ZTNA services are enabled by Versa Secure Access.
Part of Versa SASE, Versa Secure Access (VSA) is the industry’s first solution to deliver the leading SASE services and private connectivity for employees who are working from home remotely. With this solution, employees can now use ZTNA providers to securely connect to applications in both the private and public clouds with the philosophy of trusting no one.
The foundation of Versa Secure Access is based on VOS™ which powers SASE services to corporate applications via the cloud, on-premises, or a blended combination of both, for thousands of customers globally.
Beyond Zero Trust Network Access Providers
For the first time, end users can leverage a remote access service directly on their end devices that delivers all the benefits of SASE. Unlike today’s VPN-based work from home solutions, Versa delivers the advantages of industry-leading SD-WAN remote access, including pervasive visibility of performance of the network, application, and security without requiring additional hardware.
Versa Secure Access allows for an assured experience with network and application monitoring, all backed by an NSS-recommended (now CyberRatings) integrated security suite. With the majority of the connections now being remote, the enterprise now has an exponentially expanded threat perimeter.
In order to protect the enterprise, Versa Secure Access offers the most comprehensive range of security and ZTNA services. These include stateful firewall, DOS protection, NGFW, IPS, and URL filtering on end users’ client devices connecting privately to company resources hosted in private data centers, public cloud, and SaaS locations.
Leveraging Zero Trust Network Access Services Best Practices
Delivered via the cloud, Versa Secure Access goes beyond Zero Trust Network Access (ZTNA) by efficiently connecting distributed users and applications while improving security and user experience.
ZTNA services are based on the fundamental philosophy of trusting no one. Versa Secure Access extends this principle with the following differentiated features:
- Application segmentation to restrict access
- Strong Multi-Factor Authentication (MFA)
- Granular application and role-based control
- Application and network visibility
- Private, encrypted connectivity to the network