Company Updates
Reimagining NetOps: Operational Intelligence Powered by Versa NLP based Co-Pilot
By Sridhar Iyer
February 9, 2026
Natural Language Processing (NLP) has evolved significantly over the past decade. From the humble beginnings of a simple rule-based lookup, it has now transformed into AI-driven systems capable of context-based responses for operational intelligence. In enterprise networks that are distributed, the need for simplified operations has never been greater. Network Operations (NetOps) teams are under increased pressure to troubleshoot faster, identify root causes accurately, and reduce resolution cycles while maintaining uptime and business agility.
Company Updates
Introducing AI-Enhanced DLP capabilities in Versa Universal SASE Platform
Summary Versa has enhanced its AI DLP capabilities, comprehensive multi-format file inspection with granular metadata analysis, and intelligent redaction/tokenization features. These enhancements enable organizations to detect and prevent sensitive data leakage with unprecedented accuracy while minimizing false positives through contextual understanding. In this surgical walkthrough, we’ll dissect each of these enhancements to show exactly how Versa’s AI DLP elevates data protection from detection to intelligent prevention. AI DLP – Enhancements to Data Discovery based on ‘ML Analysis’ Versa’s new capabilities in AI-powered DLP takes data protection beyond contextual DLP by embedding advanced machine learning directly into the SASE fabric. Deployed…
Research Lab
BrickStorm Malware: Anatomy of a Stealth Linux Backdoor Targeting Modern Infrastructure
By Jayesh Gangadas Patel
Principle Threat Researcher, Versa Networks
February 5, 2026
BrickStorm is a highly stealthy Linux backdoor designed for long-term, targeted cyber-espionage. Brickstorm is closely associated with Cyber Espionage group UNC5221, which is known for exploiting zero-days vulnerability in network edge appliances like Ivanti, F5 and MiTRE breach. Unlike commodity malware, BrickStorm is deployed post-compromise, operates largely in memory, and uses a modular architecture with custom encrypted command-and-control (C2). Its focus on Linux servers, network appliances, and embedded systems reflects a broader trend: attackers increasingly target infrastructure layers where visibility and detection are weakest.
Company Updates
Rethinking 5G for the Enterprise WAN: From Basic Modems to Intelligent Extenders
By Rahul Vaidya
Director, Product Management
February 5, 2026
The promise of 5G for enterprise WAN is clear. It’s a required connectivity for IT leaders to gain better bandwidth, lower latency and faster branch deployments. It is an important tool for business continuity in the event of unforeseen network failures. As nns accelerate branch expansion, adopt cloud and SaaS applications, and prepare for connectivity to AI workloads, 5G is no longer an option, it is foundational.
Company Updates
‘Secure by Design’ at Versa: One Year of Progress
By Sunil Ravi
Chief Security Architect, Versa Networks
January 30, 2026
Security is a product decision, not an afterthought. As a further commitment to this principle and as a reflection of our pledge to the CISA Secure by Design goals, over the past year Versa has been putting them into practice across our platform, processes, and programs. Organized below around the seven Secure by Design pledge goals is a summary of the related new capabilities and enhancements we’ve delivered, along with a quick explanation of the importance of the changes.
Product & Engineering
Building Operational Resilience in SSE: How Versa Networks Delivers Business Continuity at Scale
By Anusha Vaidyanathan
Sr. Director, Product Management
December 18, 2025
As enterprises embrace hybrid work and cloud-first strategies, Unified SASE’s Security Service Edge (SSE) features have become the backbone of secure connectivity. SSE unifies key capabilities — such as secure web gateway (SWG), cloud access security broker (CASB), zero trust network access (ZTNA), and data loss prevention (DLP) — into a single, cloud-delivered architecture.
Research Lab
React2Shell Vulnerability
By Jayesh Gangadas Patel
Principle Threat Researcher, Versa Networks
December 16, 2025
React2Shell Remote Code Execution in React Server Components Vulnerability The bug dubbed as React2Shell, comprising two CVE’s, mainly CVE-2025-55182 and CVE-2025-66478, allows remote unauthenticated users to gain code execution on servers running vulnerable versions of React RSC or Next.JS App Router via single HTTP request. MITRE Tactic ID Technique Name Initial Access T1109 Exploit Public-Facing Application Execution T1059 Command and Scripting Interpreter Persistence T1505.003 Server Software Component: Web Shell Privilege Escalation T1068 Exploitation for Privilege Escalation Defense Evasion T1070.004 Indicator Removal on Host: File Deletion Next.js now powers a massive share of the modern web — millions of production sites,…
Company Updates
Versa Featured as a Gartner Peer Insights™ Customers’ Choice for SSE
By Michelle Viray
December 11, 2025
At Versa, we take pride in knowing we’ve truly made a difference for our customers. We are deeply invested in products that solve real problems, not just features on a roadmap, but solutions that help real people do their best work. When customers take the time to share how Versa has helped them transform their organizations, it reminds us why we do what we do.
Product & Engineering
Secure Every Connection: Replacing VPNs with ZTNA to Protect Users, Data, and Applications Everywhere
By Dhiraj Sehgal
Senior Director, Product Marketing
December 11, 2025
How Zero Trust Network Access (ZTNA) replaces VPNs to secure users, data, and applications across cloud, branch, and remote environments.
Subscribe to the Versa Blog
Recent Posts
The WAN for AI-era applications is becoming a single system
By Kumar MehtaApril 23, 2026
Why Data Sovereignty Fails Without Sovereign SASE
By Kelly AhujaApril 6, 2026





