Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1086

SSE

What is SSE?

SSESSE is the security half of SASE — a cloud-delivered bundle of SWG, CASB, ZTNA, and often DLP and FWaaS that protects user traffic to internet, SaaS, and private apps.


Security Service Edge (SSE) is a Gartner-defined subset of SASE that focuses exclusively on the security services, leaving SD-WAN out of scope. A typical SSE platform inspects encrypted user traffic in cloud points of presence and applies a unified policy across three control planes: secure web gateway for internet, cloud access security broker for sanctioned and shadow SaaS, and zero trust network access for private applications. DLP, RBI, and FWaaS are commonly included. Organizations adopt SSE when they want to consolidate VPN, proxy, and CASB tools and apply identity-aware controls to a remote and hybrid workforce without re-architecting their WAN.

Examples

  1. 01

    Replacing a legacy VPN and on-prem proxy with one SSE vendor covering SWG, CASB, and ZTNA.

  2. 02

    Enforcing DLP rules on user uploads to unsanctioned SaaS through an SSE platform.

Frequently asked questions

What is SSE?

SSE is the security half of SASE — a cloud-delivered bundle of SWG, CASB, ZTNA, and often DLP and FWaaS that protects user traffic to internet, SaaS, and private apps. It belongs to the Network Security category of cybersecurity.

What does SSE mean?

SSE is the security half of SASE — a cloud-delivered bundle of SWG, CASB, ZTNA, and often DLP and FWaaS that protects user traffic to internet, SaaS, and private apps.

How does SSE work?

Security Service Edge (SSE) is a Gartner-defined subset of SASE that focuses exclusively on the security services, leaving SD-WAN out of scope. A typical SSE platform inspects encrypted user traffic in cloud points of presence and applies a unified policy across three control planes: secure web gateway for internet, cloud access security broker for sanctioned and shadow SaaS, and zero trust network access for private applications. DLP, RBI, and FWaaS are commonly included. Organizations adopt SSE when they want to consolidate VPN, proxy, and CASB tools and apply identity-aware controls to a remote and hybrid workforce without re-architecting their WAN.

How do you defend against SSE?

Defences for SSE typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for SSE?

Common alternative names include: Security Service Edge.

Related terms