SASE & SSE Glossary
44 terms defined — from architecture concepts to security technologies. Written for practitioners, not marketing decks.
A security control point between users and SaaS applications that provides visibility into shadow IT, enforces data protection policies, and detects threats across cloud services.
A software architecture built from the ground up for cloud environments using microservices, containerization, and elastic scaling, as opposed to legacy appliances virtualized and hosted in the cloud.
An integrated security platform that combines CSPM, cloud workload protection (CWPP), and application security capabilities to protect cloud-native applications across their full lifecycle from build to runtime.
A tool that continuously monitors cloud infrastructure (IaaS, PaaS) for misconfigurations, compliance violations, and security risks by comparing resource configurations against security benchmarks and best practices.
Insurance policies that cover financial losses from cyber incidents, increasingly requiring specific security controls like ZTNA, MFA, and endpoint detection as prerequisites for coverage.
A monitoring capability that measures end-to-end application performance from the user's perspective, identifying degradation across endpoint, network, and application layers.
The real-time assessment of an endpoint's security health, including OS version, patch level, disk encryption, EDR status, and compliance state, used as an input to access control decisions.
A set of technologies that detect and prevent unauthorized transmission of sensitive data by inspecting content at rest, in motion, and in use against predefined and custom data patterns.
A security layer that analyzes and filters DNS queries and responses to block connections to malicious domains, prevent DNS-based data exfiltration, and disrupt command-and-control communications.
EU regulation requiring financial entities to implement comprehensive ICT risk management, incident reporting, digital operational resilience testing, and third-party risk management.
An authentication method requiring two or more independent verification factors (something you know, have, or are) to prove identity before granting access.
A security technique that divides a network into granular segments, enforcing least-privilege access policies between individual workloads rather than relying on broad network perimeters.
A WAN transport technology that routes traffic using short path labels rather than IP addresses, providing predictable latency and guaranteed bandwidth through provider-managed circuits.
A company that remotely manages a customer's IT infrastructure and end-user systems, increasingly delivering SASE as a managed security service with multi-tenant platforms.
A software architecture where a single platform instance serves multiple independent customer organizations (tenants) with isolated data, policies, and configurations.
A technology that enforces security policies on devices attempting to connect to a network, controlling access based on device identity, health, and compliance status.
EU directive expanding cybersecurity requirements to more sectors and imposing stricter incident reporting, risk management, and supply chain security obligations with personal liability for management.
A security discipline and set of tools that control, monitor, and audit access for accounts with elevated privileges, such as system administrators, database administrators, and service accounts.
A set of security standards for organizations that handle cardholder data, requiring network segmentation, access controls, encryption, and monitoring — all addressable through SASE.
A geographically distributed data center operated by a SASE/SSE provider where security inspection and traffic optimization occur as close to the user as possible.
A cloud-delivered architecture that converges SD-WAN and security services (SWG, CASB, ZTNA, FWaaS) into a single, globally distributed platform.
The distinction between full SASE (SD-WAN + security) and SSE (security services only), which determines scope, cost, and deployment complexity.
A virtualized WAN architecture that abstracts transport links (MPLS, broadband, LTE/5G) and uses software-based policy to select the optimal path for each application.
A security framework that dynamically creates one-to-one network connections between users and resources, making application infrastructure invisible to unauthorized users.
The use of unsanctioned applications, cloud services, and devices by employees without the knowledge or approval of the IT or security team.
A platform that aggregates, normalizes, and correlates security event logs from across the enterprise, providing real-time alerting, historical analysis, and compliance reporting.
A traffic processing design in which a single inspection engine applies all security policies (firewall, IPS, DLP, malware scanning) to each packet or flow in one pass, rather than chaining multiple sequential inspection stages.
A platform that automates security operations workflows by orchestrating actions across multiple security tools, enabling standardized incident response through predefined playbooks.
A centralized function or team responsible for monitoring, detecting, analyzing, and responding to security incidents using a combination of technology, processes, and people.
The security half of SASE, delivering SWG, CASB, ZTNA, and DLP as cloud-delivered services without the SD-WAN networking component.
A cloud or on-premises proxy that inspects all web-bound traffic for malware, enforces URL filtering policies, and prevents data exfiltration over HTTP/HTTPS.
Curated, actionable information about current and emerging threats, including indicators of compromise (IoCs), attacker tactics, techniques, and procedures (TTPs), and contextual analysis that informs security decisions.
The process of decrypting TLS-encrypted traffic at a proxy, inspecting the plaintext content for threats and policy violations, and re-encrypting it before forwarding to the destination.
A security model that eliminates implicit trust based on network location, requiring continuous verification of identity, device posture, and context for every access request.
An access model that grants users connectivity to specific applications, not networks, based on identity and device posture, verified continuously per session.