Welcome to…
Aryaka Blog

The Benefits of Converging Network and Security

The Benefits of Converging Network and Security

Posted on January 31, 2023 By David Ginsburg

If you’re following the networking and security space, I’m sure you’ve read a lot about convergence over the past year or so. And, every day you probably have the best example of convergence in your pocket. Your[...]
Read Post >
What is Not SASE?: 5 Common Misconceptions Around SASE

What is Not SASE?: 5 Common Misconceptions Around SASE

Posted on January 25, 2023 By David Ginsburg

SASE (Secure Access Service Edge) is a new approach to network security that integrates multiple security and networking functions into a single cloud-based platform. However, there are many misconceptions around SASE that can prevent businesses from fully[...]
Read Post >
Network Security: Protecting Your Digital Assets

Network Security: Protecting Your Digital Assets

Posted on January 24, 2023 By David Ginsburg

In today’s digital age, data has become one of the most valuable assets for businesses and individuals alike. As we rely more and more on technology to store and transmit sensitive information, the importance of network security[...]
Read Post >
Network Security Best Practices

Network Security Best Practices

Posted on January 22, 2023 By David Ginsburg

In today’s digital world, network security has become a crucial aspect of protecting your business and personal information. Network security involves implementing policies and procedures to prevent unauthorized access, misuse, modification, or destruction of data. In this[...]
Read Post >
Threat Hunting Techniques and Solutions with Unified SASE

Threat Hunting Techniques and Solutions with Unified SASE

Posted on January 17, 2023 By Srini Addepalli

What is threat hunting? Threat hunting is a proactive defense approach to detect threats that evade existing security solutions. Why threat hunting? Firewall, IDS/IPS, SWG, ZTNA, CASB functions help in protecting enterprise assets from known threats. Security[...]
Read Post >
SASE and the (sometimes) futility of predictions

SASE and the (sometimes) futility of predictions

Posted on January 10, 2023 By Klaus Schwegler

At this time of the year, there are plenty of blogs and articles about predictions for the new year. And while it’s fun and worthwhile to think about the future and make predictions, the late baseball player[...]
Read Post >
SASE and  ZTNA: Decoding the different flavors of Zero Trust

SASE and ZTNA: Decoding the different flavors of Zero Trust

Posted on December 20, 2022 By Jaz Lin

Are you sometimes as confused as I am about the various definitions of Zero Trust, and how almost every vendor has co-opted the term for their marketing? Disclaimer – we could be accused of the same, but[...]
Read Post >
Gartner IOCS 2022 Recap – Leading the Next Phase of Growth

Gartner IOCS 2022 Recap – Leading the Next Phase of Growth

Posted on December 14, 2022 By Klaus Schwegler

After a 3-year hiatus of hosting an in-person event, the annual Gartner IOCS (short for Gartner Infrastructure, Operations & Cloud Strategies Conference) returned to Las Vegas last week. As we all know, much has changed since 2019,[...]
Read Post >
4 Years In A Row : Aryaka Is A Great Place To Work Globally

4 Years In A Row : Aryaka Is A Great Place To Work Globally

Posted on December 6, 2022 By Shasha Mirjana

One. Two. Three. Four. For the fourth year in a row, Aryaka received certification from Great Place to Work in the United States, India, and Germany, as an “Attractive Employer.” Aryakans anonymously gave positive feedback for honest[...]
Read Post >
Less Complexity, More Performance with our Multi-Segment WAN

Less Complexity, More Performance with our Multi-Segment WAN

Posted on November 8, 2022 By Klaus Schwegler

Less complexity, more optimal app performance with built-in flexibility and choice for network and security services so you can adapt quickly. And a cloud-centric WAN architecture that has delivered the best and most consistent application performance for[...]
Read Post >
Realizing Identity-aware SASE with Identity based Policies

Realizing Identity-aware SASE with Identity based Policies

Posted on November 2, 2022 By Srini Addepalli

Why Identity awareness in SASE? My previous blog on Deciphering SASE talked about identity awareness in various security components of SASE. This post describes the various methods for realizing identity-aware SASE. Access controls in traditional perimeter-centric security[...]
Read Post >
Major Internet Outage Resulting from Suspected Cut of Undersea Cable

Major Internet Outage Resulting from Suspected Cut of Undersea Cable

Posted on October 20, 2022 By Renuka Nadkarni

Aryaka’s Unified SASE customers immune to global internet outage and enjoy uninterrupted service. A major internet outage was first reported in the evening of Oct 19, impacting fiber connectivity between Europe and Asia.  The chart below from Thousand[...]
Read Post >