Skip to content

Demystifying RDP part 4: The Windows Server CAL explained

While I’ve covered the RDS CAL, we have yet to get to the Windows Server licensing.

I also previously covered accessing and visualizing RDP environments and the basics of RDP, VDI, and RDS in this series.

When desktops or applications are deployed on Windows Server, licensing requirements apply.

Typically, you’ll need to take a Windows Server CAL (available per user or device) next to (or on top of) the RDS CAL into account.

But first, have you downloaded your free trial of Parallels Secure Workspace?

The Microsoft licensing model

Microsoft has different models for the consumption of RDS CALs. From a high-level perspective, there are several main types:

  • Volume Licensing. This term refers to the Microsoft program for organizations that require multiple Microsoft product licenses but do not require multiple copies of the software and the associated documentation. Generally, the Microsoft Volume Licensing program provides organizations with lower pricing for two or three-year license agreements. Often, product use rights are not included with FPP (Full Packaged Product) licenses, such as rights to copy the software onto multiple devices. Within volume licensing, there are multiple options —look at this page for more info.
  • Enterprise Agreement (EA)
  • Open Value
  • MPSA (Microsoft Product and Service Agreement)
  • SPLA (Server Provider License Agreement). As per the SPLA from Microsoft, service providers and ISVs can license eligible Microsoft products monthly as part of a three-year agreement. This enables them to host software services and applications for their customers. This SPLA supports a variety of hosting scenarios, allowing ISVs to offer powerful customized solutions to a range of customers.
  • CSP (Cloud Service Provider). On Nov 20th, 2018, Microsoft announced that purchasing RDS CALs via a CSP model would be possible.

As per the release mentioned above, Microsoft customers previously had to bring their own RDS CAL with SA to support RDS deployments in the customers’ environment.

Now, a CSP can sell RDS subscriptions directly through the CSP program, eliminating the need for customers and partners to purchase different licenses through various programs.

This model enables a faster licensing cycle due to CSP integration with other Microsoft licenses, including Windows Server, SQL Server, and Office, making it easy for partners to simplify the buying process. In addition to those license models, special pricing is available for non-profit organizations, educational institutions, etc. Those discounts don’t apply to all models.

VDI licensing options

When do you need Windows Virtual Desktop Access (VDA)?

In the VDI scenario, you remotely connect to a Windows Client (i.e., the operating system that might run on your laptop/desktop). When using VDI and thus not connecting to an RD Session Host or a Windows Server, you don’t need RDS and Windows Server CALs.

However, you do need to make sure that your Windows (client) licensing is properly set up. This is when Windows Virtual Desktop Accessor VDA comes into play. You will require a VDA license every time you connect to a Windows client that is centrally hosted (i.e., running in a data center or on a virtual machine on a hypervisor). You will also require VDA licensing if you remotely connect to a Windows desktop that is not your primary device (for instance, not your main desktop that is connected to the company network at your office or work site).

You will not require additional VDA licensing when remotely connecting from a Windows device to a desktop or laptop on the company network. For example, a typical scenario is that a desktop is left powered on in the office at night. A remote worker can access that workspace from a personal home device over RDP. Clearly, there are more scalable, secure, or cost-efficient scenarios (from a power perspective), but it is an option, nonetheless.

Now, let’s assume a different user accesses your VDI. In that case, it’s not the primary user accessing their principal device, and thus, additional VDA licensing will be needed to add this additional user. A typical “extra user” is a contractor or a colleague.

Let’s take it one additional step further: if you connect to your primary desktop/laptop that is connected to the company network and you try to connect from a non-Windows device (e.g., an Apple MacBook), then you’ll also need a VDA license or a Windows 10 Enterprise E3/E5 as you’ll discover below.

Windows 10 Enterprise E3, E5, and SA licensing

Windows Virtual Desktop Access (VDA) is included in Windows 10 Enterprise E3 and E5 licenses. With Windows 10 Enterprise E3 and E5 user licensing, you have the rights for remote access for up to five different devices (provided they are linked to the same user). Those include devices with non-Windows operating systems (e.g., an iPad). The host Windows client system can also be hosted in a data center.

