Company Updates
Announcing Versa Academy: Education and Training for Building Secure SD-WAN
By Mark Postma
Solutions Architect
September 8, 2020
Technology changes rapidly as new products, features, and benefits constantly flood the industry; all of which promise a brighter, better, and easier tomorrow. With so many changes and promises, one thing I’ve consistently run into in the networking industry is that many of these features and capabilities often go unused, or even more frequently are used incorrectly, so that their benefits aren’t seen. When product features and capabilities go unused, disappointing performance may occur and even lead to the misconception that the product was falsely advertised and that processes were somehow broken. I’ve been in the networking industry for about…
Customers & Partners
SD-WAN Vendor Success Criteria Vary by Lenses
By Versa Staff
Versa Networks
July 16, 2020
Several analyst firms have reported recently about the state of the SD-WAN market, and not surprisingly, the market sizing is definitely due to inclusion of both hardware and software, and in Cisco’s case, contributions from Meraki. That’s the conclusion of AvidThink analyst Roy Chua, who believes that there could be a $500 million differential between pure SD-WAN software revenue and everything else deployed in the branch including hardware, circuits and wireless access only. Given that Versa is one of the few if not only pure-play SD-WAN vendors that from a revenue recognition standpoint is software only, devising a methodology that…
Industry Insights
Digital Transformation Requires Ubiquitous Connectivity, with No Added Risk
By Versa Staff
Versa Networks
July 9, 2020
Digital transformation is transcending traditional IT infrastructure, and becoming pervasive within virtually every aspect of business and our personal lives. We carry around laptops, smartphones, tablets, smart watches and other wearables. IoT devices collect data from security cameras, cars, aircraft, ships, energy systems, manufacturing plants, medical facilities, farms and ranches, and throughout our homes and business offices. Applications on all these devices collect and emit massive amounts of data. Data travel over WANs to corporate data centers, clouds, SaaS, PaaS and IaaS, and this is just the beginning. As digital transformation becomes even more pervasive, the digital ecosystem will become…
Product & Engineering
Secure SD-WAN Architecture: Genuine Multi-Tenancy
By Versa Staff
Versa Networks
July 6, 2020
Multi-tenancy for an enterprise? It’s a service provider thing! No, not really, in the e-commerce age you need it more than ever. There are myriad reasons to secure your enterprise network with a genuine multi-tenancy architecture—it’s critical to plug the security deficits of the also-ran legacy tenancy architectures. Listen to this webinar to hear Neil Danilowicz, Principal Architect, and myself, discuss the essentials of a genuine multi-tenancy architecture: the complete isolation of the control, data and management planes. If any of these planes bleeds across—in a shared device; in shared access to any network resource—it opens a security vulnerability. Enterprises…
Industry Insights
Top 5 Business Transformation Trends Driving Network Transformation
By Versa Staff
Versa Networks
May 21, 2020
The digital transformation has made the network indispensable. As your network goes, so your business goes. Everything is connected: static and mobile devices all communicate via the network. Extraordinary statistics suggest 51% of CxOs don’t know what their industry might look like in 2023; that there might be a 50% turnover in the S&P over the next five years. Agility is survival. Traditional hub & spoke networks were designed for client-server access to centralized information by a set of known, stationary, IT-controlled endpoints. Today’s business does not operate that way. The number and types of devices have exploded, they—and their…
Industry Insights
SAAS Optimization at the Edge of the Cloud
By Versa Staff
Versa Networks
May 14, 2020
As new applications move to the cloud, the need for more granular data and analytics follow in order to measure the rate of acceleration of SaaS (Software-as-a-Service) access. While CRM represents the largest of the SaaS markets, other segments such as digital marketing and collaboration, are both seeing a rapid shift from on-premises to the cloud, much of which can be attributed to the strong focus service providers are placing on edge-network agility in rapidly making new functionality available to customers. In a recent Gartner survey assessing the impetus for the surge in SaaS migration, over 440 SaaS strategy decision…
Research Lab
Emotet: The Silent, Pervasive Villain / The Return of Emotet: Time to Watch Out
By Versa Staff
Versa Networks
April 23, 2020
After several weeks of quiet, especially during the Christmas holidays, the Emotet malware bot is up and running again, and it seems stronger and smarter. Several IT security firms have reported seeing phishing emails delivering Emotet via malicious Word documents and even delayed holiday e-greetings. Cyber-attackers using Emotet seem to have used this brief hiatus to improve the malware’s social engineering abilities, with almost a fourth of infected emails being sent as replies to existing email threads. Designed initially as a banking malware, the Emotet Trojan was first identified by security researchers in 2014. The malware delivery botnet spreads itself…
Research Lab
CVE-2020-0796 – A Potential SMB Attack in the Horizon
By Winny Thomas
Principal Security Architect
April 15, 2020
Server Message Block or SMB is a protocol used extensively by windows. It allows windows computers to communicate, locate file servers, locate and communicate with windows networks services and even communicate with other operating systems that understand the SMB protocol. The latest version of SMB is SMB version 3 which is affected. Over the years numerous vulnerabilities were discovered in the protocol which were actively exploited and used by malware authors to build ransomware, cryptominers, SCADA malware etc. MS08-067 saw the rise of the Conficker worm, MS10-061 was used by the infamous Stuxnet malware and MS17-061 was used by ransomware’s…
Subscribe to the Versa Blog
Recent Posts
Why Data Sovereignty Fails Without Sovereign SASE
By Kelly AhujaApril 6, 2026



