“Security by design is a mandatory prerequisite to securing the IoT macrocosm, the Dyn attack was just a practice run.” – James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology. Remember the 21st of October 2016? A series of carefully mastered DDoS attacks paralyzed internet services on the East Coast, affecting the businesses of market giants like Amazon, Netflix, PayPal, Starbucks, Verizon, Visa – the actual list is longer, and pretty impressive. The US Department of Homeland Security launched an investigation and it revealed that the extremely sophisticated attack was a botnet that spread through a large number of Internet…
Many still consider SD-WAN as an emerging technology in the enterprise IT space. However, SD-WAN has started to gain traction among IT leaders. Organizations world-wide that are gearing up or are mid-way through a ‘digital transformation’ drive need to take a more software-defined approach to their infrastructure. IT teams in these organizations are increasingly relying on automation to help them with the routine tasks to make IT more efficient. Analyst firm IDC believes that SD-WAN market will reach USD 8 billion by 2020, a CAGR of 70% per year growth over the next four years. While some believe that the…
My apologies. The SD-WAN Expo at Fort Lauderdale, Florida concluded on 16th of February 2018 and I have been wanting to write this blog ever since. But the weekend following the expo and a larger part of this week has been packed with responding to the overwhelming number of queries that we received from IT leaders and CIOs. In a good way, that reiterates the magnitude of buzz and curiosity SD-WAN has been generating in the market. And it is only fair. Almost every organization today has at least one application residing in the cloud and SD-WAN is going to…
You finished moving your applications to the cloud. The project went live, and you hoped that soon you would be reaping immense benefits from your cloud investment. You wait. And wait some more. And then reality strikes. Mainstream network technologies that build up most enterprise networks of today were not built to handle the dynamic, anytime anywhere accessibility of workloads in a cloud environment. To truly reap the benefits of a cloud strategy, you need to compliment it with a network that is intelligent, cloud-native, secure and still cost-effective. SD-WAN is your answer. Enter the Cloud Transformation Era Enterprises are…
An Excuse for a Blog Recently, Versa Networks participated in the AWS integration testing performed by the ESG Group that culminated in their recently published buyer’s guide for SD-WAN solutions in AWS. The timing of this test was perfect as it coincides with increased customer interest in both hybrid and multi-cloud solutions. The timing was perfect for another reason: Versa has been adding quite a bit of innovation around native integration with various public cloud environments, but these tend to make sense to folks employed by “born-in-the-cloud” employers, where Python and JSON, not BGP and OSPF are the main job…
Like many industries, the insurance sector increasingly depends on new technologies to provide better service while reducing operational costs, with the ultimate goal of creating an exceptional customer experience. Mobile apps, cloud-based services and video chat are just some of the ways insurance companies are using technology to reach their customers and decrease their overhead. Consider, for example, the traditional method of filing a claim for an auto collision: a police report is filed, a copy of which must be forwarded to the claims department of the insurance company; photos of the damage are needed, which means the adjuster must…
It’s been an exciting 2017 for Versa Networks with many new customer wins (Comcast Business, Verizon, KDDI, Singtel, S-Net Communications, and others) and the release of an extensive list of new features (e.g. Wi-Fi, embedded switching, LTE and 3rd party VNF support capabilities) enhancing our portfolio to software-define more than just the WAN (SD-Branch). Today we announce support for enhanced unified communications optimizations by supporting the native analysis of over 150 voice and video codec types to create live, in-situ, MOS (Median Opinion Score) calculation reporting. The Versa Cloud IP Platform has always been able to identify voice and video…
Fin7 is a cybercrime group that employs spear phishing attacks to deliver malware that uses fileless malware techniques, sophisticated evasions and persistence. They mostly target the financial sector. In this blog, we are going to take a high-level look at one such sample seen in the wild, which employs several layers of obfuscated JScript, powershell and DLL embedded within a Microsoft Word document. The sample analyzed has the MD5 hash 29a3666cee0762fcd731fa663ebc0011. Through a series of deeply embedded base64 encoded scripts, obfuscated code and use of powershell, this strain achieves stealth and evasion. The document arrives as an email attachment in…
Healthy growth is something every company strives for. As with human development, the rate of growth can impact a business’s well-being: Grow too slowly, and the business can become stagnant or obsolete. Grow too quickly, and the business will experience growing pains that could threaten its overall health. In every sector, managing growth effectively can ensure longevity for the business. In the healthcare space, however, it can mean the difference between life and death—for the business and its customers. As a medical practice or healthcare facility expands, either organically or through acquisition, is its existing network capable of handling the…
Several Security Vulnerability have been patched in recently in Apache Tomcat. The list of fixed flaws recently addressed also included code execution vulnerabilities. Apache Tomcat is the most widely used web application server, with over one million downloads per month and over 70% penetration in the enterprise datacenter. The Apache Tomcat development team publicly disclosed the presence of a remote code execution vulnerability, tracked as CVE-2017-12617, affecting the popular web application server. The Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 are affected. The vulnerability is classified as “important” severity, has been…
Subscribe to the Versa Blog