Zero trust edge (sometimes called SASE) is the convergence of network security, identity, and access control into a single cloud-delivered architecture. It is how serious organisations retire VPNs, flat networks, and the implicit trust that has fuelled every major breach of the last decade.
What zero trust edge actually is
A zero trust edge platform sits between users and applications, regardless of where either lives. It authenticates every request, evaluates context (device posture, identity, risk score), and enforces policy before traffic ever reaches the application. The network stops being the perimeter; identity becomes the perimeter.
Five pillars of a zero trust edge architecture
- Identity-aware proxy in front of every internal application.
- Device posture signals — MDM, EDR, compliance checks — fed into policy decisions.
- Granular, per-app access policies, not network subnets.
- Full traffic inspection with DLP for SaaS and internal apps alike.
- Continuous session evaluation — not just login-time auth.
A phased rollout that will not tank productivity
Phase 1 — Foundation (weeks 1–6)
- Stand up a single identity provider. Retire side-door logins.
- Enforce MFA for 100% of employees, including service accounts where possible.
- Deploy EDR + MDM so every device reports posture.
Phase 2 — Access (weeks 6–14)
- Pick three internal apps. Move them behind an identity-aware proxy.
- Write per-app policies based on role, device posture, and risk.
- Turn off direct network access to those apps.
Phase 3 — Scale (months 4–9)
- Decommission the corporate VPN as apps migrate behind ZTE.
- Add DLP, URL filtering, and CASB controls.
- Add continuous re-evaluation triggers: risk score changes, device drift.
Common mistakes that sabotage zero trust edge projects
- Treating it as a network project. Without identity, zero trust is impossible.
- Big-bang migrations. Ship three apps first, then twenty.
- Ignoring service-to-service traffic. Attackers move east-west, not just north-south.
- No user-experience investment. If access is painful, shadow IT explodes.
What to measure
- Percentage of internal apps behind identity-aware access.
- Percentage of endpoints with continuous posture checks.
- VPN sessions retired vs year start.
- Incidents prevented by conditional access policies.