Skip to content

NordLayer features in review: Cloud Firewall

There was a time when on-premises hardware took care of your company’s cybersecurity. Most workers heard there was some kind of firewall behind those server room doors but never got to see it. Now, these rooms are getting smaller, and there are fewer and fewer doors to open. 

Today, hardware-heavy businesses are steadily declining while the on-cloud sector goes the opposite way. This doesn’t come as a surprise, given that buying solutions from the vendor is cheaper and doesn’t require a significant IT workforce. Following the trend, we at NordLayer further expanded our cybersecurity feature selection with a Cloud Firewall.

While we already had options like ThreatBlock or Deep Packet Inspection Lite (DPI Lite) next to the VPN, Cloud Firewall will further strengthen your multi-layered network protection. Also, let’s not forget that a firewall is a must for Secure Access Service Edge (SASE) and Security Service Edge (SSE) frameworks.

Whether you’re moving to the cloud or looking for ways to strengthen your company’s cybersecurity, continue reading to learn how NordLayer’s Cloud Firewall can assist.

Cloud Firewall solution using NordLayer

NordLayer’s Cloud Firewall is very easy to deploy as it doesn’t require extra hardware that would also need constant supervision. That means you won’t have issues integrating it into your existing network and fitting the company’s infrastructure. In fact, the whole network access management process becomes streamlined and effortless.

As noted earlier, you can install a firewall on your hardware, choose a cloud-based option, such as NordLayer, or use both options. The Cloud solutions are also known as Firewalls as a Service (FWaaS). They require no local hardware—just a web-based Control Panel for controlling access to your data.

Benefits of Cloud Firewall VPN

NordLayer’s FWaaS can benefit you in many ways beyond firewall protection. Here are just some of the examples.

Granular network segmentation

The main benefit of NordLayer’s Cloud Firewall is granular network segmentation. It means you can choose which departments, teams, or employees can access particular in-house resources. This makes creating new workflows easier and existing business processes more secure.

Moreover, network segmentation reduces the attack surface inside the organization. It’s always easier to detect a possible threat in a subnet compared to the whole network.

Let’s also not forget about the increased performance. The bigger the network, the higher the risk of a slowdown. With network segmentation, you’ll avoid bandwidth throttling because one subnet’s load won’t affect the other.

Centralized security

The firewall is on the cloud, meaning it can easily protect both your office and remote workers. That means it works both for your cloud and on-premises environments. The same applies to enforcing policies on all endpoints.

Centralized security means that your IT admins have more control over network security. What’s more, they can customize security controls for each segment.

One control panel to rule them all

One of the main goals of NordLayer is simplicity and ease of use. That’s why we put all controls in one panel without cluttering it. Even if you’re not an IT expert, you’ll be able to create new rules, which will be automatically applied to anything added to the Gateway.

And in case there was a rule for one employee only, it will automatically become disabled if the worker is removed from a Team. However, if you decide to remove a Gateway or a dedicated server, you’ll have to turn off the firewall first.

Optimized maintenance

Cloud firewalls are easily updated, and the process can be automated. There’s no need to visit every office with a server to install the latest firmware updates and patches.

Increased speed

Traditional firewalls are not always ready to handle cloud applications and may require extra expenses for them to work. In contrast, NordLayer’s Cloud Firewall won’t become a choke point in your network.

And the best thing is you won’t be sacrificing security for the sake of performance. It’s always easier to avoid bandwidth throttling when you have your network segmented.

Flexible scaling

No need for extra hardware means your Cloud Firewall will expand together with your business. And this can happen without overly complicating the process.

A new department in your company? Simply add another rule for them. With NordLayer’s Cloud Firewall, you can focus on your business instead of worrying about its cybersecurity.

Additionally, it doesn’t matter what kind of work model your company uses. NordLayer fits in-house, cloud, and hybrid environments. So, if you’re planning to switch from one to another in the near future, you don’t need to worry about changing your firewall.