Windows 10 Enterprise E3 or E5 is available per device and per-user licensing. Windows SA used to be exclusively available for licensing on a per-device basis, but in 2014, Windows SA and Windows VDA licenses also became available on a “per-user” basis, and Windows SA came with VDA built in.

As of this publication, however, Microsoft is mainly selling Windows 10 E3 and E5 user licenses.

Windows Virtual Desktop

Microsoft has introduced Windows Virtual Desktop on Azure, which has been generally available since September 2019. The licensing requirements for WVD on Azure are different from the default rules.

Can I connect to VDI over RDS?

Yes, that’s a possibility. In such a case, you access the Windows client using the Remote Desktop Services setup. You must purchase a VDA license (which might be covered by Windows 10 Enterprise E3 or E5) and an RDS CAL. You will not need the Windows Server CAL, however.

Compatibility

Given Windows E3 and E5 basically include the Software Assurance, you have the right to upgrade (or downgrade in theory) at any time.

License models

Like RDS, Windows E3, E5, and VDA are available in multiple licensing models. It’s just slightly more complex, however. The table below provides a good overview.

Demystifying RDP 4

The following tree summarizes the options available in some common scenarios:

Decision tree windows CAL

RDP To Linux

Another option is to use the RDP to access a machine without Windows. In today’s world, we can safely assume that it is Linux.

From a Microsoft licensing perspective, no costs apply.

This makes sense, given that you don’t use a Windows client (so no VDA is needed), no Windows Server (no Windows Server CAL is needed), and no RDS (no RDS CAL is needed).

However, license costs might apply for other (non-Microsoft) RDP suites.

RDP licensing, RDS, and VDI all get a boost with Parallels Secure Workspace

Parallels Secure Workspace doesn’t enable you to cut in RDS or VDI-related licenses as such. It is a layer on top, and all the rules of the game will apply.

On the bright side, however, the licensing is much less complex as it is user-based on a concurrent level.

No matter what features you use, how often you use them, from what device you use, or how many applications/desktops you use. Simple and transparent.

Start your Parallels Secure Workspace journey today!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

Unlocking the future of work: The power of Desktop as a Service (DaaS)

Unlocking the future of work: The power of Desktop as a Service (DaaS) 

In the ever-evolving landscape of the modern workplace, the traditional office setup has undergone a remarkable transformation.

With the ascent of mobile work environments, employees are breaking free from the constraints of conventional office spaces.

Desktop as a Service (DaaS) is a pivotal technology driving this shift.

According to Cognitive Market Research, the global DaaS market reached a substantial $6,219.5 million in 2022, and projections indicate a robust Compound Annual Growth Rate (CAGR) of 18.50% from 2023 to 2030.

Understanding Desktop as a Service (DaaS)

DaaS is a comprehensive virtual desktop solution hosted by third-party providers, such as Parallels DaaS, in a cloud environment.

This innovative service allows businesses to access virtual machines (VMs) running desktop operating systems through a subscription model. The provider manages the intricate Virtual Desktop Infrastructure (VDI), enabling users to connect to their desktops seamlessly from any device with internet connectivity.

The economic impact of DaaS

Deploying DaaS brings forth several compelling advantages, aligning with the evolving needs of modern businesses.

One notable benefit is the significant reduction in the total cost of ownership. Like many cloud services, DaaS shifts capital expenditures (CAPEX) to operating expenses (OPEX), freeing up valuable funds for growth.

The “pay-as-you-go” pricing model ensures precise spending on utilized workloads, eliminating costs associated with underutilized resources.

DaaS and security: A robust combination

DaaS not only reshapes the economic landscape but also addresses critical security concerns.

By shifting security risks away from numerous endpoints to a centralized and managed data center, DaaS enhances the overall security posture.

Eliminating corporate data storage on individual devices minimizes the security burden of lost or stolen devices. Encryption mechanisms and regular backups further fortify the security framework, offering a comprehensive defense against potential threats.

Empowering scalability with DaaS

Scalability emerges as another key advantage in the DaaS model.

