Versa Zero Trust: From Network Trust to Application Trust

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
March 23, 2026

Zero Trust has become a foundational concept in enterprise security, but many implementations focus on only one part of the problem: application access. Zero Trust must be enforced at multiple layers of the network.

Automating Branch-to-Cloud Connectivity and Security: Versa Secure SD-WAN Integration with Zscaler Internet Access 

Rajesh Kari
By Rajesh Kari
Director, Product Marketing
March 20, 2026

We’re excited to introduce an automated integration between Versa Secure SD-WAN and Zscaler that makes dual-vendor SASE faster, secure and resilient. This integration helps you secure local internet breakout, improve user experience and simplify operations 

Building Secure, AI-Optimized Data Centers: A Blueprint for CIOs and Network Architects

Artificial Intelligence is pushing enterprise data centers to their limits and most aren’t ready. As organizations deploy GPU-packed clusters and scale out AI inference, traditional architectures struggle to deliver the performance, scalability, and uncompromising security that modern AI demands. Regulated industry-based Enterprises or those with critical intellectual property or sensitive information are not willing to put their sensitive data on third-party clouds or AI applications hosted elsewhere.

Why Identity Alone Isn’t Enough: Device Posture in Contextual Zero Trust Security

Sambuj Dhara
By Sambuj Dhara
Product Analyst
March 19, 2026

Identity-based access is incomplete without device posture. Learn how contextual Zero Trust and continuous endpoint profiling reduce standing privilege risk in Dynamic Enterprises.

Introducing the Versa Secure Enterprise Browser Early Access Program — Sign Up for Early Access

The browser is the primary enterprise workspace, but most security controls stop at the network or endpoint layer. Versa Secure Enterprise Browser brings Zero Trust enforcement directly into the browser session. Join the Early Access Program to secure SaaS, GenAI, and BYOD access within the Versa SASE platform.

Breaking Down Versa Inbound SSE: Securing Internet Traffic Accessing Your Applications

Rahul Vaidya
By Rahul Vaidya
Director, Product Management
March 18, 2026

Security Service Edge (SSE) has become the standard architecture for protecting outbound internet traffic and providing secure access to applications. If you’ve adopted SSE, you’ve likely already seen how it simplifies securing users, SaaS applications, and data leaving your network. But most SSE architectures were designed primarily for outbound traffic, leaving another important challenge largely unchanged: protecting internet traffic accessing your applications.

Part 5 — Securing Tool Access: MCP Server and MCP Gateway (The “Hands” Control Point)

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
March 18, 2026

Most AI incidents don’t start with “bad answers.” They start with “the AI took an action it shouldn’t have.”

That is why tool access matters as much as model access.

Essential benefits of single vendor SASE

Matthew Brooks
By Matthew Brooks

March 12, 2026

Enterprises have bought into the benefits of SASE. When implemented right, with the right vendor, it makes the network more efficient and more secure while reducing total cost of ownership. A win, win, win! According to a recent press release by Dell’Oro Group the 5-Year SASE Forecast Reaches $97B. But why is single vendor unified SASE significantly more beneficial than just SDWAN + SSE from different vendors? The many issues stem from the fact that it requires twice the effort to use two separate products along with the need for customization where integration points are not standards based. Training, provisioning,…

Part 4. Securing Model Access: Model Gateway and LLM Proxy (The “Brain” Control Point)

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
March 11, 2026

Parts 1, Part 2, Part 3 focused on visibility, policy, and inspection. Now we are moving into infrastructure. Once AI is in production, model calls become critical traffic. If those calls bypass governance, you lose policy enforcement, visibility, cost control, and consistent inspection. A Model Gateway solves that by acting as the front door for model access. 1) What a Model Gateway is (plain English) A Model Gateway is the “front door” for model traffic. Instead of every team calling model vendors directly, all model requests go through one controlled layer. A Model Gateway can: If a model is the…

Three predictions that will reshape enterprise security and operations in 2026 

Kelly Ahuja
By Kelly Ahuja
CEO, Versa Networks
March 6, 2026

As we head into 2026, innovation will be shaped by three shifts: the reshaping of traffic flows through AI-driven edge computing, the decoupling of users from devices through enterprise browsers, and the emergence of real governance boundaries for autonomous AI inside the enterprise. The organizations that win won’t just adopt new tools, they’ll embrace them by modernizing architectures, strengthening security foundations, and defining clear guardrails for AI. 


Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.