How does NordLayer’s FWaaS feature work?

NordLayer’s Cloud Firewall works a bit like a border guard, scanning incoming and outgoing data packets. It checks if you can pass the border into a specific country.

Just like a firewall examines the content of the data packet, the border guard inspects your ID to see if it’s really you and whether you’re on a list of allowed travelers. But how does that actually happen?

The first and most important step is configuring the firewall according to your business needs. That means creating rules defining who will access which resources and who will be blocked. A rule can be applied to the whole company or just one employee.

When it comes to traffic destinations, your Cloud Firewall can work with standalone IPs, IP lists, or entire subnets. These options give you the freedom to customize to your heart’s content.

Once you’re past this stage, the only thing left is enabling NordLayer’s Firewall, which in turn starts filtering data packets passing through the gateway.

Now, no matter your or your employee’s location, this Cloud Firewall will protect your company as the bouncer protects the nightclub by doing face control. He won’t let the dodgy-looking fellas in and won’t explain the reasons why. And you, as the club manager, can overrule the bouncer’s decision anytime.

You can also customize NordLayer’s Firewall to fit your company. No matter if your workplace is on-site, hybrid, or remote – you’ll still be getting top-notch threat prevention and access control.

What’s more, you don’t have to be an IT specialist to tweak your Cloud Firewall. You can apply different rules to your employees right in NordLayer’s Control Panel. No more financial data for Mark? Bam, it’s done. Sales team newbies need access to Salesforce? Bam, it’s done.

How to use NordLayer’s Cloud Firewall?

This section describes the key actions you can take with our FWaaS without needing an IT specialist. We’ll look at Default Firewall Action, creating new Firewall rules, and managing rule hierarchy. We also want to remind you that if you’re having trouble with any of the steps, contact our 24/7 customer support – they will be glad to help.

What is a Default Firewall Action?

Default Firewall Action controls what happens to the traffic when it does not meet any of the firewall rules defined by the organization. However, new employees who are yet to be assigned to a Team won’t see any Virtual Private Gateways, just the shared ones. This means neither firewall rules nor the Default Firewall Action applies to them.

There are two Default Firewall Actions available:

  • Allow. The firewall allows all network traffic by default unless a rule prohibits the traffic.

  • Deny. The firewall disallows all network traffic by default unless a rule permits the traffic.

This means you can’t have both actions active, just like the border guard can’t let and not let you through at the same time.

Creating new Cloud Firewall rules

Firewall rules are the backbone of the firewall itself. Without rules, the Cloud Firewall is basically not doing anything. So, your first step should be deciding on the exact policies and the resources or services you want to have controlled access.

5 1400x670

Creating a new rule starts with naming it, followed by choosing the traffic source. It can be any traffic from any Team or a specific Team or employee. When you have the traffic source set, you can determine the traffic destination.

Once again, it can be any network address or a custom one. You can choose from predefined addresses or a new entry.

Finally, you get to define network services such as protocols and ports. Each new rule is added to the top of the priority list. Rule priority can be adjusted by dragging and dropping separate rules.

NordLayer’s FWaaS statuses and rule hierarchy

As mentioned above, firewall rules have a hierarchy that helps control your network. So when a firewall sees that the traffic meets the criteria of a certain rule, it ignores the others with lower priority.

Every rule can have one of the three statuses – Enabled, Disabled, or Deleted. All are self-explanatory, but the latter status will change only when you apply the rule changes.

NordLayer’s FWaaS vs traditional firewall

Traditional firewall requires you to have the necessary hardware in your office. Then, you need IT managers to install the firewall, maintain it, and extend its coverage.

This can be a good option if you don’t have remote workers, including yourself. But that’s highly unlikely, isn’t it? In contrast, as the name implies, NordLayer’s Cloud Firewall is deployed in the cloud and efficiently protects your workforce around the world. Moreover, this helps to cut your cybersecurity costs.

