SD-WAN Vendor Success Criteria Vary by Lenses

versa-staff
By Versa Staff
Versa Networks
July 16, 2020

Several analyst firms have reported recently about the state of the SD-WAN market, and not surprisingly, the market sizing is definitely due to inclusion of both hardware and software, and in Cisco’s case, contributions from Meraki. That’s the conclusion of AvidThink analyst Roy Chua, who believes that there could be a $500 million differential between pure SD-WAN software revenue and everything else deployed in the branch including hardware, circuits and wireless access only. Given that Versa is one of the few if not only pure-play SD-WAN vendors that from a revenue recognition standpoint is software only, devising a methodology that…

Digital Transformation Requires Ubiquitous Connectivity, with No Added Risk

versa-staff
By Versa Staff
Versa Networks
July 9, 2020

Digital transformation is transcending traditional IT infrastructure, and becoming pervasive within virtually every aspect of business and our personal lives. We carry around laptops, smartphones, tablets, smart watches and other wearables. IoT devices collect data from security cameras, cars, aircraft, ships, energy systems, manufacturing plants, medical facilities, farms and ranches, and throughout our homes and business offices. Applications on all these devices collect and emit massive amounts of data. Data travel over WANs to corporate data centers, clouds, SaaS, PaaS and IaaS, and this is just the beginning. As digital transformation becomes even more pervasive, the digital ecosystem will become…

Secure SD-WAN Architecture: Genuine Multi-Tenancy

versa-staff
By Versa Staff
Versa Networks
July 6, 2020

Multi-tenancy for an enterprise? It’s a service provider thing! No, not really, in the e-commerce age you need it more than ever. There are myriad reasons to secure your enterprise network with a genuine multi-tenancy architecture—it’s critical to plug the security deficits of the also-ran legacy tenancy architectures. Listen to this webinar to hear Neil Danilowicz, Principal Architect, and myself, discuss the essentials of a genuine multi-tenancy architecture: the complete isolation of the control, data and management planes. If any of these planes bleeds across—in a shared device; in shared access to any network resource—it opens a security vulnerability. Enterprises…

Top 5 Business Transformation Trends Driving Network Transformation

versa-staff
By Versa Staff
Versa Networks
May 21, 2020

The digital transformation has made the network indispensable. As your network goes, so your business goes. Everything is connected: static and mobile devices all communicate via the network. Extraordinary statistics suggest 51% of CxOs don’t know what their industry might look like in 2023; that there might be a 50% turnover in the S&P over the next five years. Agility is survival. Traditional hub & spoke networks were designed for client-server access to centralized information by a set of known, stationary, IT-controlled endpoints. Today’s business does not operate that way. The number and types of devices have exploded, they—and their…

SAAS Optimization at the Edge of the Cloud

versa-staff
By Versa Staff
Versa Networks
May 14, 2020

As new applications move to the cloud, the need for more granular data and analytics follow in order to measure the rate of acceleration of SaaS (Software-as-a-Service) access. While CRM represents the largest of the SaaS markets, other segments such as digital marketing and collaboration, are both seeing a rapid shift from on-premises to the cloud, much of which can be attributed to the strong focus service providers are placing on edge-network agility in rapidly making new functionality available to customers. In a recent Gartner survey assessing the impetus for the surge in SaaS migration, over 440 SaaS strategy decision…

Secure SD-WAN Architecture Overview

versa-staff
By Versa Staff
Versa Networks
May 7, 2020

Why not keep the WAN you already have? Why migrate to Secure SD-WAN? In a nutshell: to remove complexity and inefficiencies from your network operations; to use an architecture tailored specifically to address the heightened security needs and altered traffic patterns in your network. The typical legacy WAN branch office contains a tall stack of boxes: WiFi, switch, router, WAAS, security appliance. And if you already have an SD-WAN deployed, then also an SD-WAN box. A lot of boxes, consuming power and space. Tracing the path of a packet through this quagmire, fully 60% of the processing is duplicated in…

Emotet: The Silent, Pervasive Villain / The Return of Emotet: Time to Watch Out

versa-staff
By Versa Staff
Versa Networks
April 23, 2020

After several weeks of quiet, especially during the Christmas holidays, the Emotet malware bot is up and running again, and it seems stronger and smarter. Several IT security firms have reported seeing phishing emails delivering Emotet via malicious Word documents and even delayed holiday e-greetings. Cyber-attackers using Emotet seem to have used this brief hiatus to improve the malware’s social engineering abilities, with almost a fourth of infected emails being sent as replies to existing email threads. Designed initially as a banking malware, the Emotet Trojan was first identified by security researchers in 2014. The malware delivery botnet spreads itself…

CVE-2020-0796 – A Potential SMB Attack in the Horizon

winny-thomas
By Winny Thomas
Principal Security Architect
April 15, 2020

Server Message Block or SMB is a protocol used extensively by windows. It allows windows computers to communicate, locate file servers, locate and communicate with windows networks services and even communicate with other operating systems that understand the SMB protocol. The latest version of SMB is SMB version 3 which is affected. Over the years numerous vulnerabilities were discovered in the protocol which were actively exploited and used by malware authors to build ransomware, cryptominers, SCADA malware etc. MS08-067 saw the rise of the Conficker worm, MS10-061 was used by the infamous Stuxnet malware and MS17-061 was used by ransomware’s…

My WFH Story with Versa Secure SD-WAN (Part 3)

robert-mcbride
By Robert McBride
Sales Engineer
April 13, 2020

Part 3 of a 3 part series (read Part 1 and Part 2) So, with the default configuration with minor LAN and NGFW customizations, what was I capable of using now at my home office? Always on VPN to corporate whether I was wired or wireless at my house Multi-link WAN with LTE providing me backup services to have 99.99% uptime for all my devices Prioritize my voice, video conferencing, O365, SFDC, Virtualization applications over Netflix, Hulu, PlayStation Network, Google Play Music, Spotify and other social media-oriented applications Secured my Internet with not only a NGFW but URL reputation and…

COVID-19 Ransomware Analysis

winny-thomas
By Winny Thomas
Principal Security Architect
April 9, 2020

Versa Security Lab recently analyzed couple of malware samples which arrives on a computer through phishing emails containing documents with embedded link which eventually leads to the download of the malware. Some of these may arrive through websites pretending to provide information on the recent Corona virus outbreak. The past few months have seen several malicious webservers and domains being set up, purportedly serving information on the Covid-19 virus outbreak. Most of these sites are hosts to ransomware and other malware types. In this blog we are going to look at one sample which encrypts files contents and updates the…


Recent Posts













Gartner Research Report

2024 Gartner® Magic QuadrantTM for SD-WAN

For the fifth year in a row, Versa has been positioned as a Leader in the Gartner Magic Quadrant for SD-WAN. We are one of only three recognized vendors to be in the Gartner Magic Quadrant reports for SD-WAN, Single-Vendor SASE, and Security Service Edge.