{"id":25281,"date":"2025-02-14T16:21:55","date_gmt":"2025-02-14T21:21:55","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=25281"},"modified":"2025-09-29T02:15:18","modified_gmt":"2025-09-29T06:15:18","slug":"sase-strengthens-edge-device-security","status":"publish","type":"post","link":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/security\/sase-strengthens-edge-device-security\/","title":{"rendered":"How SASE strengthens edge device security"},"content":{"rendered":"<p><em>This blog, authored by Sherweb&#8217;s Cybersecurity Technical Fellow <a href=\"https:\/\/www.sherweb.com\/blog\/tag\/author-roddy-bergeron\/\">Roddy Bergeron<\/a>, explores how SASE enhances edge device security strategies to help IT providers mitigate risks and future-proof their networks.<\/em><\/p>\n<p>Edge device attacks are no longer a hypothetical threat; they\u2019re an active battleground for <a href=\"https:\/\/www.sherweb.com\/blog\/category\/security\/\">cybercriminals<\/a>. VPN gateways, firewalls, and routers\u2014once trusted access points\u2014are now prime targets. If MSPs don\u2019t rethink security strategies, they risk being the next headline.<\/p>\n<p>In February 2025, the <a href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/security-considerations-edge-devices-itsm80101\"><strong>Canadian Centre for Cyber Security<\/strong><\/a> published new guidance on security considerations for edge devices, emphasizing how cybercriminals are increasingly targeting these critical network components. Edge devices, such as virtual private network (VPN) gateways, firewalls and routers serve as critical entry points between internal networks and external untrusted environments (like the internet) making them prime targets for exploitation.<\/p>\n<p>A recent example is <a href=\"https:\/\/www.crn.com\/news\/security\/2025\/5-latest-updates-on-the-2025-ivanti-vpn-attacks\">the wave of attacks on VPN gateways<\/a>, where cybercriminals exploited unpatched vulnerabilities to gain access to corporate networks, leading to significant data breaches. The reality is clear: MSPs need to reinforce edge security now to mitigate risk and stay ahead of evolving threats.<\/p>\n<h2><strong>The biggest risks to edge devices (and what you can do about them)<\/strong><\/h2>\n<p>Cybercriminals target edge devices through well-known weaknesses. Understanding these risks is the first step in defense.<\/p>\n<h3><strong>Key threats to edge devices:<\/strong><\/h3>\n<ol>\n<li><strong>Misconfigurations and mismanagement:<\/strong> Improper <a href=\"https:\/\/www.sherweb.com\/blog\/security\/multi-factor-authentication\/\">configuration or management<\/a> can expose vulnerabilities, allowing unauthorized access or control.<\/li>\n<li><strong>Vulnerability exploitation:<\/strong> <a href=\"https:\/\/www.sherweb.com\/blog\/security\/business-email-compromise\/\">Attackers often exploit known vulnerabilities<\/a> in edge device software to gain unauthorized access or disrupt services.<\/li>\n<li><strong>Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks:<\/strong> Overwhelming edge devices with excessive traffic can render them unresponsive, disrupting network availability.<\/li>\n<li><strong>Web-based application vulnerabilities:<\/strong> Flaws in web-based interfaces of edge devices can be exploited to gain unauthorized access or control.<\/li>\n<li><strong>Default configuration settings:<\/strong> <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/copilot-security-concerns\/\">Using default settings<\/a> can leave devices vulnerable, as these defaults are often well-known to attackers.<\/li>\n<\/ol>\n<p>Protecting these vulnerable access points is essential to ensuring <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/msp-compliance-best-practices-for-success\/\">security and compliance<\/a> across client networks.<\/p>\n<h2><strong>How SASE reinforces edge security<\/strong><\/h2>\n<p>Traditional perimeter-based security models are no longer sufficient. MSPs must adopt a proactive, adaptive approach\u2014this is where Secure Access Service Edge (SASE) comes in.<\/p>\n<p>SASE is a cloud-native security architecture that consolidates multiple security functions\u2014including <a href=\"https:\/\/support.perimeter81.com\/docs\/secure-web-gateway\">Secure Web Gateway<\/a> (SWG), <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-a-cloud-access-security-broker-casb\">Cloud Access Security Broker<\/a> (CASB), <a href=\"https:\/\/www.techtarget.com\/searchnetworking\/definition\/firewall-as-a-service-FWaaS\">Firewall as a Service<\/a> (FWaaS), and <a href=\"https:\/\/www.sherweb.com\/blog\/security\/zero-trust-security-model\/\">Zero Trust Network Access<\/a> (ZTNA)\u2014into a single service model.<\/p>\n<h3><strong>Before SASE:<\/strong><\/h3>\n<ul>\n<li>MSPs juggle multiple disconnected security tools, increasing misconfigurations.<\/li>\n<li>VPN reliance creates bottlenecks and expands attack surfaces.<\/li>\n<li>Remote access security is inconsistent, exposing clients to lateral movement attacks.<\/li>\n<\/ul>\n<h3><strong>After SASE:<\/strong><\/h3>\n<ul>\n<li>Unified policies prevent gaps and misconfigurations.<\/li>\n<li>ZTNA ensures only the right users access critical applications.<\/li>\n<li>Continuous security updates reduce exposure to zero-day threats.<\/li>\n<\/ul>\n<h2><strong>Why strategy matters more than tools<\/strong><\/h2>\n<p>Rather than focusing solely on having <a href=\"https:\/\/www.sherweb.com\/blog\/security\/cyberattack-costs\/\">security tools<\/a>, MSPs need a strategic approach to deploying them effectively. SASE enables IT providers to close security gaps, reduce attack surfaces, and provide clients with a future-proof security framework that evolves alongside emerging threats.