Hello SASE. Goodbye SD-WAN?

Issue 1 2022 Infrastructure

The working environment has been irrevocably changed over the past two years and the debate rages on as to whether we’ll ever go back to a pre-Covid setup.

Certain organisations like PwC have made decisive moves, with the accounting and consulting firm announcing earlier this year that all of its 40 000 US client services employees would be able to work virtually, from anywhere, permanently. Other major accounting firms, including Deloitte and KPMG, have followed suit, providing staff with the option to continue to work remotely into the future.

In South Africa, it seems – at least for now – that many businesses are considering a hybrid approach to working, giving employees a degree of flexibility, with certain days designated as in-office ‘face time’ days and others as work-from-home days.


Hardus Dippenaar.

Farmers too have had to modify their day-to-day operations, where possible changing the way in which they interact with suppliers, clients and staff, explained Hardus Dippenaar, senior network architect at Datacentrix.

Speaking at the Datacentrix Agri Indaba event, Dippenaar added that regardless of what a company’s decision is in the shorter term around a hybrid approach to work, several considerations must be taken into account.

“One is that an organisation’s data is moving as people are moving. Another is that staff expect the same, seamless connection to the applications they need, regardless of where they might be working from.

“Not only this, but security as we know it is no longer pertinent just in the workplace, it also needs to move with your users,” he stated.

This is where the concept of Secure Access Service Edge (SASE) is coming to the fore, Dippenaar explained, as the requirements of a distributed workforce have placed remote access to applications and the ability to work from anywhere as top organisational priorities today.

“The data centre is no longer a company’s hub, it’s now the user. At the same time though, the traditional office has not disappeared and worker distribution could shift again at any point.

“It makes sense then to deliver the necessary agility by running your network as a service through a SASE-enabled architecture, which defines the edge of the network as constantly changing and moving with the user, extending IT’s visibility beyond the corporate network and into the cloud.”

But what about SD-WAN?

The good news for those businesses that are or have already invested in software-defined networking (SD-WAN) technology, is that there is no rip-and-replace required. “Businesses deploying SD-WAN create an overlay network through physical appliances, software or cloud-based vendor services, depending on their IT needs, but SASE is more distributed and by Gartner's definition, strictly cloud-based.

“The critical difference for today’s environment, however, is the fact that SD-WAN still follows the more traditional networking concept of all network infrastructure centring around an organisation's data centre, whereas SASE considers the data centre as just another service edge – essentially the SE in SASE.

“Essentially, SD-WAN provides the foundation for a SASE-enabled architecture, delivering protected, anywhere, anytime access.”

How secure is SASE?

With cybercriminals already raking in billions of Rands, a valid concern voiced by many firms is whether SASE is further complicating cybersecurity challenges. This is not the case due to the multilayer security capabilities provided by SD-WAN technology for both on-premises and cloud.

“These security measures can bridge a company’s current security deployment with a SASE rollout by providing consistent security policy enforcement that can be rolled out and managed anywhere. The edge is secured because the network is treated as a Zero Trust network. The trust of any device and any user must be proven with every access request, no matter where it comes from.

“An important point here is that it’s not just about the deployment of security across the modern enterprise, it’s also about the simplified monitoring, managing and reporting that this also brings.”

New connectivity needs?

By the same token that an existing SD-WAN implementation does not need to be replaced when rolling out SASE, an organisation’s connectivity infrastructure should also not necessarily be changed. “A company can use its existing connectivity, whether it be an asymmetrical link, fibre, LTE (Long-Term Evolution), MPLS (Multi-Protocol Label Switching) or anything else. Don’t throw away good infrastructure unless it’s expensive, or slow; use what’s available and optimise it.”

From a local agricultural perspective, Dippenaar clarified that the future of business within the sector will see a large-scale interest in and adoption of IoT (Internet of Things) devices and related data collection. “Digitalisation is a major driver for the future of agri. Through SASE, organisations within this industry will be able to empower their workforce with greater mobility, while also ensuring that only those people with the correct credentials and rights can access data and deliver it to the cloud. This information can then be analysed and used for more sustainable farming,” he said.

Download the Datacentrix Agri Indaba 2021 presentations at https://www.datacentrix.co.za/agri_indaba_2021.html




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
SA availability of immutable backup storage appliance
CASA Software Infrastructure Security Services & Risk Management
CASA Software has launched the newly released Nexsan VHR-Series, a fully integrated, enterprise-class, immutable backup storage appliance purpose-built for Veeam software environments, with usable capacity ranging from 64 TB to 3,3 PB.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.