ON PREM VS. SASE: WHICH FIREWALL IS RIGHT FOR YOUR BUSINESS?

Megan Poljacik • March 27, 2025

Three things in life are certain: death, taxes and the persistent threat of cyberattacks. There are many layers of defense in the onion of cyber security, but at the helm is your firewall. Traditionally firewalls have always been the piece of hardware acting as a barrier between your office network and the wilds of the internet. Then in 2020 the way we work was transformed forever by the global pandemic. Nearly a third of the workforce transitioned to remote, leaving offices empty. Many employees continue to work in non-traditional spaces to this day. How can we defend them against cyberattacks if they are outside the protective reach of an on premise firewall?


A firewall is a network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Think of it as a moat with a bridge and a guard shack that surrounds a castle. The guards and the moat are the firewall, acting as a barrier and between a trusted internal network (the castle) and untrusted external networks (random people trying to get in), helping to prevent unauthorized access to and from the castle while allowing legitimate traffic to pass through. The outside forces have to “check in” with the guards before they can cross the moat and access the castle. 





With SASE, short for Secure Access Service Edge, the moat and guards become portable. When using SASE, pronounced "sassy," this software is installed directly on devices to monitor network traffic no matter your location. It functions as a unified security system and network connection, safeguarding users and data while ensuring speedy and dependable access to the internet and cloud-based applications from any location. Just like an on prem firewall it is managed remotely by your admin team.


For most companies, a hybrid solution may be the best option. For example a company may have a central office in Boston with 30 users, but also 3 sales people who travel frequently and need protection. Both SASE and a traditional firewall would be necessary to protect everyone.


Overall, firewalls play a crucial role in enforcing network security policies, controlling traffic flow, protecting against cyber threats, and safeguarding your network, so you must chose wisely!

Uncomplicate IT News Blog

By Megan Poljacik July 31, 2025
In the early 2000s, tensions in the middle east were on the rise. Iran’s government had begun expanding its uranium enrichment capabilities, insisting it was for nuclear energy purposes. However many countries around the globe feared it was a coverup for a nuclear weapons program. Despite pressure from United Nations and the International Atomic Energy Agency, Iran continued to enrich uranium. Frustrations reached a fever pitch and it appeared a conflict was imminent, until a mysterious solution came from a completely unexpected source: the Stuxnet Computer Worm.
By Megan Poljacik June 26, 2025
With growing concerns about data breaches and stolen credentials, many businesses feel pressured to invest in services that claim to scan the dark web for leaked information. But before committing resources, it's worth asking whether these tools actually provide meaningful information or if they are an unproductive expenditure. The dark web is a hidden part of the internet that you can’t reach with standard browsers or search engines. It operates using a system called Tor, which stands for The Onion Router. Tor keeps users anonymous by sending their internet traffic through several different servers around the world, encrypting the data each time. This makes it extremely difficult to trace who someone is or where they’re connecting from. Unlike regular websites that end in .com or .org, dark web sites usually end in .onion and require the Tor browser to access them. While some people use the dark web for legitimate reasons like protecting their privacy or avoiding censorship, it’s mostly associated with hosting illegal activities like online black markets, where stolen corporate data is sold.
By Megan Poljacik May 29, 2025
When it comes to protecting your company’s infrastructure, two commonly used terms often cause confusion: vulnerability management and penetration testing. While they both serve the same purpose of keeping your data secure, they work very differently. Think of your company’s IT infrastructure like a museum that stores priceless artifacts. To keep it secure, you wouldn’t just install locks and hope for the best. You’d want to routinely check those locks, ensure windows are closed properly, and perhaps even hire someone to test how easy it is to break in. This is basically the difference between vulnerability management and penetration testing.