Also, if you’re working with cloud-based services, there are no extra investments to protect the remote workforce. Since the firewall is virtual, it stands between the user and the service. If you had an on-premises firewall, a remote worker would need to backhaul the traffic to the hardware infrastructure first, which is neither easy nor practical.

Should you get NordLayer’s Cloud Firewall?

Gone are the days when cybercriminals would target only big corporations like Google or Amazon. According to IT Governance, more than 40% of data breaches and ransomware attacks hit SMBs, and over 50% of companies plan to increase cybersecurity spending (IBM). The most targeted industries are Manufacturing, Finance & insurance, and Professional business & consumer services.

In short, every company that uses the internet should get a solid firewall. And if at least one employee will work remotely, a cloud version is the easiest and cheapest path to enhanced cybersecurity. For that, we recommend NordLayer’s Cloud Firewall.

Our FWaaS gives you IaaS, PaaS, and SaaS app protection, granular access control, and secure packet filtering. It combines well with DNS filtering by category or our DPI capabilities. Managing and centralizing your network won’t be a trouble, and when your business is ready to scale, your Cloud Firewall will follow side-by-side.

FAQ

What is a cloud firewall?

A cloud firewall is a specialized security solution designed to restrict unauthorized access. Unlike traditional firewalls operating on-premises, cloud firewalls are situated and managed within the cloud. This modern firewall deployment approach is often called Firewall-as-a-Service (FWaaS).

What is the difference between a cloud firewall and FWaaS?

All Firewall-as-a-Service (FWaaS) are cloud firewalls, but not all cloud firewalls are FWaaS. Cloud firewall protects cloud-based resources by restricting unauthorized access. FWaaS delivers these capabilities as a managed service, eliminating the need for on-premises hardware or dedicated firewall appliances.

What is the difference between a cloud firewall and a hardware firewall?

A cloud firewall, such as NordLayer FWaaS, operates in a cloud environment, focusing on data-centric protection strategies. In contrast, a hardware firewall is a physical device that guards the perimeter of a local network, using both hardware and software to filter and monitor incoming and outgoing traffic.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

The BYOD Cybersecurity Checklist

With the proliferation of smartphones, tablets, and laptops, employees are no longer tied to their office desktops. BYOD, which stands for Bring Your Own Device, allows them to use their personal devices for work-related tasks, improving flexibility and remote work capabilities. However, this convenience also poses challenges for IT departments, security teams and corporate devices, as it brings about various BYOD security risks.

BYOD (Bring Your Own Device) combines personal and professional data, posing unique challenges for organizations. Personal mobile devices, including personal computers, contain sensitive company data like emails and social media, gaining access to corporate networks when used for work. This merger requires careful risk assessment and security measures to prevent data leakage and unauthorized access.

The main concern is unauthorized access to corporate data if a personal device is lost or stolen, leading to data breaches, financial loss, and reputational harm. Using personal devices outside the organization’s network also invites malware and phishing risks, compromising data and system access, particularly when dealing with multiple devices.

Moreover, BYOD complicates regulatory compliance, as different industries and locations have specific data protection laws. Non-compliance can lead to severe penalties and legal issues, emphasizing the need for a thorough BYOD policy to meet legal requirements and address security concerns.

Cybersecurity checklist for BYOD

To ensure the security of your organization’s data and networks in a BYOD environment, consider implementing the following checklist or BYOD security solutions:

 

1. Establish Clear BYOD Policies:

  • Create comprehensive BYOD policies that cover acceptable device usage, data handling practices, and security requirements for both personal and corporate devices.
  • Define procedures for device registration, monitoring, and incident response, especially when dealing with lost or stolen devices.

 

2. Educate and Raise Awareness:

  • Conduct regular cybersecurity training for employees to educate them about BYOD risks and best practices.
  • Promote strong password practices and implement multi-factor authentication (MFA).

