Skip to content

Scale Computing Recognized with Three 2023 TrustRadius Awards: Best Feature Set, Best Relationship, and Best Value for the Price

INDIANAPOLIS – November 8 2023 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that the company has been recognized with three TrustRadius Best of Awards in the Hyper-Converged Infrastructure category. Scale Computing received awards for Best Feature Set, Best Relationship, and Best Value for Price.

TrustRadius is a leading independent research and review platform that provides comprehensive, vetted product information and customer-generated reviews, recognizing top technology solutions based on user feedback. To win a Best of Award, nominees must have received at least ten reviews between January and September 2023, ensuring an accurate gauge of recent customer sentiment. The awards honor the few companies that have gone above and beyond in user satisfaction based on key insight statistics related to value, feature set, and customer relationships. To win, vendors must be ranked in the top three per award type in their technology category.

Scale Computing, whose solutions enable IT managers to run applications and process data outside centralized data centers, at the edge of a network closest to where that data is created and utilized, was named the first-place winner in all three Best of Award categories. Earlier this year, the company announced it also earned multiple TrustRadius Top Rated Awards in the categories of Hyperconverged Infrastructure, Server Virtualization, and Edge Computing.

“We are truly honored that Scale Computing is yet again the recipient of the TrustRadius Best of Awards for value, feature set, and customer relationships,” said Jeff Ready, CEO and co-founder, Scale Computing. “We are dedicated to delivering leading IT infrastructure and edge computing solutions that not only meet but exceed the expectations of our customers. The TrustRadius awards are especially meaningful because the recognition has to be earned through genuine positive feedback from users. These awards fuel our passion to continue innovating and providing unparalleled value and service to our partners and customers.”

A TrustRadius review of Scale Computing summarizes a common sentiment: “Scale Computing is our number one recommended hypervisor platform and becomes the backbone of our clients’ IT infrastructure. When selecting Scale Computing for clients we look at overall cost savings, ease of use and scalability. We implement Scale Computing for clients that have as little as 5 users to clients that have over 8000 users! With the ease of use it takes the burden off of the IT department for both the hypervisor and backups. Our clients can sleep better at night and can ‘Set it and forget it.’”

The TrustRadius Best of Awards help customers cut through the sea of products and allow the best to shine through. “Scale Computing Platform has achieved a remarkable feat, securing first place in all three awards in the Hyper-Converged Infrastructure category,” declared Megan Headley, VP of research at TrustRadius. “Scale Computing Platform’s recognition is entirely based on customer feedback. Customers emphasize their satisfaction with the feature set, confirm that the product lives up to sales and marketing promises, and provides outstanding value for the price.”

To learn more about what real users have to say about Scale Computing, visit the TrustRadius Scale Computing Platform review page:

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Preventing Automated SaaS Ransomware with Passwordless Authentication

Cybersecurity is no longer about the attacks you can see; it’s about the ones you can’t. In a recent unsettling breach, SaaS ransomware crept into the spotlight, targeting not machines, but the very services that drive our daily work. Attackers didn’t compromise employee computers or infiltrate internal networks; they simply logged in with stolen credentials and discreetly extracted sensitive data from a widely-used service: SharePoint Online.

This bypassing of endpoints marked a departure from the norm and highlighted a glaring vulnerability in password-dependent security protocols. It’s thought to be the first attack of its kind, but it likely won’t be the last.

With this in mind, let’s unravel the specifics of this breach and what organizations can do to prevent automated SaaS ransomware attacks. We’ll look at the transition to passwordless and certificate-based authentication systems as critical defenses in the modern cybersecurity arsenal. By understanding the full scope of the attack and the emerging protective technologies, you’ll be equipped to safeguard your enterprise’s environments against these silent threats. So let’s get into it.

The First Instance of Automated SaaS Ransomware Extortion

Ransomware attacks are nothing new. In 2022 there were around 493.3 million ransomware attacks, a decrease from the year before, but still higher than every other year in the last decade. However, not all ransomware attacks are the same, and threat actors continually adapt their methods for more effective and precise attacks.

The most recent tactic switch, and the first of its kind, is automated SaaS ransomware extortion that entirely bypasses endpoints.

Let’s Break Down This Attack

Cybersecurity researchers at security firm Obsidian have reported a ransomware attack on SharePoint Online, executed via a hijacked Microsoft Global SaaS admin account, sidestepping the typical endpoint compromise. Here’s how it worked:

  • Initial Access: The attackers began by exploiting a weakly secured administrator account that was shockingly accessible from the public internet and lacked multi-factor authentication (MFA), a critical security layer.
  • Elevation of Privilege: They used the stolen credentials to create a new user named “0mega” in the Active Directory and then systematically assigned this account a staggering level of administrative privileges across the SharePoint, Exchange, and Teams environments. They also removed more than 200 existing administrators within 2 hours.
  • Exfiltration of Data: With the illicitly gained permissions, the “0mega” account accessed the company’s SharePoint Online libraries, stealing hundreds of files.
  • The Silent Exit: They transferred the stolen data to a virtual private server (VPS) hosted by a Russian web hosting company, utilizing the “sppull” Node.js module, which facilitates file downloads from SharePoint.
  • The Unveiling: After the heist, the attackers uploaded text files to the victim’s SharePoint site using the “got” Node.js module, brazenly informing the organization of the breach.