<\/p>\n<h3><strong>SASE\u2019s core advantages for edge security:<\/strong><\/h3>\n<ol>\n<li><strong>Unified security management:<\/strong> SASE provides a centralized platform for managing security policies across the network, reducing the risk of misconfigurations and ensuring consistent policy enforcement.<\/li>\n<li><strong>Continuous threat monitoring and automatic updates:<\/strong> By leveraging cloud-native capabilities, SASE solutions offer real-time monitoring and automatic updates to address emerging vulnerabilities, minimizing the window of exposure to potential exploits.<\/li>\n<li><strong>DDoS protection:<\/strong> Integrated security services within SASE can detect and mitigate DoS and DDoS attacks, maintaining network availability and performance. Cloud flexibility allows overstressed resources to expand or contract as needed as well as provide failover.<\/li>\n<li><strong>Secure access controls:<\/strong> With ZTNA, SASE enforces strict access controls, ensuring that only authenticated and authorized users can access specific applications and services, thereby reducing the risk associated with default or weak configurations.<\/li>\n<li><strong>Adoption of Zero Trust<\/strong> \u2013 By only allowing granular access and following least privilege access methods, SASE reduces the footprint an attacker can use to exploit vulnerabilities or gain access to data. This can help companies more easily adopt a zero trust strategy.<\/li>\n<\/ol>\n<h2><strong>SASE as a competitive advantage<\/strong><\/h2>\n<p>SASE isn\u2019t just about security\u2014it\u2019s about business transformation. MSPs that integrate SASE deliver scalable, adaptive security solutions that protect clients while enhancing service efficiency. Instead of constantly reacting to threats, IT providers can focus on growth, innovation, and strengthening client relationships.<\/p>\n<p>Unlike complex enterprise solutions that require months of integration, Sherweb makes SASE adoption straightforward. Our cloud marketplace simplifies procurement, and our expert team helps MSPs deploy security faster, with less overhead.<\/p>\n<h2><strong>Why now? Elevating security and business growth<\/strong><\/h2>\n<p>Cyber threats aren\u2019t slowing down, and neither should your security strategy. SASE aligns with best practices by:<\/p>\n<ul>\n<li><strong>Scalability<\/strong> \u2013 Grows alongside your clients&#8217; evolving needs.<\/li>\n<li><strong>Cost efficiency<\/strong> \u2013 Consolidates security tools into a unified, streamlined platform, reducing overhead.<\/li>\n<li><strong>Improved performance<\/strong> \u2013 Reduces latency and optimizes network performance through dynamic security services.<\/li>\n<\/ul>\n<blockquote><p><em>\u201cCyber threat actors have increasingly exploited vulnerabilities in edge devices to compromise organizations worldwide.\u201d<\/em> \u2013 <a href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/security-considerations-edge-devices-itsm80101#considerations\">Canadian Centre for Cyber Security<\/a><\/p><\/blockquote>\n<p>Cybersecurity is shifting from castle-and-moat defenses to dynamic, adaptive perimeters. Traditional security was like locking doors and hoping for the best. SASE is like facial recognition at every entry point\u2014constantly verifying who\u2019s coming in and shutting down suspicious activity before it starts.<\/p>\n<p>The best IT providers aren\u2019t just solving today\u2019s security challenges\u2014they\u2019re preparing for tomorrow\u2019s threats. Secure your clients&#8217; networks with SASE today and establish yourself as a cybersecurity leader.<\/p>\n<p><em>If securing edge devices is on your radar, it&#8217;s time to take the next step. <a href=\"https:\/\/www.sherweb.com\/security\/check-point-harmony-sase\/\">Explore how SASE fits into your long-term security strategy<\/a> and how it can position you as a leader in the cybersecurity space.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog, authored by Sherweb&#8217;s Cybersecurity Technical Fellow Roddy Bergeron, explores ho","protected":false},"author":188,"featured_media":25285,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[1121,919,1102,1104,1103,1122],"class_list":["post-25281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-author-roddy-bergeron","tag-cybersecurity","tag-edge-device-attacks","tag-sase","tag-secure-access-service-edge","tag-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How SASE strengthens edge device security | Sherweb<\/title>\n<meta name=\"description\" content=\"IT providers need stronger edge device security strategies. See how SASE mitigates threats and future-proofs network protection. Learn more\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How SASE strengthens edge device security | Sherweb\" \/>\n<meta property=\"og:description\" content=\"IT providers need stronger edge device security strategies. See how SASE mitigates threats and future-proofs network protection. Learn more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-14T21:21:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-29T06:15:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roddy Bergeron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roddy Bergeron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/\"},\"author\":{\"name\":\"Roddy Bergeron\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"headline\":\"How SASE strengthens edge device security\",\"datePublished\":\"2025-02-14T21:21:55+00:00\",\"dateModified\":\"2025-09-29T06:15:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/\"},\"wordCount\":938,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg\",\"keywords\":[\"Author: Roddy Bergeron\",\"Cybersecurity\",\"Edge Device Attacks\",\"SASE\",\"Secure Access Service Edge\",\"Thought Leadership\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/\",\"url\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/\",\"name\":\"How