SWG vs FWaaS: Key Differences and Use Cases

Avik Bose
By Avik Bose
Principal Systems Engineer, Versa Networks
October 17, 2022

This blog post tries to explain the differences between SWG and FWaaS and the different use cases which they address in a SSE framework.

Ransomware and What It Could Cost You

Jon Taylor
By Jon Taylor
Director and Principal of Security, Versa Networks
October 17, 2022

Read more to find out more about the actual cost of ransomware.

The State of Cloud Security in 2022

Versa Staff
By Versa Staff
Versa Networks
October 17, 2022

What does a data breach say about your company? We surveyed 600 IT professionals to see how important cloud security is in 2022. Here’s what they said.

Gartner® Gives Strategic Roadmap to Achieving SASE for 2022 and Beyond

Monnia Deng
By Monnia Deng
Group Manager, Product Marketing
August 1, 2022

The report breaks down the most critical steps to achieve when planning for SASE implementation that dispels any notion that SASE can be broken down into just components. A cohesive strategy requires equal consideration of the branch transformation and the security maturation of ubiquitous protection of users, devices, and applications.

A Recap of Versatility 2022: Versa’s Inaugural User Conference

Monnia Deng
By Monnia Deng
Group Manager, Product Marketing
May 2, 2022

This past week was the inaugural conference for Versa Networks – celebrating both product innovations this past year as well as key customer stories. Versa global customers came onto the virtual big stage to discuss how they were able to reap tremendous benefits from switching to Versa. Versa engineering leaders showcased the new and exciting features that are available with Versa SASE using hands-on, live demonstrations within the Versa management console.

Blackcat/ALPHV Ransomware and What To Do

Versa Threat Research Lab
By Versa Threat Research Lab
Versa Networks
April 27, 2022

The FBI, chief investigating agency of the U.S., has triggered an alert concluding that more than 60 organizations worldwide have been a victim of the sophisticated ransomware attack by Blackcat also known as ALPHV/Noberus. The ransomware first came to light when the investigation revealed it to be the first ransomware using the memory-safe programming language RUST, known for its improved performance. Many of the developers of Blackcat are linked with more popular ransomware groups Darkside and Blackmatter who large groups with the experience to carry out operations with a well-established network to support logistics. The advantage of using the RUST…

How Often Do Americans Snoop Online?

Versa Staff
By Versa Staff
Versa Networks
April 26, 2022

Whether it’s scouring social media feeds of professionals, family, friends, or strangers, curiosity fills our minds with questions about others we’d prefer not to ask. But how often?

Simplify And Secure Multi-Cloud Connectivity for Branch and Corporate Offices

Versa Staff
By Versa Staff
Versa Networks
April 20, 2022

Enterprises are increasingly modernizing by moving their applications portfolio and data to the cloud. To achieve organizational freedom of choice, cost efficiency and global coverage, it is often attractive to use services from multiple different cloud vendors. Yet all these disconnected cloud environments—each with its own tools and nuances—must come together in a single fabric that enforces security, optimizes user experience through efficient best-path routing, maintains uninterrupted access, and simplifies orchestration. This cannot be achieved with sub-optimal backhauling of traffic anchored to an on-prem data center with traditional FW and security devices. Traffic must flow directly from user to cloud…

CASB: An Integral Part of Network Security

Versa Staff
By Versa Staff
Versa Networks
April 18, 2022

It’s never been easier to launch a cloud service; or to consume such a service. No-friction SaaS applications compete on features because no central network planning or sales cycle is required any longer. Often SaaS applications are sold into a team or a department. Other applications—Dropbox, OneDrive—are picked up by users simply because they significantly enhance worker productivity. Central IT often has no knowledge that these applications are used, how they’re used, or by whom. Traditional perimeter firewalls protect applications and data stored within your on-prem network. FWs additionally filter applications and URLs accessed outside the enterprise. But data stored…

Zero Trust Network Access (ZTNA): Secure, Controlled, and Deployed from Everywhere

Versa Staff
By Versa Staff
Versa Networks
April 3, 2022

Many large enterprises consider their internal networks safe—protected by perimeter firewalls and VPN solutions—and that security threats are primarily present external to their networks. In reality, the enterprise network attack surface has experienced a multifold expansion brought about by trends in work-from-anywhere, Direct Internet Access (DIA), application-and-data migration into the cloud, BYOD, IoT, and increasingly sophisticated hacker attacks with lateral movement. Corporate “internal” networks are often as insecure as “external” networks, if you can even still find the borders between these. ZTNA is a modern network architecture that brings back the security essential to your corporate network. The approach is…


Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.