Key Insights

Let’s unpack what we’ve learned from a cyber heist that turned the tables on traditional ransomware tactics. This attack didn’t follow the usual script of endpoint compromise—it was a privileged access heist within a SaaS application. What’s the takeaway? A clear signal that attackers are now turning their sights on the SaaS landscape, exploiting softer targets and laying bare the need for tighter security measures. These are the critical takeaways:

  • No Endpoint Compromise: Unlike typical ransomware attacks that rely on endpoint compromise to spread and encrypt files, this attack was purely based on privileged access abuse within the SaaS application.
  • A First of Its Kind: According to security experts, this method of automated SaaS ransomware extortion, bypassing endpoints, has not been publicly recorded before.
  • A Rising Trend: There has been a noticeable increase in attacks targeting enterprise SaaS environments, attributed to the attackers capitalizing on the less fortified security measures in SaaS applications compared to endpoint defenses. One study found a 300% surge in SaaS attacks since March 1, 2023.
  • The Need for Better SaaS Security: The alarming rise in SaaS-focused attacks underlines the urgent need for organizations to enhance their security posture across SaaS platforms.

Why Is This Attack Considered Ransomware?

Although this attack didn’t involve encrypting files – typical of ransomware attacks – it’s still considered a new form of SaaS ransomware. This is because the attackers uploaded thousands of PREVENT-LEAKAGE.txt files to inform the organization of the stolen files and negotiate payment to avoid having the contents leaked online.

Will We See More Attacks Like This?

Yes, we’re likely to see more attacks like this one. Obsidian’s researchers believe the trend will gain traction because the attackers have invested in automation, indicating they’re prepping for future hits. Plus, most companies are stronger in endpoint defense than in SaaS security, leaving a gap ripe for exploitation. The shift to data theft over encryption is also appealing to attackers, minimizing risks and simplifying their operations.

How does data theft minimize risks for attackers? Put simply, it’s a quieter form of cyber looting. Encryption attracts immediate attention; it’s noisy, disruptive, and often triggers a swift response from security teams. In contrast, data theft can go undetected for longer, allowing attackers to slip away unnoticed.

Moreover, without the need to provide decryption keys, attackers avoid the complexities and potential technical failures associated with ransomware deployment. This stealthier approach means they can sidestep the spotlight while still holding valuable data for ransom, potentially leading to a lower profile and fewer chances for law enforcement to catch up with them.

Tactics for Preventing Automated SaaS Ransomware

If we’re going to be seeing more of these attacks, we have to take proactive measures to minimize their success. With this in mind, let’s look at some of the ways we safeguard our systems from automated SaaS ransomware attacks.

Multifactor Authentication and Its Limits

Researchers highlight how one of the reasons this attack was possible is due to the lack of MFA on the SaaS account. Having MFA enabled makes using stolen credentials much harder. However, it doesn’t eliminate this type of attack.

Researchers pointed out that even with MFA in place, determined attackers could still bypass it. They could procure the necessary credentials from dark web forums and leverage tactics like MFA push fatigue, where they bombard a user with authentication requests until the user, overwhelmed and frustrated, finally approves one.

And that’s exactly why passwordless authentication is a better solution here – it’s both more secure and more user-friendly.

Passwordless Authentication as a Tool To Prevent SaaS Ransomware Attacks

User credentials were a critical weak point in the SharePoint attack – it wouldn’t have been possible without a stolen username and password. Which is why many security experts are recommending ditching passwords altogether.

Shifting to passwordless authentication addresses the core vulnerabilities associated with traditional passwords. Conventional passwords are often the weakest link, susceptible to being stolen, guessed, or forgotten. By adopting passwordless solutions like biometrics, security keys, and certificate-based authentication, we enhance security through unique personal identifiers that are significantly more difficult for intruders to replicate.

This shift not only enhances security by making unauthorized access considerably more challenging but also simplifies the user experience, eliminating the need for users to create, remember, and manage an array of passwords. It’s a win-win: stronger security with a side of convenience.