 

3. Implement Device Management Solutions:

  • Utilize Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) tools for centralized device control.
  • Enforce encryption, remote wipe capabilities, and application whitelisting.

 

4. Network and Data Security:

  • Segment BYOD devices on a separate network to isolate them from critical internal networks.
  • Implement network security measures like firewalls, intrusion detection systems, and VPNs for secure data transmission and safeguarding business data.

 

5. Application and Access Controls:

  • Review and approve applications before installation on BYOD devices.
  • Monitor and restrict application permissions to minimize unnecessary access.

 

6. Regular Updates and Patch Management:

  • Ensure all BYOD devices, personal computers included, have the latest operating system and software updates.
  • Implement a policy for prompt installation of security patches.

 

7. Data Encryption and Backup:

  • Enforce data encryption for both data at rest and in transit on BYOD devices.
  • Set up automated backup solutions and develop a data recovery plan.

 

8. Incident Response Planning:

  • Develop a comprehensive incident response plan specific to BYOD security incidents, outlining steps for addressing lost or stolen device incidents.
  • Define roles and responsibilities for handling breaches and security events.

 

9. Compliance and Legal Considerations:

  • Ensure compliance with data protection regulations (e.g., GDPR, HIPAA) in your BYOD policy.
  • Align BYOD policies with legal requirements and industry standards.

 

10. Regular Security Audits and Employee Offboarding:

  • Conduct routine security audits and vulnerability assessments of BYOD devices.
  • Establish a protocol for securely removing data and access when an employee leaves the organization.

How SafeDNS can help

It’s important to understand that while a thorough checklist is crucial for minimizing BYOD risks, adopting a strategic and multi-layered approach is the key to successfully navigating the various challenges. Partnering with a trusted cybersecurity ally can significantly enhance your organization’s ability to achieve comprehensive protection.

SafeDNS provides robust web filtering and content categorization capabilities, which serve as crucial layers in your multi-pronged security approach. By effectively filtering web content, it ensures that BYOD users access only safe and relevant websites, mitigating the risk of malicious attacks and inadvertent data breaches.

Conclusion

BYOD environments offer significant advantages, but they also introduce a multitude of cybersecurity challenges. Organizations must prioritize security to protect sensitive data, maintain compliance, and safeguard their reputation. Implementing a comprehensive cybersecurity checklist for BYOD is a crucial step in ensuring that employees can use their devices securely while minimizing risks, especially when dealing with a lost or stolen device.

Remember, mobile security in BYOD environments is an ongoing process, and staying vigilant is key to success. Regularly review and update your BYOD security policy and procedures, monitor the threat landscape, and adapt your security measures accordingly. With the right approach, you can harness the benefits of BYOD without compromising your organization’s cybersecurity posture. Partnering with cybersecurity allies like SafeDNS can enhance your organization’s ability to achieve comprehensive protection and mitigate BYOD security risks.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

9 ChatOps tips your team should adopt today

Increase team collaboration quality and speed in emergencies with Pandora FMS and ilert’s ChatOps features

Pandora FMS is an excellent monitoring system that helps collect data, detect anomalies, and monitor devices, infrastructures, applications, and business processes. However, more than monitoring alone is needed to manage the entire incident lifecycle. ilert complements Pandora FMS by adding alerting and incident management capabilities. While Pandora FMS detects anomalies, ilert ensures that the right people are notified and can take action quickly. This combination helps reduce the mean time to resolution (MTTR) and minimize the business’s impact.

While Pandora FMS and ilert are reliable and robust foundations for your system’s resilience, the magic of team collaboration and real-people decisions happens in chats. This trio of tools is indispensable in today’s business world. In this article, we will provide practical recommendations on evolving your ChatOps and enhancing the speed and quality of incident response.

What exactly is ChatOps? 

ChatOps is a model that connects people, tools, processes, and automation into a transparent workflow. This flow typically centers around chat applications and includes bots, plugins, and other add-ons to automate tasks and display information.

