SASE ROI Calculator

SASE can save your company a lot of money. Use the industry’s-first SASE ROI calculator to quantify the cost savings you can achieve in services, asset consolidation, and labor when deploying Versa SASE.

SASE ROI Calculator

SASE can save your company a lot of money. Use the industry’s-first SASE ROI calculator to quantify the cost savings you can achieve in services, asset consolidation, and labor when deploying Versa SASE.

Top Energy Firm Achieves Comprehensive “Work-From-Anywhere” with Versa SASE

A large, publicly traded energy company operating in all areas of the oil and gas industry has dramatically simplified their network stack and realized huge cost savings with Versa SASE.

 
Availability and Buying Options in the Emerging SASE Market

EMA evaluates the different SASE vendors and their approaches to architecture, go-to-market, and support for their cloud-delivered and hybrid services.

 
Gartner Magic Quadrant for WAN Edge Infrastructure

Gartner Magic Quadrant report analyzes the various vendors in the WAN edge market and Versa is positioned as a Leader.

Versa Networks - Explained in 1 minute

Learn about the Versa Secure SD-WAN solution in a high-level, one minute overview.

Versa SASE (Secure Access Service Edge)

SASE is the simplest, most scalable way to continuously secure and connect the millions points of access in and out of the corporate resources regardless of location.

 
Versa Secure SD-WAN – Simple, Secure, and Reliable Branch to Multi-Cloud Connectivity

Versa Secure SD-WAN is a single software platform that offers multi-layered security and enables multi-cloud connectivity for Enterprises.

The Modern Secure
Network Blog

Product & Engineering

Why Analytics is Critical for True SD-WAN

roopa-bayar
By Roopa Bayar
Principal Software Architect, Versa Networks
January 18, 2021

WANs (Wide Area Networks) allow companies to extend their computer networks to be able to connect remote branch offices to data centers, public cloud, SaaS applications, and other internet-delivered applications and services that are required to perform essential business functions. Applications and connectivity are the lifeblood of all organizations today. The ability to connect users predictably and securely across branches, HQ, data centers, public clouds, etc. is the key to their success. However, more applications mean more demands on the network – and more demands on the teams that run them.


Industry Insights

SASE-Delivered Cyber-Security for Resellers

michael-wood
By Michael Wood
CMO, Versa Networks
January 15, 2021

As a reseller you have the broadest visibility of what is truly happening out there: across multiple industries; different size customers; companies of different profiles. Your expert reputation is well established and you deploy robust solutions with confidence. Yet many in your shoes have been hesitant to offer security in their portfolios—historically much-too-complex.


Industry Insights

SASE-Delivered Cyber-Security for Small-Medium Enterprises (SMEs)

michael-wood
By Michael Wood
CMO, Versa Networks
January 14, 2021

SMEs are the most cost-conscious of organizations; there’s no money for large IT teams, nor for stacks of single-purpose boxes per location: it adds up quickly with more locations. Direct Internet Access (DIA) has been a life-saver (read: cost-saver). Employees using their own tablets, smartphones, and laptops has phenomenally brought down user device costs and headaches—employees even upgrade and refresh their devices themselves! Cloud applications are another absolution: no more servers, OS upgrades, boxes, more boxes, slow performance—with SaaS you pay-as-you-go and instantly scale up/down.


Product & Engineering

Secure SD-WAN Architecture: Full-featured SD-WAN Deep Dive

michael-wood
By Michael Wood
CMO, Versa Networks
January 13, 2021

What makes Versa Secure SD-WAN a better choice than the average SD-WAN offering in the market? As with any other assessment, you have to lift the covers and look underneath—see what’s inside, how it’s built, how the engine works, and how it achieves the oft-touted qualities you’d come to expect of a robust SD-WAN.


Research Lab

Unpacking the SolarWinds Supply Chain Attack

jayesh-gangadas
By Jayesh Gangadas Patel
Senior Threat Analyst, Versa Networks
January 12, 2021

The SolarWinds attack leaves many unanswered questions and the most prominent amongst them is the question of how the attacker entered internal systems of SolarWinds network and was able to infiltrate and move inconspicuously across the development chain. The malware was able to camouflage its activity among the highly secure network of the prominent organization for an extended period of time, evading all their security detection and prevention defenses. In this particular blog, our team will mainly focus on the chain of events that occurred, and the evasive methods employed to remain completely stealthy despite moving around and compromising a highly secure network environment.


Research Lab

SUPERNOVA: the Invisible Explosion That Caught the Industry Off Guard

winny-thomas
By Winny Thomas
Principal Security Architect
December 29, 2020

On December 13, 2020, FireEye reported a global campaign that targeted a large sector of industries by threat actors who inserted malicious code within a software component used by the popular network management software SolarWinds. It is not yet known how the threat actors managed to gain access to the development environment in which they added and distributed this malicious code as part of an update to the software. This trojanized version of the dynamic-link library (DLL) has been given the name ‘Sunburst’ by FireEye. Surprisingly enough, researchers have found evidence of the presence of a second backdoor in the SolarWinds product.


Research Lab

The NSA’s Top 25 Most Exploited Vulnerabilities

winny-thomas
By Winny Thomas
Principal Security Architect
December 23, 2020

The National Security Agency published a list of 25 CVEs (Common Vulnerabilities and Exposures) that were most exploited by threat actors in recent times. Some of these CVE’s were used to deliver malicious software that allowed monitoring remote networks, maintaining continued access to remote networks, and, in some cases, using these CVEs to pivot to other systems within the internal network. For example, CVE-2019-11510 was used to gain access to sensitive VPN information of user accounts and then use the credentials to deliver ransomware like Sodinokibi. Similarly, CVE-2019-0803 was used to establish a backdoor to gain and maintain access to…


Research Lab

The SolarWinds Hack: Understanding SolarStorm’s SUNBURST Backdoor

jayesh-gangadas
By Jayesh Gangadas Patel
Senior Threat Analyst, Versa Networks
December 21, 2020

FireEye recently provided information about the widespread attack campaign registered against components of the SolarWinds Orion platform. The SolarWinds Orion platform has a huge customer base of 300,000 clients and issued this advisory on Sunday, December 20th. In this blog post, we will focus on answering specific questions that organizations may have regarding the Solarwinds attack.


Product & Engineering

Protecting Work-From-Home Users for Today and Beyond

monnia-deng
By Monnia Deng
Senior Product Marketing Manager
December 16, 2020

For business continuity, enabling WFH pervasively is essential. Businesses looking to enable WFH must allow home workers to use their personal networks and devices to access business critical applications that may be hosted at a corporate datacenter or in the cloud. A robust, scalable, and secure work-from-home (WFH) solution ensures organizations can thrive regardless of any global, regional, or local events such as the pandemic of 2020. However, giving employees both the flexibility to work in the office or at home comes with its unique set of challenges.


Industry Insights

Strategies for Navigating a Successful Cloud Migration

michael-wood
By Michael Wood
CMO, Versa Networks
October 26, 2020

A third (33%) of all organizations have failed to successfully implement their cloud strategies in 2019. Despite best efforts post-migration, network performance, security, and management problems continue to shoot up. As failed cloud migrations glaringly highlight the need to reinvent traditional WAN networks, organizations are increasingly turning to Secure SD-WAN for the help they need to successfully move to the cloud. Who doesn’t want to move to the cloud today? It’s scalable, flexible, and cost-efficient—everything that traditional data centers are not. Besides, users have grown increasingly mobile, making the “anytime, anywhere, and any-device” access the new normal for business continuity….