The “as-needed” addition of endpoints becomes seamless, which is especially beneficial for provisioning resources to temporary project teams or contractors. This agile scalability eliminates the need for substantial hardware procurement, providing a cost-effective solution for organizations facing fluctuating resource requirements.

Streamlining management complexity

Simplified management is a hallmark of DaaS and this characteristic is particularly valuable for organizations with large, dispersed workforces.

The challenges of managing and supporting diverse endpoints are addressed efficiently as DaaS operates with a single central image. This approach streamlines updates and patches, minimizing the tedious and costly processes of maintaining disparate endpoint configurations.

Unleashing the power of mobility

DaaS introduces a paradigm shift in employee mobility.

Employees gain unprecedented flexibility and freedom by offering virtual desktops and apps in the cloud.

Anytime, anywhere access to resources ensures enhanced productivity, empowering employees to accomplish tasks and be seamlessly productive from various locations and devices.

Less reliance on IT administrators

Managing IT infrastructures and Virtual Desktop Infrastructure (VDI) traditionally demands a skilled IT administrator team. DaaS, however, minimizes VDI management challenges, allowing organizations to focus on their bottom line.

Businesses can streamline operations with reduced reliance on IT administrators, optimizing efficiency and resource allocation.

DaaS adoption across company size and type

Many companies are increasingly transitioning to the DaaS model due to the benefits covered above.

Below are a few examples of the types of companies that can significantly benefit from DaaS offerings:

  • Startups

Startups often need to invest heavily in research and development (R&D) and customer acquisition initiatives. By leveraging DaaS and minimizing the need to purchase servers, software, and other services, startup companies can free up resources for critical business activities. This strategic approach ensures efficient utilization of funds.

  • Companies with a mobile and remote workforce

Businesses with mobile and remote workforces face many security challenges which DaaS addresses. By ensuring that data never leaves cloud servers, even when employees use their personal or preferred devices, DaaS becomes an excellent option for mitigating security issues in remote working environments.

  • Project-based companies

Companies engaged in project-based work, particularly those with seasonal projects and varying staffing needs, can benefit from the on-demand scalability of DaaS. Quick provisioning or de-provisioning of virtual desktops aligns seamlessly with the dynamic demands of project-based businesses.

Embracing a productive future with DaaS

In conclusion, Desktop as a Service (DaaS) is a transformative solution applicable to businesses of all sizes and industries.

Its myriad benefits like cost reduction, improved cybersecurity, heightened productivity, and simplified management combine to position DaaS as an invaluable asset for companies navigating the demands of the modern business landscape.

By embracing DaaS, businesses empower employees with the flexibility and mobility necessary to thrive in today’s dynamic and evolving work environments.

DaaS future of work

Parallels DaaS allows you to unlock your organization’s full potential with a cutting-edge DaaS solution that delivers seamless, secure, and flexible application and desktop experiences from the cloud.

The solution offers users instant access to their virtual applications and desktop environments. As a vendor-assembled and managed solution, it features a cloud-hosted control plane that enables secure remote access to your business applications, desktops, and data from any internet-connected device.

The quick and easy onboarding process allows immediate access to applications and desktops from any device. It removes the complexity surrounding user onboarding and managing users and applications, allowing even small businesses to deliver and use enterprise-grade IT solutions.

Due to its unique architecture of having access points closer to where data and users reside, Parallels DaaS promises the best performance for end-users, with transparent operations for administrators. Ready to fully harness the benefits of cloud computing and embrace a more productive future? Take a look at Parallels DaaS now.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

Finding TeamCity On-Premises installations with runZero

On February 6th, 2024, JetBrains disclosed a serious vulnerability in the TeamCity On-Premises product. 

The issue, CVE-2024-23917, allows attackers who can access the TeamCity installation via HTTPS to bypass authentication mechanisms and gain administrative privileges on the affected systems.

What is the impact? #

Upon successful exploitation of these vulnerabilities, attackers can execute arbitrary commands on the vulnerable system. This includes the creation of new users, installation of additional modules or code, and, in general, system compromise.

Are updates or workarounds available? #

JetBrains has released an update to mitigate this issue. Users are urged to update as quickly as possible.

