AI Thought Leadership

Part 6. The Full AI Security Architecture: Secure the Brain, Secure the Hands, Secure the Memory

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
April 1, 2026

By now you’ve seen the building blocks:

Discovery

Control

Prompt inspection

Model governance

Tool governance

This post ties these pieces into one system that a real enterprise can run.

Securing Enterprise GenAI: From Visibility to Control with Versa Unified SASE

Dhiraj Sehgal
By Dhiraj Sehgal
Senior Director, Product Marketing
March 27, 2026

Generative AI is rapidly becoming embedded in enterprise workflows. Developers use it for code generation, analysts rely on it for research, and business teams leverage it for content creation and productivity. While the efficiency gains are significant, generative AI also introduces a new class of security risks that traditional security architectures were never designed to address.

Part 5 — Securing Tool Access: MCP Server and MCP Gateway (The “Hands” Control Point)

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
March 18, 2026

Most AI incidents don’t start with “bad answers.” They start with “the AI took an action it shouldn’t have.”

That is why tool access matters as much as model access.

Part 4. Securing Model Access: Model Gateway and LLM Proxy (The “Brain” Control Point)

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
March 11, 2026

Parts 1, Part 2, Part 3 focused on visibility, policy, and inspection. Now we are moving into infrastructure. Once AI is in production, model calls become critical traffic. If those calls bypass governance, you lose policy enforcement, visibility, cost control, and consistent inspection. A Model Gateway solves that by acting as the front door for model access. 1) What a Model Gateway is (plain English) A Model Gateway is the “front door” for model traffic. Instead of every team calling model vendors directly, all model requests go through one controlled layer. A Model Gateway can: If a model is the…

Part 3. Prompt Inspection: How You Stop Data Leaks and Prompt Injection

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
March 4, 2026

Prompt inspection is not just “keyword filtering.” It is security inspection for AI interactions. The goal is to stop AI from becoming a silent data leak path or a pathway to unsafe actions.

Intelligent Edge: The Future of Branch and Campus in the AI Era

Rajesh Kari
By Rajesh Kari
Director, Product Marketing
March 3, 2026

Distributed intelligent computing has arrived. Processing power, data, and intelligence are no longer confined to centralized cloud or data centers. Instead, they are distributed across data centers, cloud, edge locations, campuses, branches, and even devices. While prior phases of computing, internet, mobility, and cloud fundamentally reshaped how we live and work, this next phase is poised to have an even more profound impact.

AI-Generated Malware Like VoidLink: Why Architecture, Not Hype, Is the Real Defense — and How Versa SASE Delivers It

Dhiraj Sehgal
By Dhiraj Sehgal
Senior Director, Product Marketing
February 27, 2026

Recent reporting on VoidLink, a Linux malware framework reportedly developed almost entirely with the assistance of generative AI, marks a structural shift in the threat landscape. According to coverage in CSO Online, VoidLink’s development cycle, code organization, and modular design strongly suggest AI-assisted creation — compressing what historically required months of coordinated engineering into days of automated iteration. This is where Versa SASE, combined with GenAI usage controls, provides a grounded and enforceable defensive posture.

Part 2. GenAI Control: Who Can Use What, With What Data, and Under What Rules 

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
February 25, 2026

Control means setting clear rules for AI usage and enforcing them in a way that does not break the business. This is the point where many companies get stuck. Some teams over-block and kill adoption. Other teams do nothing and accept silent risk. The goal is neither. The goal is safe adoption by default.

Part 1. The New AI Perimeter: Discovery and Inventory for GenAI

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
February 18, 2026

AI is showing up everywhere in the enterprise sometimes through approved tools and sometimes through “shadow AI.” The first step to securing it is simple: if you cannot see AI usage, you cannot secure it. This post explains what to discover, why it is hard, and what to do in the first 30 days.

Why SD-WAN Is Becoming Essential for AI Access in the Enterprise 

Rajesh Kari
By Rajesh Kari
Director, Product Marketing
February 13, 2026

AI applications are no longer tools used by a few teams for productivity or collaboration. They are rapidly becoming tools that help build core IT systems across every industry. From generative AI to NLP powered copilots to predictive analytics, enterprises are embedding AI into everyday operations, customer engagement and decision-making. 


Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.