As a model, ChatOps means that all team communication and core actions are taking place right in a chat tool, which eliminates the need to switch between the services and makes it possible to orchestrate the work from one platform. As there is a variety of chat tools on the market, there are, for sure, two of the most commonly used among IT teams. Those are Slack and Microsoft Teams. As for the available data, they have 18 million and 270 million users, respectively, and those numbers are growing consistently for both companies.

As there is a wide variety of implementations of the ChatOps model to everyday work, we will concentrate specifically on how to manage incidents through ChatOps.

ChatOps and Incident Management: What is it all about?

The fusion of monitoring and incident management platforms with ChatOps is a manifestation of modern IT operations aiming to optimize efficiency, speed, and collaboration. By marrying these paradigms, organizations can capitalize on the strengths of the tools, leading to streamlined incident resolution and enhanced operational visibility.

At the core of ChatOps lies real-time collaboration. When an incident arises, time is of the essence. Integrating ChatOps with an incident management platform ensures that all team members—be it developers, support, or management—are immediately aware of the incident. They can then collaboratively diagnose, discuss, and strategize on remediation steps right within the chat environment. This kind of instant cross-team collaboration reduces resolution time, ensuring minimal service disruption.

Here are other advantages that integrated ChatOps provides in times of incident response.

Centralized information flow

ChatOps can funnel alerts, diagnostics, and other relevant data from various sources into a single chat channel. This consolidation prevents context-switching between tools and ensures everyone has access to the same information.

Team awareness

Everyone involved in the incident response has a shared view of the situation. This shared context reduces miscommunication and ensures everyone is aligned on the incident’s status and the response strategy.

Detailed overview

Every action taken, command executed, and message sent in a chat environment is logged and timestamped.

Accountability

With each chat action being attributed to a team member, there’s clear accountability for every decision and command. This is especially valuable in post-incident reviews to understand roles and contributions during the incident.

Automation

Through chat commands, responders can trigger predefined automated workflows. This can range from querying the status of a system to initiating recovery processes, thereby speeding up resolution and reducing manual efforts.

Accessibility

With many ChatOps platforms being available on both desktop and mobile, responders can participate in incident management even when away from their primary workstation, ensuring that expertise is accessible anytime, anywhere.

9 Tips on How to Squeeze Maximum out of ChatOps in Times of Incidents

ChatOps provides a synergistic environment that combines communication, automation, and tool integration, elevating the efficacy and efficiency of incident response. But what exactly do teams need to uncover the full potential of their chats?

We won’t dive deep into instructions on how to connect Pandora FMS with the ilert incident management platform, but you can find related information in Pandora FMS Module Library and a step-by-step guide in ilert documentation. Find below a list of best ChatOps practices for organizing your workflow when an alert is received.

Use dedicated channels

Create dedicated channels for specific incidents or monitoring alerts. This helps to keep the conversation focused and avoids cluttering general channels. And don’t forget to set a clear name for those channels. In ilert, the pre-build title includes the name of the monitoring tool and the automatically generated number of an alert, for example, pandorafms_alert_6182268.

Allow users to report incidents via your chat tool

Enable all users to report incidents through Slack or Microsoft Teams using pre-set alert sources for each channel. This approach empowers teams to have a structured method for reporting concerns related to the services they offer within their dedicated channels.

Decide on what channels should be private

Most chat tools provide functionality to create public channels that are searchable across an organization and can be viewed by all team members, and private where only specific people can be invited. Here are a few reasons why you might want to create a private channel:

    • Sensitive data exposure. Such as personal identification information (PII), financial data, or proprietary company information.

 

    • Security breaches. In the event of a cyberattack or security compromise, it’s important to limit knowledge about the incident to a specialized team. This prevents unnecessary panic and ensures that potential adversaries don’t gain insights from public discussions. You can read more on how to prevent data breaches in the article “Cyber Hygiene: Preventing Data Breaches.”

