Versa Zero Trust: From Network Trust to Application Trust

Kumar Mehta
By Kumar Mehta
Founder and CDO, Versa Networks
March 23, 2026
in
Share
Follow

Zero Trust has become a foundational concept in enterprise security, but many implementations focus on only one part of the problem: application access. Zero Trust must be enforced at multiple layers of the network.

Versa’s architecture delivers Zero Trust across three coordinated layers:

  • SD-LAN
  • Secure SD-WAN / NGFW
  • Secure Service Edge (SSE)

Each layer enforces trust decisions at a different stage of the connection lifecycle.

The simplest way to understand the model is to divide Zero Trust into two categories:

Network Trust

Controls whether a device or user should be allowed onto the network and what part of the network they can access.

Application Trust

Controls whether a user or device can access a specific application under current conditions.

Versa maps these directly to its architecture:

  • SD-LAN enforces Network Trust
  • SSE (or NGFW/Secure SDWAN CPE) enforces Application Trust

Together they form a layered Zero Trust system.

The Large Sieve vs. Small Sieve Model

A useful way to visualize Versa’s layered security model is the two-sieve analogy.

Network trust with SD-LAN acts as the broad sieve.

It quickly filters obvious threats by:

  • verifying identity
  • enforcing segmentation
  • isolating risky devices
  • restricting lateral movement

Devices that pass through the first layer can still be restricted further.

SSE or NGFW acts as the small sieve.

This layer performs deeper inspection to determine whether a specific application should be accessible.

The combination ensures threats are filtered both broadly and precisely.

Layer 1: Network Trust with Versa SD-LAN

The first Zero Trust checkpoint occurs when a device connects to the network. Versa SD-LAN enforces Zero Trust at the LAN edge, determining how devices are admitted and segmented.

Key capabilities include:

  • 802.1X authentication for user and device identity
  • MACsec link encryption on supported hardware
  • Macro-segmentation using VLAN/VRF assignment
  • Role-based access enforcement in the switch fabric
  • IoT device profiling and isolation
  • East-west traffic restrictions
  • Dynamic Micro-segmentation
  • Continuous posture enforcement
  • Full security (CASB, DLP, FwaaS, IPS, AV etc.) inspection for selected traffic.

Because Versa can perform full security inspection—including IPS, malware detection, AV, CASB, DLP, and other UTM functions directly at the access switch, threats can be detected at the first switch port where traffic enters the network. This is particularly important for ransomware and other lateral-movement-based attacks. By identifying malicious activity immediately at the network edge, Versa can isolate the compromised host through dynamic micro-segmentation before the attack spreads. In effect, the potential blast radius of a ransomware infection can be reduced from an entire subnet or branch network to a single host.

In effect, SD-LAN implements granular Zero Trust Network Access. Based on identity, device posture, and real time risk signals (from Versa UEBA), the system places the user/device into an appropriate network microsegment. Versa UEBA continuously calculates dynamic risk scores using multiple behavioral attributes, including application usage patterns and web browsing activity. These real-time risk signals allow SD-LAN to automatically tighten micro-segmentation or restrict access when suspicious behavior is detected.

If any of the parameters change, the device is moved to an appropriate micro-segmentation dynamically, providing access to appropriate network resources. If required, full security inspections like UTM, URL filter, IP reputation, Malware detection etc. can be performed for certain high-risk microsegments.

A user with low risk might receive normal access.
A higher-risk device may be placed into a restricted segment with limited connectivity.

This approach prevents lateral movement and protects sensitive resources inside the branch or campus network or data centers.

Layer 2: Application Trust with Versa SSE

Once traffic leaves the branch network, Versa SSE enforces application-level Zero Trust.

This layer evaluates whether a user or device should access a particular application at that moment.

Capabilities include:

  • Identity-based access to private applications
  • Device posture evaluation
  • Continuous trust scoring
  • Per-session policy enforcement
  • TLS inspection
  • DLP, CASB, IPS, and malware protection
  • User-to-application segmentation
  • Global policy enforcement

This layer answers a more precise question: Should this specific user or device access this specific application right now?

