• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Electrical Engineering News and Products

Electronics Engineering Resources, Articles, Forums, Tear Down Videos and Technical Electronics How-To's

  • Products / Components
    • Analog ICs
    • Battery Power
    • Connectors
    • Microcontrollers
    • Power Electronics
    • Sensors
    • Test and Measurement
    • Wire / Cable
  • Applications
    • 5G
    • Automotive/Transportation
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Handbooks
    • EE Training Days
    • Tutorials
    • Learning Center
    • Tech Toolboxes
    • Webinars & Digital Events
  • Resources
    • White Papers
    • Educational Assets
    • Design Guide Library
    • Digital Issues
    • Engineering Diversity & Inclusion
    • LEAP Awards
    • Podcasts
    • DesignFast
  • Videos
    • EE Videos and Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Bill’s Blogs
  • Advertise
  • Subscribe

How do AI and ML enhance SASE security?

June 4, 2024 By Jeff Shepard

Secure Access Service Edge (SASE) has emerged as a leading architecture for cloud deployments. Its primary function is to provide comprehensive cloud-based secure access while maintaining seamless access to data and applications for users of cloud computing services.

This article compares SASE with a traditional network architecture and then looks at how artificial intelligence (AI) and machine learning (ML) are being used to take SASE security to the next level of performance.

In a traditional networking architecture, private multiprotocol label switching (MPLS) services provide a secure connection to the centralized corporate data center for dispersed users. Maintaining security while scaling MPLS to larger groups of remote workers can quickly become complex, leading to inefficiencies.

SASE replaces the MPLS services with an architecture specifically optimized for the new cloud environment. It provides secure access regardless of the location of the user or the type of device used to access cloud resources without relying on MPLS services (Figure 1).

Figure 1. Traditional MPLS network implementation (left) versus a SASE cloud-based network (right). (Image: Hewlett Packard Enterprise Development)

SASE components

SASE is built around a software-defined wide area network (SD-WAN). SD-WANs operate differently than the traditional MPLS approach. For example, MPLS handles network connectivity failures with backup links while SD-WAN uses real-time traffic steering to correct for errors. The use of real-time traffic steering and other dynamic features of SASE requires the deployment of new technologies to ensure security.

It starts with zero-trust network access (ZTNA), which is based on continuous verification and inspection of traffic to protect sensitive data and applications. The secure web gateway (SWG) supports URL filtering, SSL decryption, and threat detection and prevention. Firewall as a service (FWaaS) adds Layer 7 (application layer) inspection, access control, and another layer of security services, including more threat detection and prevention.

Finally, a cloud-access security broker (CASB) manages software as a service (SaaS) applications and implements malware and threat detection. CASB also enables data loss prevention (DLP) cybersecurity that detects and prevents data breaches and supports internal security and regulatory compliance (Figure 2).

Figure 2. Key components of a SASE SD-WAN architecture. (Image: Palo Alto Networks)

Where do AI and ML fit in?

AI is used in SASE to improve SWG, SD-WAN, CASB, FWaaS, and ZTNA for enhanced security and networking. AI and ML algorithms can quickly analyze large data sets and detect threats and potential security breaches. ML’s ability to learn and adapt means it can continuously improve security performance. AI can be used to analyze network activities in real-time to identify previously unknown threats or highly evasive behavior and prevent cyberattacks.

In the case of ZTNA, AI is used to continuously analyze user and network activity. If a user accesses sensitive data they have not accessed before, that can be immediately flagged as a possible security concern and the level of authentication can be increased accordingly. By immediately addressing changes in behavior, the risk of cyber-attacks and insider threats leading to malware or data breaches is greatly reduced.

ML analyzes email sources and content, webpage source code, text, images, and URL structure to detect potential threats. This can be particularly useful for detecting well-hidden phishing threats like phishing kits that generate malicious web pages. Users can be prevented from accessing those pages before any harm has been done. ML can also be used for URL filtering to detect and stop SaaS phishing threats.

In addition to threat detection, AI and ML are used to implement proactive threat prevention. Using pattern recognition, large language models (LLMs), and continuous learning, AI and ML can predict potential threats and speed security preparations even before new threats appear.

SASE solutions using AI and ML provide robust support for zero-trust networking. Two key benefits of AI-powered SASE include:

  • Support for secure access from any place using any device. Using AI and ML tools, SASE can implement zero trust dynamic access controls based on its ability to identify and continuously authenticate all devices, even those on third-party networks, including IoT devices and BYOD.
  • Monitor and analyze network activities, web page content, and SaaS activities in real-time using AI LLMs, continuous learning, and other tools to anticipate and prevent cyber threats.

Summary

Zero-trust SASE is an important tool set for securing cloud networking environments. AI and ML can enhance the basic SASE components of SWG, SD-WAN, CASB, FWaaS, and ZTNA. AI-enabled SASE supports secure access using any device at any location and provides continuous and proactive network traffic monitoring to prevent cyberattacks before they can cause problems.

References

Enhancing Security and Asset Management with AI/ML in Cato Networks’ SASE, Cato Networks
Four steps to edge-to-cloud Zero Trust with AI-powered single-vendor SASE, HPE Aruba Networking
Leveraging SASE and AI for Enhanced Network Security, Redvine Networks
The New Convergence: Artificial Intelligence (AI) Powered Secure Access Service Edge (SASE) And Why It Matters, Elnion
What Is AI-Powered SASE?, Palo Alto Networks
What is SASE?, Hewlett Packard Enterprise Development

You Might Also Like

Filed Under: Applications, Microcontroller Tips, Security Tagged With: FAQ

Primary Sidebar

EE Engineering Training Days

engineering

Featured Contributions

zonal architecture

Addressing zonal architecture challenges in the automotive industry

zonal architecture

Addressing zonal architecture challenges in the automotive industry

A2L refrigerants drive thermal drift concerns in HVAC systems

Why outdoor charging demands specialized battery connectors

How Li-ion batteries are powering the shift in off-highway equipment

More Featured Contributions

EE Tech Toolbox

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center
“ee
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.
“bills
contribute

R&D World Podcasts

R&D 100 Episode 10
See More >

Sponsored Content

Designing for Serviceability: The Role of Interconnects in HVAC Maintenance

From Control Boards to Comfort: How Signal Integrity Drives HVAC Innovation

Built to Withstand: Sealing and Thermal Protection in HVAC Sub-Systems

Revolutionizing Manufacturing with Smart Factories

Smarter HVAC Starts at the Sub-System Level

Empowering aerospace E/E design and innovation through Siemens Xcelerator and Capital in the Cloud

More Sponsored Content >>

RSS Current EDABoard.com discussions

  • Dynacord enter protect
  • Need suggestions in task NI6363 retrigger (analog trigger)
  • Monte-Carlo simulation error on ADE-XL
  • Special FETs for LLC
  • Broad band impedance matching network for loop antenna using transformer for wireless power transfer

RSS Current Electro-Tech-Online.com Discussions

  • Sump pit water alarm - Kicad 9
  • Fun with AI and swordfish basic
  • turbo jet fan - feedback appreciated.
  • SiC FET disadvantages
  • Current sources in parallel...
Search Millions of Parts from Thousands of Suppliers.

Search Now!
design fast globle

Footer

EE World Online

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Engineer's Garage
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

EE WORLD ONLINE

  • Subscribe to our newsletter
  • Teardown Videos
  • Advertise with us
  • Contact us
  • About Us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy