We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept

Home > Resources Center > Blog


TrueCONNECT™ SASE: Realizing Comprehensive Network Protection


TrueCONNECT™ SASE: Realizing Comprehensive Network Protection

The revolution in business operation motivated the prevalence of remote office and the development on cloud-network convergence, SD-WAN and edge computing. As the enterprise network applications keep transforming, it is hard to satisfy the diverse needs of distributed enterprises with traditional network infrastructure. They need a secure and stable network that can enhance agility and responsiveness, whereas minimizing threats of vulnerability and operating cost.

Leveraging the global resources , CITIC Telecom CPC launched TrueCONNECT™ SASE service to satisfy the rising security demands. The service is built upon a new paradigm to distributed infrastructure that secures and simplifies networks with an optimized topology, relocating security protection to the network perimeter and reducing complexities. Flexibility, trust and scalability are improved with a granular, identity-based access model.

TrueCONNECT™ SASE targets at SD-WAN users, which allows an integration with TrueCONNECT™ Hybrid SD-WAN service to achieve intelligent connectivity. It is unlike traditional practices that overlay SD-WAN, firewalls, IPS and multiple network and security solutions, instead, it realizes a more secure and robust SD-WAN service and reduce management challenges. Through the flexible and user-friendly SD-WAN orchestrator tool, distributed enterprises can directly and automatically steer network traffic that links all evolving edges, including headquarters, branch offices, datacenters and cloud edges.

SASE with Zero Trust Networking

Based on Zero Trust Network Access (ZTNA), our TrueCONNECT™ SASE service firmly adheres to the ”Never Trust, Always Verify” principle, which differs from “Trust But Verify” as in traditional edge models. In other words, ZTNA enables enterprises to reduce exposure on cloud platforms and keep the core assets out of views, further enhancing their security. Here are the three advantages of our service over traditional network and security infrastructure:

  • 。Zero Attack Surface: Applications has no exposure on the Internet, which is unreachable for cyberattack
  • 。Zero network access: Connect users to apps, not corporate networks, to prevent lateral movement
  • 。Zero passthrough connections: Proxy architecture for better cyber threat and data protection.

Accelerate Digital Transformation with Evolved SD-WAN

The security of SD-WAN has alarmed enterprises as it becomes more common, especially with the new normal of remote offices and mobile businesses under the pandemic. The new working arrangement intensifies security threats and vulnerabilities, putting data assets in danger. To ensure information security, enterprises are recommended to access them with a trustworthy network.

Through ZTNA, TrueCONNECT™ SASE service can achieve a more secure SD-WAN network topology integrated with our intelligent SD-WAN solution. Hence, enterprises can enjoy working with an optimized and agile network with highest level of security.


  • 。Globally Distributed Comprehensive Security
    • Protects digital assets, user devices and ensures business continuity with a direct-to-cloud security stack that is robust, responsive and available at all points of access
  • 。Immediately Responsive Full Spectrum Security
    • Offers full range of protective measures to detect and immediately neutralize threats anywhere across the network for all users
  • 。Full SSL and Content Inspection
    • Provides total content visibility via full SSL inspection across all ports and protocols, with only microseconds of delay
  • 。Scalability and Seamless Integration
    • Easily scales its integrated policies and contextual threat visibility to accommodate additional users, security, and other business needs
  • 。Zero Trust Network Access (ZTNA) Capability
    • Offers identity-based authentication and granular access control to empower enterprises with secure private access to cloud-native platforms or applications

While enterprises are bound to accelerate business development through digital transformation, adopting traditional infrastructure will bring productivity loss, higher cost and complexity. Whether it be applications, networks or security, enterprises need to advance digital transformation with a more robust solution, just as ours. With extensive resources, global services support and multi-industry experiences, CITIC Telecom CPC is committed to customizing your ICT solutions to actualize your digital transformation journey.

Contact Us
Company Name:
Contact Name:
Contact Phone Number:



Please slide to verify

Products & Services
Networking Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services Europe Solutions
Architecture, Engineering & Construction Automobile BFSI Logistics & Transportation Manufacturing Legal & Accounting Services Retail Healthcare
Technology & Services
Consulting Services Customer Services
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories Blog
About Us
Our Company Global Ecosystem Partners News Center Accreditation & Awards Careers
Contact Us

General Enquiry / Sales Hotline +60 3 2280 1500

Service Hotline +60 03 2280 1488

Contact Us

Follow Us

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Thank you for your enquiry.

We will contact you shortly.
Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.