SASE ROI Calculator

SASE can save your company a lot of money. Use the industry’s-first SASE ROI calculator to quantify the cost savings you can achieve in services, asset consolidation, and labor when deploying Versa SASE.

SASE ROI Calculator

SASE can save your company a lot of money. Use the industry’s-first SASE ROI calculator to quantify the cost savings you can achieve in services, asset consolidation, and labor when deploying Versa SASE.

Top Energy Firm Achieves Comprehensive “Work-From-Anywhere” with Versa SASE

A large, publicly traded energy company operating in all areas of the oil and gas industry has dramatically simplified their network stack and realized huge cost savings with Versa SASE.

Availability and Buying Options in the Emerging SASE Market

EMA evaluates the different SASE vendors and their approaches to architecture, go-to-market, and support for their cloud-delivered and hybrid services.

Gartner Magic Quadrant for WAN Edge Infrastructure

Gartner Magic Quadrant report analyzes the various vendors in the WAN edge market and Versa is positioned as a Leader.

Versa Networks - Explained in 1 minute

Learn about the Versa Secure SD-WAN solution in a high-level, one minute overview.

Versa SASE (Secure Access Service Edge)

SASE is the simplest, most scalable way to continuously secure and connect the millions points of access in and out of the corporate resources regardless of location.

Versa Secure SD-WAN – Simple, Secure, and Reliable Branch to Multi-Cloud Connectivity

Versa Secure SD-WAN is a single software platform that offers multi-layered security and enables multi-cloud connectivity for Enterprises.

The Modern Secure
Network Blog

Industry Insights

The Internet of Everything Insecure

By Versa Staff
Versa Networks
March 20, 2018

“Security by design is a mandatory prerequisite to securing the IoT macrocosm, the Dyn attack was just a practice run.” – James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology.

Remember the 21st of October 2016? A series of carefully mastered DDoS attacks paralyzed internet services on the East Coast, affecting the businesses of market giants like Amazon, Netflix, PayPal, Starbucks, Verizon, Visa – the actual list is longer, and pretty impressive.

The US Department of Homeland Security launched an investigation and it revealed that the extremely sophisticated attack was a botnet that spread through a large number of Internet of Things-enabled (IoT) devices, including cameras, residential gateways, and baby monitors, which had been infected with the Mirai malware.

Later, a Forbes article reported that the attack was likely the brainchild of ‘ an angry gamer’.

Puns aside, if an angry gamer can bring down some of the biggest companies of the world down in a day, that gives every organization with IoT plans a lot to worry about.

Surviving in a World of IoT Enabled Complexity

History chronicles that the invention of the wheel changed the course of human civilization. The impact of IoT is perceived to be of similar, if not greater, proportions. However, the concept of millions of ‘smart’ interconnected devices raises a security concern of similar magnanimity. IoT will introduce thousands of new threat vectors simply by increasing the number of networked entry points. The security risks increase exponentially, and the attack vector or surface is—in theory—potentially limitless.

In addition, there is a huge variety of different (sometimes obsolete) operating systems, programming languages, and hardware. If you thought that the networks have become complicated after cloud, wait till you see this one!

In a 2017, a study tittle ‘The Internet of Hackable Things’ , researchers at the Technical University of Denmark, Denmark; Orebro University, Sweden; and Innopolis University, Russian Federation found that :

  • 80% of devices, along with their cloud and mobile components, did not require a complex password
  • 70% of devices, along with their cloud and mobile components, enabled an attacker to identify valid user accounts through enumeration
  • 70% of devices used unencrypted network services;
  • 6 out of 10 devices that provided user interfaces were vulnerable to a range of weaknesses, such as persistent XSS1 and weak credentials

It can be safely said that IoT opens up the enterprise to an increased risk of falling prey to malicious attacks. Forget about securing individual devices, it would be a herculean task to even have a clear idea of how many of these devices are connecting to your enterprise networks and from what sources. So how does one prepare a defence when they don’t have a clue about where the attack is going to come from?

According to a Forrester study, 77% of respondents admit that increased usage of IoT devices creates significant security challenges and IoT is forcing 76% of surveyed security leaders to re-assess how they secure their enterprise networks.

Why networks, you would ask.

It is obvious that it is practically impossible to secure the plethora of devices individually. Moreover, apart from connecting to your enterprise network, some of these devices connect to the cloud, other third-party devices or systems beyond your firewall. Strengthening your enterprise network, that acts as the underlying carrier for all the data that these devices transmit, is your best possible line of defence.

The Need for a New WAN

Existing legacy WAN architectures are inadept at handling the havoc that IoT can usher into your landscape in terms of complexity, security and manageability. To be able to mitigate the security vulnerabilities that IoT opens up, IT leaders will need a solution that can bring the following changes to the enterprise networks:

  • Simplification and Automation, better control and manageability: Existing WAN architectures are already complicated enough and have become an operational nightmare for many IT teams. IoT deployments will add a large number of devices; often deployed in remote locations that use multiple access methods spanning wired and wireless networks to connect to the enterprise. Without simplifying and automating the network, it will be impossible for IT teams to track and monitor the flow of data across the networks, detect possible vulnerable entry points and configure the networks to assign security policies accordingly.
  • Network Segmentation: By bunching up or clustering IoT devices, IT teams can minimize the damage in the event of a security breach. These IoT devices and entry points can be isolated from the rest of the company end-points to limit how far a security attack can penetrate within the enterprise architecture. These network overlays can be as granular as possible, and it will be easier to configure and apply policies and access controls over these network clusters.
  • Real-time Monitoring and Analytics: What you can’t see, you can’t secure. IT teams need a centralized panel that can provide them real-time, granular and in-depth view into the enterprise network at any given point of time. An advanced analytics tool can leverage data from past breaches and predictive analysis to raise the red flag early on for IT teams about possible security breaches – leaving the teams with some time to form a contingency plan and minimize risk and impact.
  • Integrated Security: A third-party NGFW (Next Generation Firewall) hardly serves the purpose because it just adds an additional layer to upgrade, monitor and manage. A network with integrated multi-layer security will reduce complexity and create a closely-knit secure enterprise network architecture.

The correct SD-WAN solution can help organizations get a head start on their IoT security journey. For Example, while there are multiple SD-WAN solutions in the market today, Versa’s SD-WAN  is a multi-service, multi-tenant software platform built on cloud principles to deliver scale, segmentation, programmability and automation. It provides advanced networking and security in a single software services platform that software-defines the branch.

Act now to know more about how Versa’s Cloud IP Platform fits into your IoT roadmap and e-mail us at or request a demo.

Unless, of course, you are willing to open up your enterprise security to someone who forgot to run the latest software update on their IoT enabled toaster!