This blog captures a presentation delivered by Versa’s Chief Marketing Officer at RSAC 2025. Presented live at the Versa booth, it outlines why SASE is transforming enterprise security – and how Versa uniquely delivers on that transformation with its unified, AI-powered platform.
Distributed intelligent computing has arrived. Processing power, data, and intelligence are no longer confined to centralized cloud or data centers. Instead, they are distributed across data centers, cloud, edge locations, campuses, branches, and even devices. While prior phases of computing, internet, mobility, and cloud fundamentally reshaped how we live and work, this next phase is poised to have an even more profound impact.
Recent reporting on VoidLink, a Linux malware framework reportedly developed almost entirely with the assistance of generative AI, marks a structural shift in the threat landscape. According to coverage in CSO Online, VoidLink’s development cycle, code organization, and modular design strongly suggest AI-assisted creation — compressing what historically required months of coordinated engineering into days of automated iteration. This is where Versa SASE, combined with GenAI usage controls, provides a grounded and enforceable defensive posture.
We are excited to announce a powerful integration between Versa Networks and 10T Solutions. This industry-leading innovation brings native multi-carrier 10T eSIM connectivity directly to Versa Secure SD-WAN appliances. Enterprises are rapidly adopting cellular connectivity to accelerate branch deployments, support mobile operations, and ensure business continuity.
In 2025, Versa became the first SASE vendor to introduce Sovereign SASE, creating a model specifically designed to meet jurisdictional, regulatory, and operational sovereignty requirements. You likely already know that traditional cloud and SASE platforms, while globally scalable, often don’t provide the level of control you need if you operate in regulated industries or public sector environments. For many organizations like yours, simply knowing where data resides is no longer enough.
Control means setting clear rules for AI usage and enforcing them in a way that does not break the business. This is the point where many companies get stuck. Some teams over-block and kill adoption. Other teams do nothing and accept silent risk. The goal is neither. The goal is safe adoption by default.
AI is showing up everywhere in the enterprise sometimes through approved tools and sometimes through “shadow AI.” The first step to securing it is simple: if you cannot see AI usage, you cannot secure it. This post explains what to discover, why it is hard, and what to do in the first 30 days.
AI applications are no longer tools used by a few teams for productivity or collaboration. They are rapidly becoming tools that help build core IT systems across every industry. From generative AI to NLP powered copilots to predictive analytics, enterprises are embedding AI into everyday operations, customer engagement and decision-making.
Natural Language Processing (NLP) has evolved significantly over the past decade. From the humble beginnings of a simple rule-based lookup, it has now transformed into AI-driven systems capable of context-based responses for operational intelligence. In enterprise networks that are distributed, the need for simplified operations has never been greater. Network Operations (NetOps) teams are under increased pressure to troubleshoot faster, identify root causes accurately, and reduce resolution cycles while maintaining uptime and business agility.
Summary Versa has enhanced its AI DLP capabilities, comprehensive multi-format file inspection with granular metadata analysis, and intelligent redaction/tokenization features. These enhancements enable organizations to detect and prevent sensitive data leakage with unprecedented accuracy while minimizing false positives through contextual understanding. In this surgical walkthrough, we’ll dissect each of these enhancements to show exactly how Versa’s AI DLP elevates data protection from detection to intelligent prevention. AI DLP – Enhancements to Data Discovery based on ‘ML Analysis’ Versa’s new capabilities in AI-powered DLP takes data protection beyond contextual DLP by embedding advanced machine learning directly into the SASE fabric. Deployed…
BrickStorm is a highly stealthy Linux backdoor designed for long-term, targeted cyber-espionage. Brickstorm is closely associated with Cyber Espionage group UNC5221, which is known for exploiting zero-days vulnerability in network edge appliances like Ivanti, F5 and MiTRE breach. Unlike commodity malware, BrickStorm is deployed post-compromise, operates largely in memory, and uses a modular architecture with custom encrypted command-and-control (C2). Its focus on Linux servers, network appliances, and embedded systems reflects a broader trend: attackers increasingly target infrastructure layers where visibility and detection are weakest.
Subscribe to the Versa Blog