October 17, 2022
What does a data breach say about your company? We surveyed 600 IT professionals to see how important cloud security is in 2022. Here’s what they said.
August 28, 2022
GOT was viewed by more than 44 million people. We used Google Trends to discover each state’s favorite Game of Thrones Character and GOT obsessions!
June 24, 2022
With the artificial intelligence industry on a steady rise, companies all over the world are on the active hunt to find IT professionals. But, where will your job search find the most luck?
June 22, 2022
There’s no doubt Americans have a serious love for coffee, but does your flavor preference depend on your location? Read on to find out your state’s pick.
April 26, 2022
Whether it’s scouring social media feeds of professionals, family, friends, or strangers, curiosity fills our minds with questions about others we’d prefer not to ask. But how often?
April 20, 2022
Enterprises are increasingly modernizing by moving their applications portfolio and data to the cloud. To achieve organizational freedom of choice, cost efficiency and global coverage, it is often attractive to use services from multiple different cloud vendors. Yet all these disconnected cloud environments—each with its own tools and nuances—must come together in a single fabric that enforces security, optimizes user experience through efficient best-path routing, maintains uninterrupted access, and simplifies orchestration. This cannot be achieved with sub-optimal backhauling of traffic anchored to an on-prem data center with traditional FW and security devices. Traffic must flow directly from user to cloud…
April 18, 2022
It’s never been easier to launch a cloud service; or to consume such a service. No-friction SaaS applications compete on features because no central network planning or sales cycle is required any longer. Often SaaS applications are sold into a team or a department. Other applications—Dropbox, OneDrive—are picked up by users simply because they significantly enhance worker productivity. Central IT often has no knowledge that these applications are used, how they’re used, or by whom. Traditional perimeter firewalls protect applications and data stored within your on-prem network. FWs additionally filter applications and URLs accessed outside the enterprise. But data stored…
April 3, 2022
Many large enterprises consider their internal networks safe—protected by perimeter firewalls and VPN solutions—and that security threats are primarily present external to their networks. In reality, the enterprise network attack surface has experienced a multifold expansion brought about by trends in work-from-anywhere, Direct Internet Access (DIA), application-and-data migration into the cloud, BYOD, IoT, and increasingly sophisticated hacker attacks with lateral movement. Corporate “internal” networks are often as insecure as “external” networks, if you can even still find the borders between these. ZTNA is a modern network architecture that brings back the security essential to your corporate network. The approach is…
March 16, 2022
Data breaches are on the rise, but are companies properly prepared for this growing threat? We surveyed 1,200 business owners to find out.
September 22, 2021
Gartner announced that Versa Networks is once again a Leader in the Magic Quadrant WAN Edge Infrastructure report. WAN Edge Infrastructure is defined as “products and associated functions that provide network connectivity across the WAN” that includes “incumbent and emerging vendors from adjacent markets (e.g., routing, security, WAN optimization and SD-WAN), each bringing differentiators and limitations. It also includes zero trust network access (ZTNA) functionality for remote workers in lieu of traditional virtual private network (VPN) solutions as part of SASE, which combines SD-WAN and cloud security into an integrated, orchestrated architecture.”