Key Benefits of Passwordless Authentication

  • Enhanced Security: Without traditional passwords, attackers can’t leverage stolen credentials, reducing the risk of unauthorized access.
  • Reduced Phishing Risks: Phishing campaigns often target passwords. Passwordless authentication removes this vulnerability.
  • Lower Administrative Burden: It eliminates the need for password resets and management, reducing IT overhead.
  • Improved User Experience: Users no longer need to remember or enter complex passwords, streamlining the login process.

Certificate-Based Authentication: A Step Further in Security

Certificate-based authentication, as part of the passwordless spectrum, involves the use of digital certificates. These certificates are like digital passports, providing a secure and private method of asserting a user’s identity. They work like this:

  • Issuance: A trusted Certificate Authority (CA) issues a digital certificate to a user or device.
  • Storage: The certificate is securely stored on the user’s device or a smart card.
  • Verification: During authentication, the certificate is presented to the server, which verifies it against a list of trusted CAs.

Critically, certificate-based authentication offers robust security. Why? It inherently incorporates two-factor authentication (2FA), as access requires not just the certificate—which acts like a digital ID card (something you have)—but also ties in a device or a PIN, adding a layer of security tied to something you know or are. It also introduces a level of accountability through non-repudiation, ensuring that transactions can’t be readily contested, making it clear who did what.

Plus, for businesses already running on Public Key Infrastructure (PKI), it scales with ease, slotting into the existing setup without a hitch. This dual promise of enhanced security and easy integration makes certificate-based authentication a smart choice for modern organizations.

Why Organizations Should Adopt Passwordless Authentication

With the increase in SaaS ransomware attacks, passwordless authentication, and particularly certificate-based methods, offers a compelling solution. It aligns with zero-trust security models by “never trusting, always verifying,” ensuring that every access request is securely authenticated without relying on vulnerable password systems.

Organizations adopting passwordless and certificate-based authentication stand to benefit from:

  • Compliance: Meeting stringent regulatory requirements for data protection.
  • Agility: Adapting quickly to evolving security threats without overhauling the entire access management system.
  • Reduced Attack Surface: Minimizes the risk of phishing and credential stuffing attacks since passwords are no longer the weakest link.
  • Cost-Effectiveness: Lowers the total cost of ownership by reducing the need for password-related support and infrastructure.
  • Future-Proofing: Aligns with emerging technologies and standards, making it a forward-looking investment that anticipates the next wave of cyber threats.
  • User Experience: Streamlines the login process, eliminating password fatigue and reducing help desk calls for password resets.

It’s Time to Harden SaaS Controls

In an era where SaaS platforms are repositories for regulated, confidential, and sensitive information, hardening SaaS controls is no longer optional—it’s essential. Organizations invest substantially in these platforms. However, while companies have advanced significantly in detecting threats, across endpoints, networks, and cloud infrastructures, many are still lacking when it comes to SaaS threat detection. This needs to change.

A robust approach to strengthening SaaS security involves several critical strategies:

  • Privilege Restriction: Tighten access controls by revoking unnecessary privileges. Only the necessary users should have administrative access, and even then, companies should enforce the principle of least privilege.
  • Integration Oversight: Many SaaS applications offer integrations with third-party services. It’s crucial to audit these connections, revoking any that are unsanctioned or pose a high risk.
  • Log Analytics: Consolidate and scrutinize SaaS audit and activity logs. Analytical tools should be employed to sift through this data to identify patterns indicative of a compromise, insider threat, or rogue third-party integration.
  • Continuous Monitoring: Implement real-time monitoring solutions specifically designed for SaaS applications to detect anomalous behaviors and potential security incidents.

Final Thoughts

This alarming automated SaaS ransomware extortion incident reveals a pivotal cybersecurity weakness: reliance on passwords. The assault on SharePoint Online underscores the critical vulnerability passwords pose, especially when multifactor authentication is absent. To thwart such breaches, it is not enough to strengthen passwords; we must redefine access security through passwordless and certificate-based authentication.

Certificate-based authentication introduces a robust framework against this type of exploitation. By leveraging digital certificates, this method validates identities with a precision that passwords simply cannot match. The certificates, issued by trusted Certificate Authorities, provide a much higher level of assurance as they are almost impossible to forge or steal without detection. And their integration with Public Key Infrastructure enables seamless scalability and robust two-factor authentication without the need for passwords.

Embracing passwordless methods not only elevates the security posture but also streamlines user access, effectively shutting down avenues for ransomware attackers. Organizations that adopt these technologies benefit from reduced administrative burden, enhanced compliance, and a fortified defense against the rising tide of SaaS-targeted attacks. They eliminate the weakest link—passwords—from the security chain, drastically narrowing the attack surface.