 

    • High-stakes incidents. If the incident has potential grave repercussions for the organization, such as significant financial impact or regulatory implications, it’s beneficial to restrict the discussion to key stakeholders to ensure controlled and effective communication.

 

  • Avoiding speculations. Public channels can sometimes lead to uncontrolled speculations or rumors. It’s best to keep discussions private for serious incidents until the facts are clear and an official narrative is decided upon.

 

Keep all communication in one place

Ensure that all decisions made during the incident are documented in the chat. This assists in post-incident reviews.

Pin important messages

Use pinning features to highlight essential updates, decisions, statuses, or resources so they’re easy for anyone to find.

Keep stakeholders informed

Ensure you keep your team in the loop and update all incident communication, including public and private status pages, in time.

Use chats in post-mortem creation

The real-time chat logs in ChatOps capture a chronological record of events, discussions, decisions, and actions. During a post-mortem creation, teams can review this combined dataset to construct a comprehensive incident timeline. Such a detailed account aids in pinpointing root causes, identifying process bottlenecks, and highlighting effective and ineffective response strategies.

Regularly clean up and archive

To maintain organization and reduce clutter, regularly archive old channels or conversations that are no longer relevant. Avoiding numerous channels in your list will also speed you up when the next incident occurs.

Provide regular training for all team members

The more familiar your team is with tools, alert structure, chat options, and features, the quicker you will be when the time comes. Trigger test alerts and conduct incident learning sessions so that everyone involved knows their role in the incident response cycle.

El equipo de redacción de Pandora FMS está formado por un conjunto de escritores y profesionales de las TI con una cosa en común: su pasión por la monitorización de sistemas informáticos.

Pandora FMS’s editorial team is made up of a group of writers and IT professionals with one thing in common: their passion for computer system monitoring.

 

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Scale Computing’s Marlena Fernandez Named a Finalist for the 2023 CRN Women of the Year Awards

INDIANAPOLIS – October 17, 2023 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that Marlena Fernandez, vice president of marketing, has been recognized as a finalist in the inaugural CRN Women of the Year Awards. Hosted by The Channel Company, the awards honor exceptional women, companies, and allies who have demonstrated outstanding leadership and innovation within the IT channel and tech industry. Fernández has been named as a finalist for the Marketing Executive of the Year Award.

“We are extremely proud to yet again have Marlena’s accomplishments recognized by the industry,” stated Scale Computing CEO and Co-founder, Jeff Ready. “Her work has been instrumental in growing our customers and revenue, and in more than doubling Scale Computing’s partner base in the past few years. Marlena’s continued commitment to the growth of our award-winning Scale Computing Partner Community makes her an invaluable asset to not just Scale Computing, but to our partners, better enabling them to successfully meet their end users’ needs for simple, scalable, and affordable IT infrastructure. We are thrilled to celebrate Marlena as a finalist for CRN’s Women of the Year Awards.”

Fernandez joined the Scale Computing team in 2019 to oversee global marketing strategy for the company and to accelerate customer adoption of edge computing, virtualization, and hyperconverged solutions. An accomplished and results-oriented executive, Fernandez has over two decades of global marketing experience helping channel-leading companies reach their business, branding, and sales goals. Before joining Scale Computing, she served in leadership positions for organizations including Avoka, Cloud Lending Solutions, JustSmart Communications, Oracle, Veritas, Symantec, and Seagate. Fernandez is the first Scale Computing executive to be named to both the CRN Women of the Channel and the Power 100 lists.

The CRN Women of the Year Awards are a testament to the influence of the women and companies driving meaningful change in the tech sector. Winners will be announced at the Awards Gala on December 5, 2023 in New York City. To learn more about Fernandez and the other CRN Women of the Year Awards finalists, visit: https://www.crn.com/news/channel-news/crn-women-of-the-year-2023-the-finalists/47.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×