Welcome to…
Aryaka Blog

Reflecting on the Aryaka Accelerate Global Partner Program

Reflecting on the Aryaka Accelerate Global Partner Program

Posted on February 21, 2023 By Craig Patterson

Thank You to My Channel Mentors I spent more than 18 years at Lumen, almost half of my life, and while there, I learned from some great mentors. I learned from them all the fundamentals of creating[...]
Read Post >
Convergence of various kinds of proxies for SASE

Convergence of various kinds of proxies for SASE

Posted on February 16, 2023 By Srini Addepalli

Why Proxies in SASE? Gone are the days when the packet level security was considered sufficient. Due to the sophistication of attacks, it is becoming imperative to do deep content inspection for various kinds of protections. Identity[...]
Read Post >
Aryaka women in tech – Support. Empower.  Grow.

Aryaka women in tech – Support. Empower. Grow.

Posted on February 9, 2023 By Renuka Nadkarni

The International Day of Women in Technology and Science is celebrated every year on the 11th of February to acknowledge the achievements of women in the field of technology and science. This day serves as a reminder[...]
Read Post >
SD-WANswers with ChatGPT <br><h5>“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”</h5>

SD-WANswers with ChatGPT

“Hey ChatGPT, why do some enterprises still avoid using SD-WAN?”

Posted on February 7, 2023 By Sean Kaine

ChatGPT is incredible.  I mean, it not only has all the answers, it has them in seconds.  How do you compete!?  You don’t.  You leverage it … and have a bit of fun along the way. Real[...]
Read Post >
Resistance Breeds Resilience

Resistance Breeds Resilience

Posted on February 2, 2023 By Matt Carter

This year’s Black History Month theme is Black Resistance. African Americans have had to resist systemic oppression for far too many generations. The racism, poverty, lack of access to education, housing, and jobs – the eroding right[...]
Read Post >
The Benefits of Converging Network and Security

The Benefits of Converging Network and Security

Posted on January 31, 2023 By David Ginsburg

If you’re following the networking and security space, I’m sure you’ve read a lot about convergence over the past year or so. And, every day you probably have the best example of convergence in your pocket. Your[...]
Read Post >
What is Not SASE?: 5 Common Misconceptions Around SASE

What is Not SASE?: 5 Common Misconceptions Around SASE

Posted on January 25, 2023 By David Ginsburg

SASE (Secure Access Service Edge) is a new approach to network security that integrates multiple security and networking functions into a single cloud-based platform. However, there are many misconceptions around SASE that can prevent businesses from fully[...]
Read Post >
Network Security: Protecting Your Digital Assets

Network Security: Protecting Your Digital Assets

Posted on January 24, 2023 By David Ginsburg

In today’s digital age, data has become one of the most valuable assets for businesses and individuals alike. As we rely more and more on technology to store and transmit sensitive information, the importance of network security[...]
Read Post >
My Lesson From #3 <br><h5>Damar Hamlin and finding our why</h5>

My Lesson From #3

Damar Hamlin and finding our why

Posted on January 24, 2023 By Matt Carter

Why. What a powerful word.  The essence of curiosity.  Both enlightening and (for anyone who knows a 4-year-old) maddeningly frustrating.  ‘Why’ is the reason we explore. It’s how we learn.  It’s how we grow. But as Simon[...]
Read Post >
Network Security Best Practices

Network Security Best Practices

Posted on January 22, 2023 By David Ginsburg

In today’s digital world, network security has become a crucial aspect of protecting your business and personal information. Network security involves implementing policies and procedures to prevent unauthorized access, misuse, modification, or destruction of data. In this[...]
Read Post >
Unified SASE role Cyber Threat Hunting

Unified SASE role Cyber Threat Hunting

Posted on January 17, 2023 By Srini Addepalli

What is threat hunting? Threat hunting is a proactive defense approach to detect threats that evade existing security solutions. Why threat hunting? Firewall, IDS/IPS, SWG, ZTNA, CASB functions help in protecting enterprise assets from known threats. Security[...]
Read Post >
SASE and the (sometimes) futility of predictions

SASE and the (sometimes) futility of predictions

Posted on January 10, 2023 By Klaus Schwegler

At this time of the year, there are plenty of blogs and articles about predictions for the new year. And while it’s fun and worthwhile to think about the future and make predictions, the late baseball player[...]
Read Post >