• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • DesignFast
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

How do AI and ML enhance SASE security?

May 22, 2024 By Jeff Shepard Leave a Comment

Secure Access Service Edge (SASE) has emerged as a leading architecture for cloud deployments. Its primary function is to provide comprehensive cloud-based secure access while maintaining seamless access to data and applications for users of cloud computing services.

This article compares SASE with a traditional network architecture and then looks at how artificial intelligence (AI) and machine learning (ML) are being used to take SASE security to the next level of performance.

In a traditional networking architecture, private multiprotocol label switching (MPLS) services provide a secure connection to the centralized corporate data center for dispersed users. Maintaining security while scaling MPLS to larger groups of remote workers can quickly become complex, leading to inefficiencies.

SASE replaces the MPLS services with an architecture specifically optimized for the new cloud environment. It provides secure access regardless of the location of the user or the type of device used to access cloud resources without relying on MPLS services (Figure 1).

SASE security
Figure 1. Traditional MPLS network implementation (left) versus a SASE cloud-based network (right). (Image: Hewlett Packard Enterprise Development)

SASE components

SASE is built around a software-defined wide area network (SD-WAN). SD-WANs operate differently than the traditional MPLS approach. For example, MPLS handles network connectivity failures with backup links while SD-WAN uses real-time traffic steering to correct for errors. The use of real-time traffic steering and other dynamic features of SASE requires the deployment of new technologies to ensure security.

It starts with zero-trust network access (ZTNA), which is based on continuous verification and inspection of traffic to protect sensitive data and applications. The secure web gateway (SWG) supports URL filtering, SSL decryption, and threat detection and prevention. Firewall as a service (FWaaS) adds Layer 7 (application layer) inspection, access control, and another layer of security services, including more threat detection and prevention.

Finally, a cloud-access security broker (CASB) manages software as a service (SaaS) applications and implements malware and threat detection. CASB also enables data loss prevention (DLP) cybersecurity that detects and prevents data breaches and supports internal security and regulatory compliance (Figure 2).

SASE security
Figure 2. Key components of a SASE SD-WAN architecture. (Image: Palo Alto Networks)

Where do AI and ML fit in?

AI is used in SASE to improve SWG, SD-WAN, CASB, FWaaS, and ZTNA for enhanced security and networking. AI and ML algorithms can quickly analyze large data sets and detect threats and potential security breaches. ML’s ability to learn and adapt means it can continuously improve security performance. AI can be used to analyze network activities in real-time to identify previously unknown threats or highly evasive behavior and prevent cyberattacks.

In the case of ZTNA, AI is used to continuously analyze user and network activity. If a user accesses sensitive data they have not accessed before, that can be immediately flagged as a possible security concern and the level of authentication can be increased accordingly. By immediately addressing changes in behavior, the risk of cyber-attacks and insider threats leading to malware or data breaches is greatly reduced.

ML analyzes email sources and content, webpage source code, text, images, and URL structure to detect potential threats. This can be particularly useful for detecting well-hidden phishing threats like phishing kits that generate malicious web pages. Users can be prevented from accessing those pages before any harm has been done. ML can also be used for URL filtering to detect and stop SaaS phishing threats.

In addition to threat detection, AI and ML are used to implement proactive threat prevention. Using pattern recognition, large language models (LLMs), and continuous learning, AI and ML can predict potential threats and speed security preparations even before new threats appear.

SASE solutions using AI and ML provide robust support for zero-trust networking. Two key benefits of AI-powered SASE include:

  • Support for secure access from any place using any device. Using AI and ML tools, SASE can implement zero trust dynamic access controls based on its ability to identify and continuously authenticate all devices, even those on third-party networks, including IoT devices and BYOD.
  • Monitor and analyze network activities, web page content, and SaaS activities in real-time using AI LLMs, continuous learning, and other tools to anticipate and prevent cyber threats.

Summary

Zero-trust SASE is an important toolset for securing cloud networking environments. AI and ML can enhance the basic SASE components of SWG, SD-WAN, CASB, FWaaS, and ZTNA. AI-enabled SASE supports secure access using any device at any location and provides continuous and proactive network traffic monitoring to prevent cyberattacks before they can cause problems.

References

Enhancing Security and Asset Management with AI/ML in Cato Networks’ SASE, Cato Networks
Four steps to edge-to-cloud Zero Trust with AI-powered single-vendor SASE, HPE Aruba Networking
Leveraging SASE and AI for Enhanced Network Security, Redvine Networks
The New Convergence: Artificial Intelligence (AI) Powered Secure Access Service Edge (SASE) And Why It Matters, Elnion
What Is AI-Powered SASE?, Palo Alto Networks
What is SASE?, Hewlett Packard Enterprise Development

You may also like:


  • How is HIL testing used for onboard EV chargers?

  • How does a recurrent neural network (RNN) remember?

  • What’s the difference between GPUs and TPUs for AI processing?

  • What are the programming essentials for LoRa nodes?

  • April 2024 Issue: Internet of Things Handbook

Filed Under: Artificial intelligence, FAQ, Featured Tagged With: FAQ

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Featured Contributions

Five challenges for developing next-generation ADAS and autonomous vehicles

Securing IoT devices against quantum computing risks

RISC-V implementation strategies for certification of safety-critical systems

What’s new with Matter: how Matter 1.4 is reshaping interoperability and energy management

Edge AI: Revolutionizing real-time data processing and automation

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

DesignFast

Design Fast Logo
Component Selection Made Simple.

Try it Today
design fast globle

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy