Secure Access Service Edge (SASE)

Secure Access Service Edge, or SASE, is an emerging cybersecurity concept. In this video, you understand how the key capabilities of SASE address the demands of growing network sprawl and the challenges of digitally transforming your business.

Versa for Work-From-Home

Versa has made it simple for organizations to offer Secure SD-WAN for Work-From-Home users on home appliances or working from anywhere

Top Energy Firm Achieves Comprehensive “Work-From-Anywhere” with Versa SASE

A large, publicly traded energy company operating in all areas of the oil and gas industry has dramatically simplified their network stack and realized huge cost savings with Versa SASE.

 
Availability and Buying Options in the Emerging SASE Market

EMA evaluates the different SASE vendors and their approaches to architecture, go-to-market, and support for their cloud-delivered and hybrid services.

 
Gartner Magic Quadrant for WAN Edge Infrastructure, 2020

Gartner 2020 Magic Quadrant report analyzes the various vendors in the WAN edge market and Versa is positioned as a Leader.

Versa Networks - Explained in 1 minute

Learn about the Versa Secure SD-WAN solution in a high-level, one minute overview.

 
Versa SASE (Secure Access Service Edge)

SASE is the simplest, most scalable way to continuously secure and connect the millions points of access in and out of the corporate resources regardless of location

RBI

Remote Browser Isolation

Mitigating risky web activity.

Part of Versa SASE, Versa RBI moves the execution of a user’s browser activity from the client device to a remote server — hosted on-premises or in the cloud. This protects against browser-based security exploits and provides a means of anonymous browsing and risk-free open Internet access.

As the user browses the public Internet, the remote browser is isolated from the user’s physical endpoint and enterprise network. Therefore, any attacks on the remote browser session are constrained to the virtual environment.

Every browser session runs in an isolated environment that prevents any compromise from infecting the user’s working environment. Attacks at the browser level are expected, but when using a remote browser, attacks can’t reach other systems and can’t persist. This removes the threat because sessions are reset after each use.

Protecting Your Organization’s Data

RBI also helps with data protection, especially in the case of unmanaged or untrusted devices being used to access confidential or sensitive information.

Instead of allowing the unmanaged devices to download the information/files, the system downloads the sensitive information to the remote/isolated browser instance. The unmanaged or untrusted devices only see a visual rendering of the data.

Deploying Versa Remote Browser Isolation.

Versa RBI can be implemented in two ways. One is as a primary means of protection, where it renders all sites using RBI, with other filtering (mainly site categorization) applied as needed. The other is as a feature of a traditional web proxy, where it renders sites selectively using RBI based on the site’s reputation. Here’s how that works:

  • User sessions are scanned for risk based on URL filtering and categorization.
  • Risky websites are rendered on a remote browser.
  • Sanitized pages (primarily image files) are rendered on the user’s browser.

RBI takes a selective content disarm and reconstruction (CDR) approach to web browser sessions. Versa RBI operates in the following two ways:

  • By rendering an image of a web page in the user’s browser using a plug-in or an HTML5 renderer
  • By extracting readable information from a web page’s HTML and reconstructing it in the user’s browser

Are you ready to implement SASE?

Listen to how you can ready yourself for SASE.

Today's network architectures are failing to meet the requirements for digital business. In turn, a new approach is needed and ultimately, businesses need to be getting ready for a SASE transformation.

How to Deploy Versa SASE

Versa SASE is available in an array of deployment options, allowing you to tailor the solution to your network environment.

On-Premises

Available as software to deploy in on-premises hardware including appliances, bare metal, hypervisors, or containers.

Cloud

Available as a service delivered via the cloud for networking, security, and analytics to thin branches and end users.

Blended

Available as a blended combination of SASE services via the cloud and on-premises for any location profile.