In short, by adopting certificate-based authentication companies can significantly mitigate the risk of unauthorized access and data breaches, ensuring that their SaaS platforms remain secure in an increasingly hostile digital landscape. As we move forward, the integration of these advanced authentication methods will be paramount in safeguarding against the sophistication of future cyber threats, making it not just a strategic move but a necessary evolution in cyber defense.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit, and follow us on Twitter and LinkedIn.。

Keys to integrate IT support and manage your after-sales service better

We are all aware of the importance of attracting new customers for business growth purposes, but focusing solely on this goal is not actually the best decision. Delivering quality customer service is also key to success. For that reason, many companies that sell their products or services over the Internet have decided to implement an after-sales support service as a fundamental part of their business. 

How to make yourself stand out among your competitors with a good after-sales support service?

More than a century ago, the Japanese businessman and philosopher Konosuke Matsushita, known for being the founder of Panasonic and one of the promoters of the “Japanese economic miracle”, laid the foundations of a revolutionary business philosophy for his time. Matsushita was based on concepts such as social contribution, teamwork, customer focus and technological innovation as differentiating factors. He wrote several works throughout his life, projecting his particular vision on business and society. Regarding after-sales support, he was of the opinion that: “After-sales service is more important than assistance before the sale, because it is through this service that permanent customers are achieved.”

These regular customers can really become your best brand ambassadors, so they should be pampered, so that they feel satisfied and share their positive experiences or make new purchases and hires.

How to offer a customer-centric after-sales service?

One of the biggest difficulties that companies encounter when managing customer service is how to convey closeness and proximity in a service as automated as IT support and offered remotely?

In the past, when there was no Internet, customers had to call a call center to solve their doubts or report any problems. Today, IT support centers use tools like chatbots that save human teams a lot of time. The use of these virtual assistants grew dramatically during the pandemic, allowing companies to respond to very high activity peaks and continue to offer 24/7 services.

However, by returning to normal, users are demanding a more conversational and less transactional customer service. Most of them rate chatbots positively as a way to get quick answers to their questions, but they don’t want machine interactions to completely replace people. For example, McKinsey’s “Next in Personality 2021” report reveals that 71% of customers expect businesses to offer custom interactions and 76% get frustrated when this doesn’t happen.

Finding the perfect balance between automation and human support is vital to offer a fast, efficient after-sales support service based on customer needs. You cannot swim against the tide or try to put a brake on digitization. On the contrary, we must rely on the advantages of technology by integrating it into the company’s IT support to access information in a unified way and know which requests can be automated and which need personalized attention.

How to integrate the IT support center to provide customers with good after-sales service?

IT support center integration needs to be planned carefully to ensure orderly and efficient business workflow.

Some essential steps for a successful integration are as follows.

Implementing a service management system (ITSM)

To manage any type of incident or complaint, it is essential to have a structured framework in which the policies to be followed by the support department are defined.

Professionals in this area are responsible for coordinating IT services with business goals. In addition, they train the team and define which tasks can be automated.

Create an IT support infrastructure

Companies that receive a high volume of requests may be in critical situations if they don’t have the tools that allow them to create dynamic workflows.

In this sense email is a painful management tool since it does not allow you to do things as basic as prioritizing important requests, keeping track of them, or escalating them to a higher level when the frontline support team is not able to solve them.

If you try to offer an after-sales support service through this means, you will soon see that the email inbox becomes saturated until it becomes a catch-all. No employee will know where to start!

Do you already know about Pandora ITSM Ticketing Helpdesk? This tool is all you need to make things easier for the support team and build customer loyalty.

As the name suggests, Ticketing Helpdesk works through a ticketing system. Each time a customer makes a request through the platform, a new ticket is opened with their data, date and subject of the incident.

Tickets are automatically cataloged according to their status: new, pending, solved, etc. You may also prioritize those that require immediate action, define automation rules or transfer complex cases that could not be solved to higher support levels.

Helpdesk Ticketing is a flexible tool and ready to work in an omnichannel environment. It can be easily integrated with other IT infrastructure tools such as project managers or CRM, to avoid process redundancy and take advantage of all the information available to improve the operation of other departments and the after-sales service itself.

Use the information collected to optimize customer service

As already mentioned, Ticketing Helpdesk collects query data, analyzes it and generates custom reports with relevant information such as:

  • Number of tickets closed
  • Number of tickets that remain open
  • Average ticket resolution time
  • Most common incidents
  • Performance of each agent (customer feedback)
  • Tickets that were escalated to higher levels

Keeping track of these metrics is very useful to know the long-term performance of the service and detect possible anomalies that would go unnoticed when analyzing isolated data.

It also ensures compliance with contractual agreements related to the service (SLA) such as downtime and support response capacity (for example, resolution of incidents in 24 hours). Respecting these agreements is important for building customer trust. In addition, non-compliance involves financial compensation that companies must assume. With the Helpdesk tool you may manage this key information and create automatic alerts if the service remains inactive for a long time.

