Company Updates

Least Privilege Access: The Cornerstone of Zero Trust Network Access (ZTNA) 

Versa Staff
By Versa Staff
Versa Networks
June 6, 2024

Least Privilege Access (LPA) is the foundation of Zero Trust Network Access (ZTNA), ensuring users, applications, and devices only receive the minimum access necessary to perform their tasks—reducing attack surfaces, preventing lateral movement, and strengthening security posture against evolving cyber threats. This blog explores why LPA is critical to ZTNA and how organizations can implement it effectively with Versa’s security solutions.

Evolving Threats, Intelligent Responses: AI and SSE in Versa’s SASE Strategy

The sophistication and frequency of threats necessitate a dynamic and intelligent approach to cyber defense. Artificial Intelligence (AI) combined with Secure Service Edge (SSE) is a pivotal element in this defense strategy, especially within the context of a Secure Access Service Edge (SASE) framework. In this blog, we will explore how Versa Networks leverages these powerful tools to provide advanced data protection and maintain a robust security posture in the face of such evolving threats. Introduction to the Evolving Threat Landscape and the Role of AI and SSE in Data Protection Traditional security measures struggle to keep up with this…

Securing GenAI Usage with Versa’s GenAI Firewall

Anusha Vaidyanathan
By Anusha Vaidyanathan
Sr. Director, Product Management
May 6, 2024

Versa GenAI Firewall safeguards sensitive data from being uploaded into Generative AI tools (e.g. ChatGPT) while limiting shadow use cases of GenAI. It manages, monitors, and reports how your organization uses GenAI – including assessments on the riskiness of apps, controlling access, and preventing unauthorized data movement. Securing Generative AI Applications: Beyond LLMs While ensuring security for large language models (LLMs) is necessary to facilitate the adoption of GenAI applications within organizations, it is equally crucial to address broader concerns related to generative AI. Let’s delve into additional considerations: User-to-Application Access Control: Context: Generative AI tools are often accessed by…

Building Context with UEBA relationship graphs, using GraphML

Sridhar Iyer
By Sridhar Iyer

May 2, 2024

Versa UEBA incorporates GraphML to generate insights and detect anomalies in user relationship graphs. Anomaly and behavior detections are just the first step. We then need to quickly pivot into building the forensics to inform response and remediation. This can involve determining the origination point of a malicious activity or an attack and building the scope and scale of a potential breach.

Data Defense in Depth: Unifying Data Protection and Zero Trust through SASE for Ultimate Data Protection with Versa Networks

In the rapidly evolving landscape of cyber threats, data protection has become a priority concern. Traditional security models are proving inadequate in the face of sophisticated attacks, leading organizations to seek out more dynamic and robust approaches to securing their data. The integration of Secure Access Service Edge (SASE) and Zero Trust architectures offers a promising approach to modern cybersecurity challenges. In this blog, we delve into how Versa Networks merges SASE and Zero Trust to ensure the protection of data in today’s landscape.

CyberRatings.org Recommends Versa Networks as a Top Tier Next Generation Firewall for Cloud Deployments

Jon Taylor
By Jon Taylor
Director and Principal of Security, Versa Networks
April 3, 2024

Cloud security is mission critical especially in an environment where cyber threats have evolved in frequency and sophistication like never before making the need for highly efficient and robust cloud firewall solutions is undeniable. CyberRatings.org (CRO) is a cyber assessment firm focused on providing independent, objective ratings of security product efficacy based on real-world testing. They just finished a rigorous evaluation of eleven vendors in the Cloud Network Firewall space, including the Versa Next Generation Firewall (NGFW) for cloud deployments. This detailed analysis tested Cloud Firewall performance for key capabilities across: Versa NGFW was rated in the top 3 products…

Securing IoT Devices on Mobile Networks

Rahul Vaidya
By Rahul Vaidya
Director, Product Management
February 22, 2024

Securing the over three billion IoT devices globally connected to corporate systems via mobile networks presents a formidable and growing challenge for organizations worldwide. Driven by the adoption of newer IoT-specific cell technologies like LTE-M, NB-IoT, and LTE-Cat 1, along with a boom in 5G module shipments as older 2G and 3G modules are phased out, the number of cell-connected IoT devices is growing 27 percent a year, taking market share from Wi-Fi and Bluetooth connections. My recent collaboration with the network and security team of one of our industrial customers provided a front-row seat to the complexities of safeguarding…

Private SASE – For Those Who Need to Build Their Own!

Anuj Dutia
By Anuj Dutia
VP, Global Solutions Strategy
February 15, 2024

Introduction: Interest in SASE has exploded with CIOs and CISOs alike. The promise of dramatic cost reductions, security improvements and improved agility delivered by a converged networking (SD-WAN) and security (SSE) infrastructure is compelling. However, today’s SASE solutions are commonly delivered on a shared global infrastructure of PoPs provisioned by a handful of technology vendors. This approach doesn’t always meet everyone’s requirements. A “shared” SASE approach is generally good enough for many companies, delivering unified networking and security capabilities with fast time to market and cloud/SaaS economics. But because these shared services lack any ability to control and manage service…

Three Reasons Why Zero Trust Edge Will Supercharge the U.S. Department of Defense’s Move to a Zero Trust Architecture

Cyber adversaries will stop at nothing to compromise any military systems, data, and missions. That’s why the U.S. Department of Defense (DOD) is adopting zero trust—a security framework that presumes networks are compromised and counters threats by design. All DOD organizations are expected to achieve “Target Level” Zero Trust Architecture by 2027. This requires multiple security functions to identify, authenticate, and authorize users or devices based on posture to securely connect to applications. As a result, the DOD turned to Booz Allen and Versa Networks to develop a security hardened Zero Trust Edge approach that will transform the DOD’s infrastructure…

Versa Networks Selected by DISA’s Thunderdome Program to Deliver Cutting-Edge SD-WAN and Zero Trust Access

Versa Staff
By Versa Staff
Versa Networks
December 6, 2023

Zero Trust is widely considered to be the future of security for protecting networks, systems and data in both commercial and public sector organizations. The U.S. Department of Defense (DoD) has been making significant strides in modernizing its cybersecurity infrastructure in response to a presidential mandate to adopt a Zero Trust architecture.


Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.