. 4 | @ema_research
  • 5. Agenda © 2021 Enterprise Management Associates, Inc. 5 | @ema_research Introduction 1 2 3 Early Adopters The Expanding Field of Competitors 4 SASE Approaches and Architectures 5 Comparing Pricing and Support Models
  • 7. New Network Traffic Patterns Make Hub & Spoke Architectures Obsolete © 2021 Enterprise Management Associates, Inc. 7 | @ema_research
  • 8. Functions That Should/Could Make Up A SASE Service © 2021 Enterprise Management Associates, Inc. 8 | @ema_research SASE Functions Must Have 🔘 SD-WAN 🔘 SWG 🔘 CASB 🔘 ZTNA 🔘 FWaaS 🔘 ID Sensitive Data/Malware 🔘 Line rate/edge 🔘 Line rate/cloud Nice to Have 🔘 WAAP 🔘 RBI 🔘 Recursive DNS 🔘 Network Sandbox 🔘 API Access to SaaS 🔘 Managed/Unmanaged Device Support And then Some 🔘 Wi-Fi Hotspot Protection 🔘 Network Obfuscation 🔘 Legacy VPN 🔘 Edge Compute Protection 🔘 UEBA
  • 9. Early Adopters Introduction to Secure Access Service Edge (Sassy)
  • 10. Which Group is Leading SASE Adoption? © 2021 Enterprise Management Associates, Inc. 10 | @ema_research
  • 11. Which SASE Attributes Are Most Important? © 2021 Enterprise Management Associates, Inc. 11 | @ema_research
  • 12. The Expanding Field of Competitors 12
  • 13. © 2021 Enterprise Management Associates, Inc. 13 | @ema_research
  • 14. © 2021 Enterprise Management Associates, Inc. 14 | @ema_research Categorizing SASE Vendors Standalone SASE Specialists Acquisitions by Large Networking/Security Vendors Security Vendors Partnering with SD-WAN Providers CDN Providers Adding SASE Functions Cato Networks Cisco/Viptela Forcepoint Akamai Opoen Systems Fortinet/OOPAQ McAfee Cloudflare Versa Networks Aruba (HPE) Silver Peak Netskope Perimeter81 Palo Alto Networks/CloudGenix Symantec Twingate Vmware/VeloColoud zScaler Check Point
  • 16. © 2021 Enterprise Management Associates, Inc. 16 | @ema_research
  • 17. © 2021 Enterprise Management Associates, Inc. 17 | @ema_research
  • 19. Typical SASE Pricing Models © 2021 Enterprise Management Associates, Inc. 19 PUPY* PUPY + Bandwidth Per Appliance + Bandwidth + Support Options Service Tiers + Site-Specific Throughput *Per User/Per Year | @ema_research
  • 20. Compare SASE Support Offerings © 2021 Enterprise Management Associates, Inc. 20 Basic Premium Onsite Support Response Window RMA SLA Cato 24x7x365 Dedicated SE Via partner 99.999 (for Umbrella services) Cisco 24x7 phone + online Designated SM Via partner 99.999 (for Umbrella services) Cloudflare 24x7 White glove Via partner 100% uptime Fortinet 24x7 Advanced SE Yes 4 hours – next day w/ courier 99.999 Aruba (HPE) Silver Peak 24x7x365 Deployment Help No 30 mins – 24 hours None Palo Alto Networks 24x7 online 24x7 phone + guidance 4 hours – 10 days 99.999 Versa 24x7 web+ phone 24x7 Yes 1-4 hours 99.999 Vmware 24x7 Root cause Analysis Optional 30 mins - *12 hours 4 hours – NBD** None Zscaler 24x7 Level 2 Engineer No 15 mins – 48 hours 99.999 | @ema_research
  • 21. Questions? Get the report: https://bit.ly/3elRQ1k © 2021 Enterprise Management Associates, Inc. 21 | @ema_research