Finally, in addition to automatic reporting, Pandora ITSM Ticketing Helpdesk also collects information from satisfaction surveys that users may answer by email or via a web form. It is a reliable way to know if the service is working as expected and the agents in charge of the support area effectively solve customer problems.

Still unsure whether Pandora ITMS will meet your expectations?

Try it for free for 30 days. You do not need a credit card, only advanced knowledge in the IT area and some free time to become familiar with all its features.

Estudié Filología, pero las circunstancias de la vida me llevaron a trabajar en el sector del Marketing como redactora de contenidos. Me apasiona el mundo del blogging y la oportunidad de aprender que se presenta con cada proyecto nuevo. Te invito a seguir mis publicaciones en el blog de Pandora FMS para descubrir las tendencias tecnológicas que están transformando el mundo de los negocios.=

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Top 5 innovative countries for remote work in 2023

Suppose you want to work remotely from the most innovative and technologically advanced countries. In that case, we present to you the Top 5 you should consider as your next stop in the digital nomad’s journey. As you will see, each has its own pros and cons that might be a deciding factor for you. However, neither of these countries will let you down with tourism attractiveness.

Why choose the most innovative country for remote work?

When it comes to finding the best locations for working remotely, you’ll see Lisbon, the capital of Portugal, or Tenerife Island, which belongs to Spain. Had enough of Europe? Then try the Puerto Vallarta beaches in Mexico or the tiny Mauritius, right next to Madagascar. And, of course, how can we forget the Asian gems, such as Bali, Indonesia, or Thailand?

But what if you don’t want to go where all fresh remote workers go? What if you’ve already been to all these destinations, most of which are packed with tourists? After all, Spain, Mexico, and Thailand are among the most visited countries.

When you’re done with the globetrotting and thinking about your next destination as a more permanent place, other factors suddenly come into play. Expats may want to trade ancient temples for well-developed digital and physical infrastructure and choose pioneering technologies over gorgeous mountain views.

If you’re tech-oriented and want to find an innovative destination for remote work, explore the best options in 2023 below. Most importantly, as you will see, choosing the most ingenious country for working remotely doesn’t mean giving up golden beaches or snow-peaked mountains.

How we found the top innovative countries for remote work

To find the best innovative countries for working remotely, we split the task in two. First, we used the Global Innovation Index 2023 (GII 2023) by the World Intellectual Property Organization (WIPO) to determine the most advanced ones. This evaluation uses seven dimensions – institutions, human capital and research, infrastructure, market sophistication, business sophistication, knowledge and technology outputs, and creative outputs.

These dimensions are further split into 21 sub-dimensions that consist of 80 factors in total. Some of those are R&D investments, ICT use, venture capital investments, and unicorn valuation. All this data gives a comprehensive view of the most advanced countries in 2023.

Then, we used our latest Global Remote Work Index (GRWI) to see where these countries stand when it comes to working remotely. The four main elements of the GRWI are cyber safety, economic safety, digital & physical infrastructure, and social safety. Each of these had the same impact on the final scores.

These four elements covered a number of factors, such as infrastructure integrity, healthcare access, internet speed and stability, and the availability of human rights. In total, GRWI measured 27 sub-factors.

We’re eager to keep the suspense to the very end, but if you want to find out which innovative country is the best for remote work, here’s the list.

Top 5 most innovative countries in the world 2023

According to GII 2023, these are the most innovative countries:

  1. Switzerland

  2. Sweden

  3. The United States

  4. The United Kingdom

  5. Singapore

Now, let’s dive into some takeaways:

  1. Switzerland has been the most innovative country since 2011. It’s also leading in knowledge and technology and creative outputs categories, especially in intellectual property receipts and GitHub commits per million people.

  2. Sweden was always bouncing between the 2nd and the 3rd place. This country stands out as the leader in the business sophistication category. If we dig deeper, we’ll find Sweden ranks first in both the number of researchers per million people and the number of Patent Cooperation Treaty (PCT) patents per unit of GDP.

  3. The United States finished 2nd last year but got manhandled by Sweden in 2023. Despite that, it’s 1st by market and 2nd by business sophistication plus knowledge and technology output. Also, the US has top universities, along with the biggest entertainment and media market.

  4. The United Kingdom has always been in the 4th position, with the exception of 2019 GRWI results. Its strongest suits are creative outputs and market sophistication. But if we delve into factors from other dimensions, we’ll find the UK is 2nd in university rankings and environmental performance and 1st by citable documents (H-index).

  5. Singapore was 8th most of the time when last year it moved to 7th, throwing away the Netherlands this year. It has no competition in the institutions dimension, scoring the highest in most factors. Another strong side of Singapore is human capital and research, especially tertiary education. We also found it leading logistics performance, received venture capital value, and cultural and creative services exports.