SSE delivers this capability globally, ensuring consistent policy enforcement regardless of user location.

The Role of Secure SD-WAN and NGFW

While SSE provides centralized security, Versa’s Secure SD-WAN and integrated NGFW capabilities also play an important role.

Many Zero Trust enforcement functions can be performed locally at the branch when necessary. This includes:

  • URL Reputation and filtering
  • TLS inspection
  • IPS/IDS
  • Malware protection
  • Application visibility

Branch-level enforcement offers two important advantages:

Performance

Security decisions can be made locally without sending traffic to a cloud security point first.

Resilience

If the SSE cloud becomes temporarily unreachable, the branch still maintains strong security enforcement.

This distributed model allows organizations to apply the right inspection layer depending on traffic type, performance needs, and architecture.

Handling Special or Legacy Devices

There are scenarios where full SSE inspection is not possible or desirable, particularly for legacy or sensitive systems.

Examples include:

  • Hospital equipment running outdated operating systems
  • Medical imaging systems
  • Industrial OT devices
  • Embedded control systems

These devices often cannot tolerate TLS inspection or deep packet inspection.

In these cases, SD-LAN segmentation and SD-WAN security controls can enforce protection on selected traffic flows, isolating these devices while still allowing necessary communication.

This flexibility ensures Zero Trust principles can still be applied even in environments with legacy infrastructure.

Versa Zero Trust Capability Matrix

Security Function Versa SSE Secure SD-WAN / NGFW Versa SD-LAN
ZTNA (User → Application) ✔ (branch enforcement)
Identity-based application access
TLS inspection Selected traffic
IPS / IDS Selected traffic
Malware protection Selected traffic
URL filtering Selected traffic
DLP / CASB
Zero Trust Network Access
802.1X / NAC
Dynamic segmentation
IoT profiling and isolation
East-west microsegmentation
WAN path steering
High availability / redundancy

How Versa Delivers End-to-End Zero Trust

When the full architecture is deployed, security enforcement happens in stages.

Step 1 — Device joins the network

SD-LAN enforces network trust:

  • identity verification
  • posture checks
  • segmentation
  • IoT isolation
  • Dynamic micro-segmentation
  • Basic security inspection for selected traffic

Step 2 — Traffic leaves the branch

Secure SD-WAN determines the optimal path

  • application classification
  • link selection
  • traffic steering
  • forwarding to SSE or local inspection

Step 3 — Application access is evaluated

SSE or NGFW/Secure SDWAN enforces application trust

  • identity-based access control
  • application control and network obfuscation
  • TLS inspection
  • advanced threat protection
  • DLP and CASB
  • continuous trust evaluation

Why This Architecture Matters

Versa’s layered approach delivers several advantages.

1. Branch networks enforce Zero Trust locally

Even if the cloud security layer is temporarily unavailable, segmentation and identity controls remain active.

2. IoT and unmanaged devices are protected

SD-LAN can identify and isolate devices that cannot run endpoint agents.

3. Security inspection can occur at multiple points

Traffic can be inspected:

  • locally in the branch
  • across the WAN
  • in the SSE cloud

This allows organizations to balance security, performance, and resilience.

The Complete Versa Zero Trust Architecture

Versa extends Zero Trust across the entire enterprise network stack:

  • SD-LAN establishes Network Trust through identity and segmentation
  • Secure SD-WAN provides optimized and secure transport
  • SSE and NGFW enforce Application Trust through deep inspection

The result is a complete Versa Zero Trust architecture where network trust and application trust work together to enforce security everywhere traffic flows.

Recent Posts













Gartner Research Report

2025 Gartner® Magic Quadrant™ for SASE Platforms

Versa has for the third consecutive year been recognized in the Gartner Magic Quadrant for SASE Platforms and is one of 11 vendors included in this year's report.