ZTNA services are enabled by Versa Secure Private Access.
Part of Versa SASE product suite, Versa Secure Private Access (VSPA) is the industry’s first solution to deliver the leading SASE services and private connectivity for employees who are working remotely. With this solution, employees can now securely connect to applications in both the private and public clouds with the philosophy of Zero-Trust Access.
The foundation of VSPA is based on VOS™ which powers SASE services to corporate applications via the cloud, on-premises, or a blended combination of both, for thousands of customers globally.

Beyond Zero Trust Network Access Providers
For the first time, end users can leverage a remote access service directly on their end devices that delivers all the benefits of SASE. Unlike today’s VPN-based work from home solutions, Versa delivers the advantages of industry-leading SD-WAN remote access, including pervasive visibility of performance of the network, application, and security without requiring additional hardware.
VSPA allows for an assured experience with network and application monitoring, all backed by an integrated security suite which is recommended by CyberRatings. With the majority of the connections now being remote, the enterprise now has an exponentially expanded threat perimeter.
In order to protect the enterprise, VSPA can be augmented with the most comprehensive range of security services. These include stateful firewall, DOS protection, NGFW, IPS, and URL filtering on end users’ client devices connecting privately to company resources hosted in private data centers, public cloud, and SaaS locations.
Leveraging Zero Trust Network Access Services Best Practices
Delivered via the cloud, Versa Secure Private Access (VSPA) goes beyond Zero Trust Network Access (ZTNA) by efficiently connecting distributed users and applications while improving security and user experience.
ZTNA services are based on the fundamental philosophy of trusting no one. Versa Secure Private Access extends this principle with the following differentiated features:
- Application segmentation to restrict access
- Strong Multi-Factor Authentication (MFA)
- Granular application and role-based control
- Application and network visibility
- Private, encrypted connectivity to the network