<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Curious about how StrongDM works? 🤔 Learn more here!

Search
Close icon
Search bar icon

SASE or Dynamic Access Management? Here’s Why You Need Both

I wish you could have seen my dear late mother leave her house. It involved a series of intent-based actions, checks, and re-checks, all built into a confirmatory loop that ideally left her with mental and emotional peace: The stove is off, the temperature is adjusted correctly and the doors are locked. Now she can enjoy tea and cakes with her friends.

That continuum of checks and desired assurances is similar to what CISOs experience. They must know what is happening at all times, everywhere, and with everyone. And that’s not just a nice-to-have. Compliance mandates and self-imposed policies and controls dictate that awareness and understanding are critical to manage the security of their infrastructure effectively.

The Need for SASE

As the scope of enterprise attack vectors widens, spanning cloud applications, on-premises assets, and personal devices, there has become a critical need for simplifying and consolidating network and security tools. Secure Access Service Edge (SASE, pronounced “sassy,” also a concept my mother could relate to) is a framework that enhances an organization's capabilities by combining network security and wide-area networking. It enables your organization to:

  • Securely connect users to applications
  • Precisely enforce security controls
  • Enhance operational efficiency

That’s a much-needed remedy for the ever-expanding surface areas that require security controls to be enforced directly at the point of connection—a user, device, Internet of Things (IoT) device, or edge computing location—rather than through a centralized data center. 

SASE Origins

SASE, coined by Gartner in 2019, represented a major pivot in networking and security architecture. It consolidates networking and security capabilities into a cloud-native, edge-based service model. By integrating functions like Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Zero Trust Network Access (ZTNA), and Firewall as a Service (FWaaS), SASE provides organizations with a comprehensive, streamlined solution for securing network access from any location.

Privileged Users: Where SASE Falls Short and DAM Completes It

Yet, while SASE excels in providing broad network security coverage and solves broad issues for regular enterprise users, it is not equipped to address the specific requirements of privileged users who wield extensive administrator or superuser privileges. Dynamic Access Management (DAM) addresses the specific needs of privileged users by providing granular control over their access grants and sessions in real time.

sase-dam-side-by-side
Unlike traditional access management approaches, which often rely on static permissions assigned to users once at the beginning of a session, regardless of context, DAM dynamically grants access permissions based on various factors such as user roles, tags, resource type, via an auditable approval workflow. 

For privileged users that require permission to perform sensitive actions on critical resources, DAM ensures they only have access to those resources and data when they need it, and only for the required duration. Combined with Continuous Authorization, it can dynamically change the access aperture based on changing circumstances, such as revoking access immediately if suspicious activity is detected, or restricting elevated permissions further on the resource or for a specific action.

SASE and DAM in Harmony

Now, there are distinct differences between SASE and DAM. Organizations deploy SASE to govern access from their enterprise users and use PAM for their privileged users. Think of it this way: Motorized vehicles are all forms of transportation, but you need to pick the right one for the right job—you may drive your minivan on a family vacation, and then switch to driving a truck to make deliveries. 

Combining SASE with DAM

By combining DAM with a SASE framework, organizations can extend the benefits of SASE to privileged users, ensuring that they receive the appropriate level of access control and security measures tailored to their specific requirements. This ensures that while SASE provides broad network security coverage for all users in an enterprise, DAM addresses the unique needs of privileged users, enhancing overall security posture and minimizing the risk of insider threats or unauthorized access.

sase-dam-table
The StrongDM Dynamic Access Management (DAM) platform precisely controls privileged access within an organization’s infrastructure. Unlike the broad scope of SASE, DAM operates at a granular level, offering fine-grained control over user access to and actions on critical resources, databases, and systems. Through Continuous Authorization, StrongDM ensures that access permissions are dynamically adjusted based on real-time user behavior and contextual data.

Now, just like my mother’s children, whom she claims to love all the same (except that time my “science” experiment almost set the house on fire; love was suspended for about 36 hours), SASE and DAM both serve critical needs in the CISOs portfolio. It’s just a matter of what you’re trying to achieve and the rigor you’re trying to accomplish it. 

