Product & Engineering
Versa Zero Trust: From Network Trust to Application Trust
By Kumar Mehta
Founder and CDO, Versa Networks
March 23, 2026
Zero Trust has become a foundational concept in enterprise security, but many implementations focus on only one part of the problem: application access. Zero Trust must be enforced at multiple layers of the network.
Company Updates
Automating Branch-to-Cloud Connectivity and Security: Versa Secure SD-WAN Integration with Zscaler Internet Access
By Rajesh Kari
Director, Product Marketing
March 20, 2026
We’re excited to introduce an automated integration between Versa Secure SD-WAN and Zscaler that makes dual-vendor SASE faster, secure and resilient. This integration helps you secure local internet breakout, improve user experience and simplify operations
Company Updates
Building Secure, AI-Optimized Data Centers: A Blueprint for CIOs and Network Architects
Artificial Intelligence is pushing enterprise data centers to their limits and most aren’t ready. As organizations deploy GPU-packed clusters and scale out AI inference, traditional architectures struggle to deliver the performance, scalability, and uncompromising security that modern AI demands. Regulated industry-based Enterprises or those with critical intellectual property or sensitive information are not willing to put their sensitive data on third-party clouds or AI applications hosted elsewhere.
Industry Insights
Why Identity Alone Isn’t Enough: Device Posture in Contextual Zero Trust Security
By Sambuj Dhara
Product Analyst
March 19, 2026
Identity-based access is incomplete without device posture. Learn how contextual Zero Trust and continuous endpoint profiling reduce standing privilege risk in Dynamic Enterprises.
Company Updates
Introducing the Versa Secure Enterprise Browser Early Access Program — Sign Up for Early Access
The browser is the primary enterprise workspace, but most security controls stop at the network or endpoint layer. Versa Secure Enterprise Browser brings Zero Trust enforcement directly into the browser session. Join the Early Access Program to secure SaaS, GenAI, and BYOD access within the Versa SASE platform.
Product & Engineering
Breaking Down Versa Inbound SSE: Securing Internet Traffic Accessing Your Applications
By Rahul Vaidya
Director, Product Management
March 18, 2026
Security Service Edge (SSE) has become the standard architecture for protecting outbound internet traffic and providing secure access to applications. If you’ve adopted SSE, you’ve likely already seen how it simplifies securing users, SaaS applications, and data leaving your network. But most SSE architectures were designed primarily for outbound traffic, leaving another important challenge largely unchanged: protecting internet traffic accessing your applications.
AI Thought Leadership
Part 5 — Securing Tool Access: MCP Server and MCP Gateway (The “Hands” Control Point)
By Kumar Mehta
Founder and CDO, Versa Networks
March 18, 2026
Most AI incidents don’t start with “bad answers.” They start with “the AI took an action it shouldn’t have.”
That is why tool access matters as much as model access.
Industry Insights
Essential benefits of single vendor SASE
By Matthew Brooks
March 12, 2026
Enterprises have bought into the benefits of SASE. When implemented right, with the right vendor, it makes the network more efficient and more secure while reducing total cost of ownership. A win, win, win! According to a recent press release by Dell’Oro Group the 5-Year SASE Forecast Reaches $97B. But why is single vendor unified SASE significantly more beneficial than just SDWAN + SSE from different vendors? The many issues stem from the fact that it requires twice the effort to use two separate products along with the need for customization where integration points are not standards based. Training, provisioning,…
AI Thought Leadership
Part 4. Securing Model Access: Model Gateway and LLM Proxy (The “Brain” Control Point)
By Kumar Mehta
Founder and CDO, Versa Networks
March 11, 2026
Parts 1, Part 2, Part 3 focused on visibility, policy, and inspection. Now we are moving into infrastructure. Once AI is in production, model calls become critical traffic. If those calls bypass governance, you lose policy enforcement, visibility, cost control, and consistent inspection. A Model Gateway solves that by acting as the front door for model access. 1) What a Model Gateway is (plain English) A Model Gateway is the “front door” for model traffic. Instead of every team calling model vendors directly, all model requests go through one controlled layer. A Model Gateway can: If a model is the…
Industry Insights
Three predictions that will reshape enterprise security and operations in 2026
By Kelly Ahuja
CEO, Versa Networks
March 6, 2026
As we head into 2026, innovation will be shaped by three shifts: the reshaping of traffic flows through AI-driven edge computing, the decoupling of users from devices through enterprise browsers, and the emergence of real governance boundaries for autonomous AI inside the enterprise. The organizations that win won’t just adopt new tools, they’ll embrace them by modernizing architectures, strengthening security foundations, and defining clear guardrails for AI.
Subscribe to the Versa Blog
Recent Posts
Why Data Sovereignty Fails Without Sovereign SASE
By Kelly AhujaApril 6, 2026



