Posts tagged ‘Zero Trust’

Addressing the OWASP Top 10 for LLM Applications

rahul-mehta
By Rahul Mehta
Product Marketing Analyst
March 5, 2025

OWASP Top 10 for Large Language Model (LLM) Applications, highlighting critical security vulnerabilities such as prompt injection, data poisoning, and system prompt leakage. It emphasizes the need for proactive security measures, including Zero Trust principles, access controls, and continuous monitoring to protect AI-driven applications from emerging threats.

How NGFW Fits into Your Zero Trust Strategy

Brad-LaPorte
By Brad LaPorte

February 5, 2025

Zero Trust requires organizations to assume that threats can originate from anywhere—both inside and outside the network. This approach emphasizes strict identity verification and continuous monitoring to protect sensitive resources. Advanced security tools, such as Next-Generation Firewalls (NGFWs), play a pivotal role in implementing this strategy. These technologies provide enhanced visibility and granular access control to meet the demands of hybrid and cloud-first environments.

Versa Achieves Exceptional Results in CyberRatings.org SSE Threat Protection and ZTNA Tests 

dan-maier
By Dan Maier
Chief Marketing Officer, Versa Networks
October 24, 2024

In the crowded landscape of cloud-delivered Security Service Edge (SSE), relying on vendor claims of performance and security can often lead to disappointment. Increasingly, enterprises are seeking actual test results to validate the solutions they are considering.

How to Protect and Reduce Your Attack Surface at the Edge

Brad-LaPorte
By Brad LaPorte

September 12, 2024

Understanding the cyber attack surface Historically, the “attack surface” was limited to well-known points of external exposure—the traditional perimeter of websites, external IP addresses, and endpoints. Our cyber attack surface has expanded dramatically over the past five years, now encompassing our cloud estate, millions of devices at the edge, and mobile and remote workers, in addition to our internet-facing infrastructure. This expansion of the definition to include cloud, end-user, and internal assets has been driven by the increasing sophistication of cyber attacks. The table below breaks down today’s complex attack surface into several categories, based on a framework presented by…

Least Privilege Access: The Cornerstone of Zero Trust Network Access (ZTNA) 

versa-staff
By Versa Staff
Versa Networks
June 6, 2024

Least Privilege Access (LPA) is the foundation of Zero Trust Network Access (ZTNA), ensuring users, applications, and devices only receive the minimum access necessary to perform their tasks—reducing attack surfaces, preventing lateral movement, and strengthening security posture against evolving cyber threats. This blog explores why LPA is critical to ZTNA and how organizations can implement it effectively with Versa’s security solutions.

Data Defense in Depth: Unifying Data Protection and Zero Trust through SASE for Ultimate Data Protection with Versa Networks

In the rapidly evolving landscape of cyber threats, data protection has become a priority concern. Traditional security models are proving inadequate in the face of sophisticated attacks, leading organizations to seek out more dynamic and robust approaches to securing their data. The integration of Secure Access Service Edge (SASE) and Zero Trust architectures offers a promising approach to modern cybersecurity challenges. In this blog, we delve into how Versa Networks merges SASE and Zero Trust to ensure the protection of data in today’s landscape.

Three Reasons Why Zero Trust Edge Will Supercharge the U.S. Department of Defense’s Move to a Zero Trust Architecture

Cyber adversaries will stop at nothing to compromise any military systems, data, and missions. That’s why the U.S. Department of Defense (DOD) is adopting zero trust—a security framework that presumes networks are compromised and counters threats by design. All DOD organizations are expected to achieve “Target Level” Zero Trust Architecture by 2027. This requires multiple security functions to identify, authenticate, and authorize users or devices based on posture to securely connect to applications. As a result, the DOD turned to Booz Allen and Versa Networks to develop a security hardened Zero Trust Edge approach that will transform the DOD’s infrastructure…

The Need for Software Defined Adaptive Micro-Segmentation

dogu-narin
By Dogu Narin
VP of Product Management, Versa Networks
October 24, 2023

As cyber-attacks become increasingly sophisticated and the likelihood of threats in the infrastructure rise, our customers have explored new ways to not only secure the initial point of access but also mechanisms to continuously monitor their security posture.

In Defense of SD-WAN and the Power of Zero Trust Everywhere 

kumar-mehta
By Kumar Mehta
Founder and CDO, Versa Networks
July 31, 2023

I recently read an article in CRN where Zscaler CEO Jay Chaudhry stated that he’s not a believer in SASE because he thinks “SD-WAN is anti-zero trust.” I respect Jay immensely, but I must respectfully disagree with this statement. 

Zero Trust Everywhere

dan-maier
By Dan Maier
Chief Marketing Officer, Versa Networks
April 19, 2023

Zero Trust is widely considered to be the future of security, but today it’s only used to protect remote workers. As hybrid work grows and people return to the office, many users and security teams are asking if they can use Zero Trust for their branch offices and campus sites as well.


Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.