How do I find potentially vulnerable TeamCity installations with runZero? #

From the Services Inventory, use the following query to locate assets running the vulnerable products in your network:

product:TeamCity

Additional fingerprinting research is ongoing, and additional queries will be published as soon as possible.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

The best compliance books for 2024

Why is it important to be compliant? 

Compliant companies follow industry regulations and implement regulatory standards for data security, privacy protection, and confidentiality.

Digging into the compliance section at Amazon is not an optional extra. Companies that fail to comply face massive penalties or even criminal prosecutions. Compliance also promotes robust security and improves business processes—giving companies a crucial competitive advantage.

Every employee should be aware of compliance. However, compliance books target senior management and security experts. Anyone responsible for handling customer data or defending against cyberattacks should expand their compliance library.

Top compliance books for beginners and professionals

Compliance is a complex and constantly evolving field. It’s also a minefield for poorly informed businesses. Fortunately, a busy community of expert writers interprets regulations and simplifies the compliance challenge.

We don’t have space to list every manual or think-piece here, but the following compliance books are well worth consulting:

  • Governance, Risk Management, and Compliance: It Can’t Happen to Us—Avoiding Corporate Disaster While Driving Success

  • Intentional Integrity: How Smart Companies Can Lead an Ethical Revolution

  • How to Be a Wildly Effective Compliance Officer

  • The Business Guide to Effective Compliance & Ethics

  • Fully Compliant

  • A Concise Guide to HIPAA Compliance

  • The Risk-Based Approach to Data Protection

  • Big Breaches: Cybersecurity Lessons for Everyone

  • How To Pay A Bribe: Thinking Like a Criminal to Thwart Bribery Schemes

Governance, Risk Management, and Compliance: It Can’t Happen to Us—Avoiding Corporate Disaster While Driving Success

Author: Richard M. Sternberg

Steinberg founded Pricewaterhouse Cooper’s Strategic Risk Services division and has become one of America’s leading risk consultants. This text primarily aims at senior executives and managers. It provides a general introduction to risk management from a boardroom perspective.

Steinberg’s book is a how-to guide for designing compliant processes and leadership structures. There’s no better way to learn about integrating gold-standard risk management practices into your business organization.

Intentional Integrity: How Smart Companies Can Lead an Ethical Revolution

Authors: Robert Chesnut and Joan O’C. Hamilton

Wouldn’t it be great if every business had an incentive to meet industry regulations and act like a model citizen? Experience suggests that many companies fail to live up to these ideals. But Chesnut argues that’s a mistake. The future belongs to businesses that uphold stellar compliance records and drive an “ethical revolution.”

Chesnut is an expert on Silicon Valley, and he knows about dubious morals. However, things can change for the better. This book is a clear-eyed guide to a world where companies with poor data protection or security records are shamed and punished.

Readers will find inspiration in Chesnut’s advice about building an enterprise-wide ethical culture. And they will also come away with plenty of nuggets about improving corporate governance and how to join the ethical elite.

How to Be a Wildly Effective Compliance Officer

3 Compliance books-How to be a wildly effective compliance officer

Author: Kristy Grant-Hart

Grant-Hart is the CEO of Spark Compliance and a regular winner of Women in Compliance awards. This short primer targets compliance officers. Distilling all of her experience, Grant-Hart provides invaluable advice about persuading colleagues and shaping corporate culture.

This isn’t one of those dust-dry compliance books that overwhelm readers with statistics. Grant-Hart specializes in motivation. Readers will close the book feeling energized, confident, and with a renewed sense of their potential to change business processes.

The Business Guide to Effective Compliance & Ethics

Authors: Tony Osborn and Andy Hayward

Hayward and Osborn tackle the critical question, “Why is corporate compliance failing to prevent scandals and data breaches?” Their answer is radically simple. Tick-box checklists and compliance strategies based on documentation are not enough. Businesses need to be proactive and dynamic to build a culture of compliance.

This book lays out a strategy to create a compliance management program that works. The authors contextualize compliance, focusing on benefits like trust and employee satisfaction. As with all good compliance books, the reader emerges empowered and clear about how to move forward.

Fully Compliant

Author: Travis Waugh

Waugh is a leading expert in compliance training. If you struggle to convey compliance information to employees, this book is an essential read.