It is clear that all five most innovative countries are also popular tourist destinations, meaning there’s plenty to see and experience when you close the laptop for the day.

Top 5 countries for remote workers in 2023

Now, it’s time to evaluate the remote work friendliness of the most innovative countries with the help of the GRWI 2023 index.

1. Switzerland

When considering remote work destinations, Switzerland’s ranking at 29th for digital nomads may come as a surprise, given the fact that it’s the most advanced country in the world.

For starters, let’s acknowledge that Switzerland has the best social safety. Whether it’s personal rights, inclusiveness, or physical safety index, this country delivers.

Moreover, this most innovative country in 2023 is doing well in digital and physical infrastructure (5th). That’s most evident from the internet connection quality (5th), despite its lower e-government ranking within the Top 30.

Cyber safety is an area for improvement in Switzerland. It does not crack the Top 10 when factors like infrastructure, response capacity, and legal frameworks are weighed, landing it at 43rd place globally.

Economic safety is the most significant hurdle for remote workers considering Switzerland, primarily due to the high cost of living (98th) that overshadows its attractions, language proficiency, and healthcare quality.

Overall, Switzerland can be a good place for remote work if you’re not on a budget and haven’t seen Rhine Falls or Chapel Bridge yet. For those seeking more economical alternatives within Europe, there are plenty of options that combine the allure of affordability with the convenience of remote working.

2. Sweden

We move north to see if forward-thinking Sweden has thought about the WFA generation. It turns out it did, boasting the fifth spot in our GRWI 2023 rankings.

To start off, Sweden has a Top 10 economic safety and digital & physical infrastructure. For instance, it’s the best place to get well as the No #1 healthcare just won’t disappoint. Also, the e-infrastructure is great (5th), along with the internet quality (11th).

Even social safety, ranked 15th, comes with outstanding personal rights (2nd) and inclusiveness (3rd). However, we must point out that safety (64th) can be a concern in the second most innovative country.

Sweden struggles the most with cyber safety (21st). While response capacity (4th) is top-notch, the same cannot be said about infrastructure (19th).

Even though Sweden is cheaper than Switzerland, it is still expensive (79th), which is a primary concern for most remote workers. At least there’s a lot to see, and asking for directions in English will bring positive results most of the time.

3. The United States

It’s always tough to generalize countries of such magnitude, but we did our best and found the US to be the 16th option for remote nomads and digital workers. While that might not sound impressive after Sweden, we want to point out that this highly innovative country is still more remote-friendly than 85% of the world.

So, where are its biggest strengths? The most eye-catching factor is economic safety – the US is second only to the UK. Plus, it has the best tourism attractiveness and English proficiency. Even the much-discussed healthcare is great (4th).

USA a remote haven in the spotlight 1400x719

Furthermore, the US has advanced digital and physical infrastructure (6th). In this dimension, internet affordability and e-government shine the brightest (both 2nd).

Cyber safety (33rd) and social safety (37th) are the two dimensions that drag the US down. While the former at least has the best infrastructure, the latter’s top result is 20th place.

Ultimately, the US is too big and multicultural to offer the same experience for every remote worker. But as with the countries above, the cost of living is its Achilles heel.

4. The United Kingdom

As the 19th country for remote work, the UK remains in the Top 10 according to many factors. Once again, that’s not a bad result by any means, given that GRWI 2023 analyzed 108 countries in total.

The United Kingdom is the strongest in economic safety. That mainly comes from tourism attractiveness (3rd) and English proficiency (1st).

Then we have the digital and physical infrastructure (12th), with the physical part being especially strong (2nd). The UK has some work to do with its social safety (28th), though, as only personal rights (10th) make it to the Top 20.

An essential dimension for digital nomads, cyber safety needs the most attention (36th). However, if we dig deeper into separate factors, we’ll find a superior infrastructure (2nd).

Just like the other most innovative countries above, the UK offers a myriad of options for tourists. And just like the same locations, its high cost of living (including quite expensive and not-so-great internet) will make remote workers seek out locations that offer a better cost-efficiency balance.

5. Singapore

And now, the time has come for the only Asian country on our list. The innovative and modern Singapore is 28th on our GRWI 2023 rankings. It feels like Switzerland (29th) is in the rear, but as you’ll find out, the pros and cons for digital nomads differ quite a bit.

If digital and physical infrastructure matters to you most, there’s no better place to be than Singapore. It has the best e-government and physical infrastructure, with internet quality (4th) not far behind. However, its price is below average (58th).

The rest of the dimensions are below the Top 20. Under cyber security, Singapore can be proud of its infrastructure (4th). Tourism attractiveness and English proficiency, both 3rd, are a big plus for remote workers. Sadly, the same cannot be said about the cost of living (96th) and personal rights (80th).

