Research Lab
Versa Security Bulletin: Update on CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability
By Versa Security Research Team
August 26, 2024
A medium-severity vulnerability was discovered in Versa Director (CVE-2024-39717), and a patch has been released. Impacted customers failed to implement system hardening and firewall guidelines, leaving a management port exposed on the internet.
Industry Insights
What is Zero Trust Security? | Core Principles of Zero Trust Model
By Janak Panchal
Strategy Analyst
August 15, 2024
Zero Trust is a cybersecurity paradigm that assumes no user, device, or network segment is inherently trustworthy—even if it’s inside the corporate perimeter. Instead of granting implicit trust based on location or network membership, Zero Trust requires every access attempt to be verified and authorized, reducing the attack surface and preventing lateral movement by attackers.
Industry Insights
CrowdStrike Outage: Latest Updates and Best Practices
By Naganathan S J
Staff Security Engineer - Research
July 19, 2024
Today, CrowdStrike reported a significant outage affecting multiple services, including their Falcon platform. The CrowdStrike team is actively working to resolve the issue and restore full functionality. Users are advised to monitor CrowdStrike’s official status page for real-time updates and follow any recommended actions provided by the company.
Industry Insights
Top 10 Signs You Need a New SSE Solution
By Dan Maier
Chief Marketing Officer, Versa Networks
June 7, 2024
In today’s hyper-connected digital landscape, enterprises need to have a robust and cost-effective Security Service Edge (SSE) solution to combat increasingly sophisticated cyber threats and to support digital transformation.
Company Updates
Least Privilege Access: The Cornerstone of Zero Trust Network Access (ZTNA)
By Versa Staff
Versa Networks
June 6, 2024
Least Privilege Access (LPA) is the foundation of Zero Trust Network Access (ZTNA), ensuring users, applications, and devices only receive the minimum access necessary to perform their tasks—reducing attack surfaces, preventing lateral movement, and strengthening security posture against evolving cyber threats. This blog explores why LPA is critical to ZTNA and how organizations can implement it effectively with Versa’s security solutions.
Company Updates
Evolving Threats, Intelligent Responses: AI and SSE in Versa’s SASE Strategy
The sophistication and frequency of threats necessitate a dynamic and intelligent approach to cyber defense. Artificial Intelligence (AI) combined with Secure Service Edge (SSE) is a pivotal element in this defense strategy, especially within the context of a Secure Access Service Edge (SASE) framework. In this blog, we will explore how Versa Networks leverages these powerful tools to provide advanced data protection and maintain a robust security posture in the face of such evolving threats. Introduction to the Evolving Threat Landscape and the Role of AI and SSE in Data Protection Traditional security measures struggle to keep up with this…
Company Updates
Securing GenAI Usage with Versa’s GenAI Firewall
By Anusha Vaidyanathan
Sr. Director, Product Management
May 6, 2024
Versa GenAI Firewall safeguards sensitive data from being uploaded into Generative AI tools (e.g. ChatGPT) while limiting shadow use cases of GenAI. It manages, monitors, and reports how your organization uses GenAI – including assessments on the riskiness of apps, controlling access, and preventing unauthorized data movement. Securing Generative AI Applications: Beyond LLMs While ensuring security for large language models (LLMs) is necessary to facilitate the adoption of GenAI applications within organizations, it is equally crucial to address broader concerns related to generative AI. Let’s delve into additional considerations: User-to-Application Access Control: Context: Generative AI tools are often accessed by…
Company Updates
Building Context with UEBA relationship graphs, using GraphML
By Sridhar Iyer
May 2, 2024
Versa UEBA incorporates GraphML to generate insights and detect anomalies in user relationship graphs. Anomaly and behavior detections are just the first step. We then need to quickly pivot into building the forensics to inform response and remediation. This can involve determining the origination point of a malicious activity or an attack and building the scope and scale of a potential breach.
Research Lab
Versa Security Bulletin: Palo Alto Networks PAN-OS GlobalProtect Zero-Day Vulnerability under Active Exploitation
By Versa Security Research Team
April 19, 2024
CVEs: CVE-2024-3400; Summary Recently Palo Alto Networks announced a critical vulnerability in their PAN-OS software used in their GlobalProtect VPN Gateway, which is a feature in the PAN-OS Firewall. The discovery and public disclosure of the vulnerability and fixes timeline is currently as follows: Volexity first discovered the PAN-OS attack on April 10, 2024 at one of its network security monitoring (NSM) customers, and on April 11, 2024 subsequently learnt that another NSM customer was compromised by the same threat actor. Palo Alto Networks was then notified by Volexity that a zero-day vulnerability in its GlobalProtect Gateway was under active…
Company Updates
Data Defense in Depth: Unifying Data Protection and Zero Trust through SASE for Ultimate Data Protection with Versa Networks
In the rapidly evolving landscape of cyber threats, data protection has become a priority concern. Traditional security models are proving inadequate in the face of sophisticated attacks, leading organizations to seek out more dynamic and robust approaches to securing their data. The integration of Secure Access Service Edge (SASE) and Zero Trust architectures offers a promising approach to modern cybersecurity challenges. In this blog, we delve into how Versa Networks merges SASE and Zero Trust to ensure the protection of data in today’s landscape.
Subscribe to the Versa Blog
Recent Posts
Why Data Sovereignty Fails Without Sovereign SASE
By Kelly AhujaApril 6, 2026




