Versa Networks is expanding its SASE platform with integrated cloud security posture management (CSPM), updated orchestration tooling, and new controls for AI agents. The company’s pitch revolves around the idea that enterprises are struggling to manage security, networking, and cloud operations across too many systems.

The addition of CSPM into VersaONE is a signal of where the market is heading. CSPM has traditionally sat with cloud and security teams, often in separate consoles from networking and access controls. By bringing CSPM into the same operational layer as ZTNA, SSE, and SD-WAN, Versa is betting that cloud risk, user access, and network policy increasingly need to be managed together.

That reflects a broader convergence trend already underway across enterprise infrastructure. Networking teams are taking on more security responsibilities through SASE rollouts, while security teams are being pulled deeper into traffic management, policy orchestration, and cloud architecture decisions. Versa’s own survey data highlights the operational strain: 35% of respondents linked breaches to coordination gaps between networking and security teams, while 73% said integration complexity delayed projects.

The Concerto orchestration update also speaks to that overlap. Unified policies across SD-WAN and SSE reduce the “two-portal” problem that many enterprises still operate with today. The goal is centered around reducing inconsistent enforcement across users, sites, cloud environments, and applications.

The AI agent controls extend the same logic further. As AI systems begin making infrastructure and policy changes autonomously, the distinction between identity management, network operations, and security governance becomes harder to separate.

Taken together, the announcements show how SASE platforms are evolving beyond connectivity and access control into broader operational control planes for enterprise infrastructure and cloud risk.

The timing reflects a broader shift in how enterprise traffic behaves. Data is no longer just flowing in and out of a network perimeter. It is moving laterally across systems, between cloud environments, and through new, agent-based applications. That shift is exposing the limits of traditional firewall architectures, particularly when advanced inspection and threat protection are enabled.

  • Forwarded this message? Subscribe to Uplink.

  • Follow us on LinkedIn to stay in the loop