In fact, Singapore’s personal rights index may give some individuals pause when considering it as a destination. While the country offers top-notch digital and physical infrastructure along with tourism options, the high prices and average healthcare make it less attractive for a longer stay as an expat.

The best tech country for remote work in 2023

After evaluating the GII and GRWI data, we proclaim Sweden the best innovative country to work remotely in 2023. It’s followed by the US, the UK, Switzerland, and Singapore.

Sweden won first place thanks to its attractiveness to remote workers. Its tourism appeal, quality healthcare, and well-developed e-infrastructure, along with remarkable inclusiveness and personal rights, sealed the deal. The biggest concern for digital nomads will be the high cost of living, but that can be said about all other most advanced countries for remote work.

In the end, each of us has different priorities and expectations before starting to work remotely. Therefore, some other country might look like the top destination for you. We encourage you to dive deeper into the GRWI ranking and find your personal favorite.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

What is Cloud Computing? Everything you need to know about the cloud explained


Cloud Computing is a service offered by several software providers paying a rent either by the hour, month or use of said service. They can be virtual machines, databases, web services, or other cloud technologies. These services are on remote servers provided by companies such as Google, Microsoft and Amazon among others that for rental or in some cases free of charge, provide such services. It is very convenient to have these services, since from a mobile phone or a not very sophisticated machine, you can have access to important services of all kinds just by having access to the internet.

Services provided in the cloud

The most common services provided in the cloud are as follows:

  • Storage in the cloud. Where the service allows multiple files, images, or other data to be stored in the cloud. It’s kind of like an internet-connected super hard drive.
  • Cloud Databases. You may access servers or databases such as SQL Server, PostgreSQL, MySQL, Oracle, etc. Note that you no longer need to access the entire server with the operating system (which is also possible). NoSQL databases, which are databases that do not use a relational database, can also be accessed. Instead of using tables, it uses documents or value keys to save the information.
  • Data Lake. The Data Lake service is, as the name suggests, a data lake. You may have structured, unstructured and semi-structured data. These services are used to manage what we know as Big Data. That is, lots of information. Today, data can no longer be handled in traditional databases exclusively without very large amounts of information. That is why other storage media such as Data Lakes are used.
  • Data analysis. Tools for analyzing data are also provided. There are tools for reporting, analytics using Machine Learning and other technologies.
  • Software in the cloud. There is the possibility of programming in different languages using cloud services. There are platforms to upload the code and websites.
  • Data Integration Services. Services such as AWS Glue, Google Cloud Data Fusion and Azure Data Factory among others, are services that allow you to integrate data. That is, copying data from one database to another or to a text file, moving data from a Data Lake to a database, etc.
  • Network Services. Networking services help connect on-premise applications with cloud applications. These services provide connectivity, security, and scalability. Some services offer gateways between the local network and the cloud. There is also the Virtual Network Gateway service. It connects the virtual network and the cloud. Another common service is the Load Balancer which distributes traffic between servers. There are also other Networking services such as application links, traffic handlers, etc.
  • Other Services. There are an infinite number of cloud services such as Machine Learning, AI, IoT…

How Cloud Computing Works

Saving is important. Instead of spending money on a good server or infrastructure, you may directly rent these cloud computing services. While the costs of renting cloud services from major vendors like Azure, AWS, and Google may seem high for small and medium-sized businesses, there are savings in staff.

A smaller team of IT professionals is required to maintain applications in the cloud. No time is wasted on hardware or many other aspects of security. While cloud service providers are not 100% responsible for security, much of the responsibility lies with them. They take care of the replications, of changing the hardware. Through a simple payment you may make your database server support more people connected simultaneously. That, in a local environment, would imply the purchase of new expensive servers and migrating information from one place to another.

Changing old hard drives, renewing servers, hardware problems, all of that is solved with the cloud, where you no longer have to worry about that aspect. Basically, it’s paying for the service and using it.

Services available

Some basic services are Microsoft 365 offering MS Word in the cloud, Excel, Word, PowerPoint, Outlook, OneNote, Publisher and Teams among other cloud applications. For example, documents in Excel are no longer saved on the hard drive but in the cloud. That is, on Microsoft Azure, servers to which you connect from your machine using the Internet.

Google offers Google Workspace which is similar to Microsoft 365. For example, it provides Google Sheets (a kind of online Excel), Google Docs (similar to MS Word), Gmail (similar to Outlook for emails), Google Slides (similar to MS PowerPoint).

Here are some of the many applications in the cloud. However, the cloud goes much further. It can offer Windows Servers, Linux. Databases of all kinds, whether relational or NoSQL, analytics services, IoT, Devops, websites, application programming platform, data analytics service, Machine Learning, APIs, cloud software and much more.

