What Is SSE? Key SSE Capabilities Explained
Gartner’s definition of SSE notes the framework is composed of capabilities that together offer secure access to the web, cloud services and private applications. While distinct capabilities vary, most vendor and consultant definitions mention four key components.
ZTNA
The principle of zero-trust network access grants access to specific applications, users or devices. This addresses the main deficiency of VPNs, which grant access to the entire enterprise network; once an attacker gets in, lateral movement is all too easy.
SWG
A secure web gateway monitors and filters web traffic to ensure compliance with enterprise security policies. Users cannot access risky sites, and malicious files cannot be downloaded to devices.
CASB
A cloud access security broker enforces the same security policies and access controls for all cloud services. This may include features such as multifactor authentication, single sign-on and encryption.
FWaaS
Firewall as a Service provides the familiar functionality of an on-premises firewall at remote sites, through the cloud. To provide the consistent enforcement that’s the hallmark of SSE, FWaaS typically integrates with a software-defined WAN.
RELATED: Find out a crucial truth about SASE and zero trust.
Other capabilities may include:
DLP
Data loss prevention services monitor data in motion, at rest and in use — a critical aspect of HIPAA compliance.
IAM
Identity and access management governs role-based access controls and identity authentication.
RBI
Remote browser isolation separates web browsing from user devices, protecting the latter from online threats.
User/Behavior Analysis
These services powered by artificial intelligence help identify suspicious user activity. The analysis is especially nuanced in healthcare, where users’ after-hours access requests for electronic health records very well may be legitimate.
Whatever capabilities are offered, the key theme is that they’re included in one package, says Aaron Rose, security architect manager for vertical solutions in the Office of the CTO at Check Point. “It’s unified. It’s not disparate solutions plugged into different spots,” Rose says. This matters, as users and their applications are no longer restricted to defined spaces in physical buildings.
SSE vs. SASE: Understanding the Difference
SSE is typically regarded as a subset of secure access service edge. In general terms, SSE focuses exclusively on security, while SASE couples security and network management services. Check Point notes that SASE works better for organizations that need access to on-premises and cloud-based resources, while SSE serves organizations working largely, if not entirely, with cloud and Software as a Service resources.
“SSE is a central mechanism to connect users and provide a safe, secure, fast and reliable way to get to any application or website that’s somewhere else,” Arandjelovic says. “SASE offers optimized and high-performance connectivity to branch networks, making sure the whole infrastructure works together.”
As SSE is part of SASE, there tends to be overlap between their core capabilities. SD-WAN, for example, is necessary for network management and performance in the SASE framework and supports FWaaS under SSE. In addition, both depend on the least-privileged access principles that are the cornerstone of ZTNA.