Industry Insights

ISACA Survey Points to Growing Threats and Lack of Automation 

Kevin Sheu
By Kevin Sheu
VP of Product Marketing
October 14, 2024

This latest survey is more confirmation that an oft-mentioned reality continues to be true – that the nature of threats keeps advancing and organizations frequently find themselves falling further and further behind. Far and away, the top reason given for increased stress isn’t low budgets or lack of training or failure of company leadership to prioritize security – even though these are among the reasons cited – it’s the “threat landscape is increasingly complex,” listed by 81 percent of respondents, nearly double the next-closest response.

Protect & Reduce Attack Surface at the Network Edge

Brad LaPorte
By Brad LaPorte

September 12, 2024

Understanding the cyber attack surface Historically, the “attack surface” was limited to well-known points of external exposure—the traditional perimeter of websites, external IP addresses, and endpoints. Our cyber attack surface has expanded dramatically over the past five years, now encompassing our cloud estate, millions of devices at the edge, and mobile and remote workers, in addition to our internet-facing infrastructure. This expansion of the definition to include cloud, end-user, and internal assets has been driven by the increasing sophistication of cyber attacks. The table below breaks down today’s complex attack surface into several categories, based on a framework presented by…

What is Zero Trust Security? | Core Principles of Zero Trust Model

Janak Panchal
By Janak Panchal
Strategy Analyst
August 15, 2024

Zero Trust is a cybersecurity paradigm that assumes no user, device, or network segment is inherently trustworthy—even if it’s inside the corporate perimeter. Instead of granting implicit trust based on location or network membership, Zero Trust requires every access attempt to be verified and authorized, reducing the attack surface and preventing lateral movement by attackers.

CrowdStrike Outage: Latest Updates and Best Practices 

Naganathan S J
By Naganathan S J
Staff Security Engineer - Research
July 19, 2024

Today, CrowdStrike reported a significant outage affecting multiple services, including their Falcon platform. The CrowdStrike team is actively working to resolve the issue and restore full functionality. Users are advised to monitor CrowdStrike’s official status page for real-time updates and follow any recommended actions provided by the company.

Top 10 Signs You Need a New SSE Solution

Dan Maier
By Dan Maier
Chief Marketing Officer, Versa Networks
June 7, 2024

In today’s hyper-connected digital landscape, enterprises need to have a robust and cost-effective Security Service Edge (SSE) solution to combat increasingly sophisticated cyber threats and to support digital transformation.

To 100G and Beyond: The Next Frontier for SASE

Rajoo Nagar
By Rajoo Nagar

January 24, 2024

To 100G and Beyond: The Next Frontier for SASE In the ever-evolving landscape of enterprise networking and security, a significant transformation is underway. Siloed, point product infrastructures are giving way to a Secure Access Service Edge (SASE) approach, driven by the rapid adoption of cloud technologies, the increased reliance on collaboration tools, and the emergence of hybrid work models.

Unlocking the Power of SD-WAN and Hyperscalers‘ Backbone Highways

Matej Kultan
By Matej Kultan
Systems Engineer, Versa Networks
January 5, 2024

In today’s digital era, businesses require seamless connectivity and optimal application performance across their globally dispersed sites to stay productive. Combining Versa Networks Software-Defined Wide Area Networking (SD-WAN) with Hyperscalers‘ “private highways” is an innovative approach to achieve this goal.

You know you need a new SD-WAN when…

Dan Maier
By Dan Maier
Chief Marketing Officer, Versa Networks
December 14, 2023

Looking to learn the signs why its time to consider a new SD-WAN? Explore the key indicators that your current SD-WAN might be falling short here!

Versa Secure SD-WAN and AWS Cloud WAN Tunnel-Less Connect

Leo Jiao
By Leo Jiao
Sr. Systems Engineer. Versa Networks
October 24, 2023

Today, AWS announced Tunnel-less Connect on Cloud WAN. This new capability provides customers with a simple, high-performance mechanism to build a global SD-WAN architecture using AWS Global Network as a middle-mile transport network. With this capability, SD-WAN appliances can natively peer with Cloud WAN using Border Gateway Protocol (BGP) without the need for tunneling. Native BGP support between SD-WAN appliances in a VPC and AWS Cloud WAN, without the need for tunnels, simplifies the extension of SD-WAN deployments in AWS cloud and enables access to AWS’ high bandwidth global network for branch-to-cloud connectivity. As part of this announcement, Versa Secure…

The Need for Software Defined Adaptive Micro-Segmentation

Dogu Narin
By Dogu Narin
VP of Product Management, Versa Networks
October 24, 2023

As cyber-attacks become increasingly sophisticated and the likelihood of threats in the infrastructure rise, our customers have explored new ways to not only secure the initial point of access but also mechanisms to continuously monitor their security posture.


Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.