Examples of Cloud Computing

In everyday life we have been using cloud services for a long time. For example, Hotmail was the first service to use cloud technology. The concept of the cloud was not used then, but emails were stored on remote servers. Then came Yahoo’s mail services, Gmail.

Eventually Microsoft 365 arrived where it was already possible to use Word, Excel, PowerPoint, etc. using cloud technology. Then with AWS, Azure, Google Cloud and other providers, there are endless cloud services already mentioned above.

Source of the term Cloud Computing

Many people ask: what is the cloud? The term cloud computing is actually a metaphor. Since the 1960s, a cloud has been used to represent networks. Since 2000, the word has become popular and in a way indicates that the network is in heaven. That is, it is not within your physical reach but in another place that you may access through the internet.

History of Cloud Computing

As early as the 1960s, to represent networks, a cloud was used to represent them when they were connected to computers. However, it was not until the 1990s that the term began to be used to describe software as a service (SaaS). Through the service, machines connected to the internet without having to manage it from their computers.

However, the term became popular starting in 2000 with the rise of virtual machines and network computing. Cloud computing encompasses the multiple services offered on the network.

Importance of the Cloud

Large companies are taking their chances on the cloud. Microsoft for example upgraded its technology certifications to the cloud. The technologies located in the physical company have already been removed from the list of Microsoft certifications. Amazon on the other hand started in the cloud and was a pioneer. The trend is to spend less on an IT team and spend more on the rental of cloud services. Every year, the use of cloud services will grow more. According to Gartner, in 2025, 51% of IT services spending. They will be invested in the cloud.

Leading Cloud Providers

The following table shows the top cloud service providers and their market percentage:


market percentage

Amazon Web Services (AWS)33,3 %
Microsoft Azure21,1 %
Google Cloud9,2 %
Alibaba8,4 %
IBM Cloud6,5 %
Salesforce5,9 %
Oracle Cloud Infrastructure (OCI)4,7 %
VMware3,1 %

As it can be seen in the table, AWS remains the leader and Microsoft maintains a second place. Google is in third place.

Key Elements of Cloud Computing

There are several types of services, which are IaaS, PaaS and SaaS. Below, we describe each one:

  • IaaS (Infrastructure as a Service) provides access to cloud services such as servers, storage, and networking. In this type of service, users are responsible for installing, configuring and managing the software and applications that are used.
  • PaaS (Platform as a Service) provides a complete platform for developing, running, and managing applications. In Paas, users are responsible for developing the application, however, the cloud provider is responsible for the underlying infrastructure and services.
  • SaaS (Software as a Service) provides access to complete applications over the Internet. The user does not have to install or manage the software, as all this is handled by the cloud provider.

Multi-Cloud Computing

Large companies usually choose to purchase different services from different cloud service providers. It is very common for a company to have services in Microsoft, Google and AWS. This is due to different factors such as price, IT service technical skills, some special offers from vendors, etc. Fortunately, major vendors are not very different from each other in their services.

Benefits of Cloud Computing

The main benefit is that users will not waste time on hardware maintenance, buying hardware, scaling and migrating servers. Business and IT teams will focus on business and applications. They’re not going to waste a lot of time on computer installations and configurations.

Advantages and disadvantages of Cloud Computing

As advantages, we already talked about a work reduction in software installation, security, installation time and hardware purchase. However, we hardly talked about the disadvantages.

In many cases, they are very expensive services. It is very common to hear jokes from people who say they went bankrupt for forgetting to turn off cloud servers. And there are services so expensive that they are paid by the hour, which, if you forget to turn them off, the cost increases considerably.

For example, suppose you have a cloud service that costs $100 an hour. $800 per day for 8 hours of use. However, imagine that the employee who uses it, forgot to turn off the machine in the cloud, that can make the service charge you $2,400 a day instead of $800. Another problem is that staff must be trained because if a hacker gets in the cloud, they can access all business information, which would make your company and its computers utterly vulnerable.

Widespread Adoption of Cloud Computing

There is a clear upward trend in the use of cloud services. In 2020, according to Gartner, 20% of the workload was handled by the cloud. In 2023, this figure doubled. Despite increased competition from cloud providers, the demand for cloud services and the benefits of companies offering these services are steadily increasing.

Challenges and Future of Cloud Computing

There are several challenges of cloud computing. IoT, or the internet of things, handles sensors. One may detect for example the status of the machines, maintain inventory, review production, track products. The use of cloud APIs, artificial intelligence services, is increasing. The cloud provides quite a few services and these are constantly increasing.


Cloud computing offers a host of services such as: data analysis, artificial intelligence services, web pages, application server, development platforms, DevOps and lots of others. The trend is to migrate much of the on-premise infrastructure to the cloud.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.



Click one of our contacts below to chat on WhatsApp