MEF SASE Certification – Frequently Asked Questions — 2025 Mar
Primary Resource for: SASE, SASE Certification, SSE Certification, Zero Trust Certification, SD-WAN Certification
Product Portfolio: SSE Certification, SASE Certification, SASE, SD-WAN Certification, Zero Trust Certification
Tags: Certification
Addressing over 40 common questions with links to additional materials.
MEF SASE Certification Data Sheet for Technology Providers — 2025 Feb
Product Portfolio: SASE, SD-WAN Certification, Zero Trust Certification, SSE Certification, SASE Certification
MEF SASE Certification Data Sheet for Service Providers — 2025 Feb
Product Portfolio: SASE, SD-WAN Certification, Zero Trust Certification, SSE Certification, SASE Certification
MEF Certified SASE RFI Template for Enterprises — 2025 Feb
Primary Resource for: SASE, SASE Certification, SSE Certification, Zero Trust Certification, SD-WAN Certification, Enterprise APIs
Product Portfolio: Enterprise APIs, SASE, SD-WAN Certification, Zero Trust Certification, SSE Certification, SASE Certification
This RFI template helps enterprise buyers evaluate certified, standards-based Secure Access Service Edge (SASE) solutions that integrate SD-WAN, Zero Trust, and Security Service Edge (SSE) capabilities.
MEF 138 MEF 138 Security Functions for IP Services — 2024 Jul
Primary Resource for: Cybersecurity, SASE, SASE Certification, SSE, SSE Certification, IP, SD-WAN
Product Portfolio: SASE Certification, Zero Trust Certification, SSE Certification, IP
Standard Type: Service Attributes
This Standard specifies the requirements needed to add Security Functions to an IP Service.
MEF 163 Draft (R3) MEF 163 Draft Release 3 Zero Trust Certification Test Cases and Requirements — 2024 May
Primary Resource for: Zero Trust, Zero Trust Certification
Product Portfolio: Zero Trust, Zero Trust Certification
Standard Type: Test Requirements & Abstract Test Suites
A Zero Trust Framework (ZTF), defined in MEF 118, is a cybersecurity architecture where users or clients (end users, applications, and other nonhuman Users, Devices, and Applications that request information from resources) are authenticated, authorized, and continuously validated before being granted access to, maintaining access to, or performing operations on applications.