SASE strengthens edge device security | Sherweb\",\"isPartOf\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#primaryimage\"},\"thumbnailUrl\":\"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg\",\"datePublished\":\"2025-02-14T21:21:55+00:00\",\"dateModified\":\"2025-09-29T06:15:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795\"},\"description\":\"IT providers need stronger edge device security strategies. See how SASE mitigates threats and future-proofs network protection. Learn more\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#primaryimage\",\"url\":\"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg\",\"contentUrl\":\"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg\",\"width\":2400,\"height\":920,\"caption\":\"Edge device security strategies, SASE, Check Point Harmony SASE\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sherweb.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\/\/www.sherweb.com\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How SASE strengthens edge device security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#website\",\"url\":\"https:\/\/www.sherweb.com\/blog\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795\",\"name\":\"Roddy Bergeron\",\"description\":\"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/\"],\"url\":\"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/roddy-bergeron\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How SASE strengthens edge device security | Sherweb","description":"IT providers need stronger edge device security strategies. See how SASE mitigates threats and future-proofs network protection. Learn more","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/","og_locale":"en_US","og_type":"article","og_title":"How SASE strengthens edge device security | Sherweb","og_description":"IT providers need stronger edge device security strategies. See how SASE mitigates threats and future-proofs network protection. Learn more","og_url":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2025-02-14T21:21:55+00:00","article_modified_time":"2025-09-29T06:15:18+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg","type":"image\/jpeg"}],"author":"Roddy Bergeron","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"Roddy Bergeron","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/"},"author":{"name":"Roddy Bergeron","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"headline":"How SASE strengthens edge device security","datePublished":"2025-02-14T21:21:55+00:00","dateModified":"2025-09-29T06:15:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/"},"wordCount":938,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg","keywords":["Author: Roddy Bergeron","Cybersecurity","Edge Device Attacks","SASE","Secure Access Service Edge","Thought Leadership"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/","url":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/","name":"How SASE strengthens edge device security | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg","datePublished":"2025-02-14T21:21:55+00:00","dateModified":"2025-09-29T06:15:18+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795"},"description":"IT providers need stronger edge device security strategies. See how SASE mitigates threats and future-proofs network protection. Learn more","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#primaryimage","url":"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg","contentUrl":"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-2.jpg","width":2400,"height":920,"caption":"Edge device security strategies, SASE, Check Point Harmony SASE"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/sase-strengthens-edge-device-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"How SASE strengthens edge device security"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/f6a0c8e1d541dbeb57fd3e025b325795","name":"Roddy Bergeron","description":"Roddy Bergeron's career has taken various paths including government auditing, nonprofit work, public\/private partnerships with the State of Louisiana, helping build an MSP by building their managed service, managed security, vCISO and compliance programs, and now as the Cybersecurity Technical Fellow with Sherweb. Roddy has obtained many certifications over the years including his MCSE, CCNA:Security, CEH, CCSP, CISSP and CSAP. Our MSP community is extremely important to Roddy and he loves giving back to the community that has helped him out so much over the years. Roddy hopes to continue to help other MSPs succeed and raise the cybersecurity tide for our industry.","sameAs":["https:\/\/www.linkedin.com\/in\/roddy-bergeron-cissp-ccsp-csap-33432573\/"],"url":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/author\/roddy-bergeron\/"}]}},"tag_names":["Author: Roddy Bergeron","Cybersecurity","Edge Device Attacks","SASE","Secure Access Service Edge","Thought Leadership"],"_links":{"self":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/users\/188"}],"replies":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/comments?post=25281"}],"version-history":[{"count":3,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25281\/revisions"}],"predecessor-version":[{"id":25550,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/posts\/25281\/revisions\/25550"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media\/25285"}],"wp:attachment":[{"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/media?parent=25281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/categories?post=25281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/r-swca2-app15-sherwebbl-change-font-czgcf8cmcjh3asb3.canadacentral-01.azurewebsites.net\/blog\/wp-json\/wp\/v2\/tags?post=25281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}