The StrongDM DAM platform does what traditional SASE solutions are not designed to do. Again, this isn’t a fault or limitation of SASE; it was designed for a broader set of enterprise needs and falls short in addressing the specific requirements of privileged users with extensive access privileges. StrongDM’s granular control mechanisms empower organizations to manage privileged access and actions with precision, mitigating the risk of insider threats and unsanctioned actions.

Complementary Components

It's important to note that StrongDM is not a replacement for SASE but a complementary component within the broader security framework (and the same is true for SASE; it cannot replace, nor mimic what DAM provides). As organizations embrace the depth and breadth of SASE capabilities, they begin to recognize the need for both SASE and DAM to effectively manage access. They are able to enhance their security posture by integrating the StrongDM DAM model to address the very unique challenges associated with privileged access management.

StrongDM's Continuous, Contextual Policy-based Authorization

StrongDM’s new Continuous, Contextual Policy-based Authorization functionality provides unparalleled granular control for administrator actions. By doubling down on capabilities that enable organizations to enforce stricter access policies and monitor user activities in real time, StrongDM reinforces its position as a leader in DAM.

While SASE helps organizations secure network access in an increasingly distributed and cloud-centric environment, StrongDM’s DAM platform addresses the challenges of privileged access control. Organizations can adopt SASE to protect their Enterprise users, but they need to adopt StrongDM to protect their infrastructure and their applications by ensuring policy based privileged access control to remain in continuous compliance.  

Oh, and good news, our house survived my “science” experiments. 

Want to see StrongDM in action? Book a demo.


About the Author

, Chief Product Officer (CPO), spearheads the StrongDM Dynamic Access Management platform. Previously, he was the Senior Director at Google, leading the Zero Trust and Identity and Access Management portfolio for GCP. His career includes executive roles at Netskope, driving its transition from CASB to SASE, and at Riverbed Technology. Amol was also a founding member at Tablus, a pioneer in Data Loss Prevention. To contact Amol, visit him on LinkedIn.

StrongDM logo
💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

SD-WAN vs. VPN: All You Need to Know
SD-WAN vs. VPN: All You Need to Know
Networking decisions can be challenging, and no one wants to make a costly mistake. The information in this article will help you understand how SD-WAN and VPN compare, so you can decide which option fits your organization best. You can find a networking solution that provides your employees with a secure internet connection while meeting your business needs and budget.
Zero Trust vs. SASE: Everything You Need to Know
Zero Trust vs. SASE: Everything You Need to Know
Concerned about providing secure access to the data and tools employees need to do their jobs in a cloud or hybrid environment? Don’t worry. Solid strategies exist for protecting distributed resources. Zero Trust and SASE are two architectural approaches that provide strong security in today’s cloud-first world. The information in this article will help you decide which strategy works best for your business. Robust cloud security is attainable.
What is Remote Browser Isolation?
What Is Remote Browser Isolation? RBI Explained
In this article, we take a deep dive into Remote Browser Isolation (RBI), its history, and how it works. You'll learn about the common challenges associated with remote browser isolation and its importance in securing users from internet-based cyber threats. By the end of this article, you'll gain a complete understanding of remote browser isolation, as well as how it can be used to complement a Zero Trust framework.
Advanced Threat Protection
Advanced Threat Protection (ATP): All You Need to Know
Advanced threat protection is a type of cybersecurity dedicated to preventing pre-planned cyberattacks, such as malware or phishing. ATP combines cloud, file sharing, email, network, and endpoint security.
The difference between SASE vs SD-WAN
SASE vs. SD-WAN: All You Need to Know
SASE is a cloud-based network security solution, whereas SD-WAN is a network virtualization solution. SASE can be delivered as a service, making it more scalable and resilient than SD-WAN. Additionally, SASE offers more comprehensive security features than SD-WAN, including Zero Trust security and built-in protection against Distributed Denial-of-Service (DDoS) attacks.