Fully Compliant argues that it is not enough to tell employees about the consequences of non-compliance. Successful compliance programs immerse learners in real-life scenarios. Immersive learning induces long-term behavior change—a critical component of continuous compliance strategies.

A Concise Guide to HIPAA Compliance

Author: Lucas M. Slattery

Health Insurance Portability and Accountability Act (HIPAA) compliance is stressful and complicated. It helps to have a go-to reference text as you design compliant systems. Slattery’s work is one of the best compliance books for anyone who needs a grounding in HIPAA rules.

Based on official documents from the Department for Health and Human Services (HHS), this book explains tricky issues like defining personally identifiable health information and applying security controls. Slattery keeps things practical, focusing on affordable and proportionate solutions that meet HIPAA standards.

The Risk-Based Approach to Data Protection

Author: Raphael Gellert

Regulations like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) have made data protection a hot topic for all digital businesses. Adopting a risk-based approach to compliance balances security and costs—but what does “risk-based” mean? If you have any doubts, Gellert’s expert advice will come in handy.

Gellert is a Professor of Private Law at Radboud University in the Netherlands and isn’t afraid of complexity. His book delves into the history of data protection and conceptual approaches to risk. But it shines when discussing modern-day compliance programs.

Expect to come away with a deeper understanding of how to execute GDPR risk assessments. With Gellert’s help, you should be able to lock down personal data without wasting scarce resources.

Big Breaches: Cybersecurity Lessons for Everyone

Authors: Neil Daswani and Moudy Elbayadi

Brushing up on your compliance knowledge is great, but it also helps to consider the consequences of lax security and privacy processes. Daswani and Elbayadi mercilessly explain worst-case scenarios, using real-world case studies to paint a grisly picture.

Big Breaches range widely. The authors explore phishing and ransomware attacks. They look at software exploits, compromised supply chains, and encryption foul-ups. But it’s not just a tale of woe. Readers learn seven critical habits to avoid data breaches and design a rock-solid compliance program.

How To Pay A Bribe: Thinking Like a Criminal to Thwart Bribery Schemes

Author: Alexandra Wrage and Severin Wirz

This short book dates back to 2016, but it sadly remains evergreen. Comprising a series of essays from prominent anti-corruption lawyers, “How to Pay a Bribe” explains how corruption occurs. The authors use real-life examples of ordinary companies falling victim to bribery or other scandals. They also frame corruption as a compliance failure—suggesting ways to eradicate it from business culture.

Both a good read and a useful guide, this book is essential reading for companies that do business abroad or work in sectors like finance, where US bribery regulations are extremely tight.

Reading compliance books is a great way to refresh your knowledge and gain insights into compliance best practices. However, reading is not enough. Compliance professionals should leverage every source of information and assistance to stay one step ahead of the pack.

Podcasts supplement books with expert interviews and analysis and are perfect for gym sessions or commutes, providing up-to-date opinions from the compliance battlefront. YouTube channels also mix entertainment and information. Webinars from experts provide a gold mine of information about GDPR compliance.

Universities and accreditation bodies offer online compliance courses. There are plenty of course options, including specialized HIPAA or anti-corruption certificates. It’s also worth bookmarking relevant information libraries and referring to them for practical guidance.

NordLayer’s learning center is a good starting place. We have created regulatory compliance articles about regulatory requirements, penalties, and frameworks companies can use to make their operations compliant. Learn about compliance basics and fundamental to advanced techniques, and integrate the latest knowledge into your compliance strategy.

Businesses should never face compliance challenges alone. Order relevant books, binge on podcasts, and bookmark resources to guide your way. You’ll soon find that others have confronted similar problems, and solutions should be easily achievable.

 

IoT Malware Attacks Hit a 400% Increase

So, what’s the problem with these handy IoT devices? In short: they can be hacked – easily. Designed with functionality and convenience in mind, security has taken a back seat. This low level of protection leaves users vulnerable to attack, and IoT devices have become prime targets for cyberattacks. In fact, the Zscaler ThreatLabz research team found that IoT malware attacks increased 400% in the first half of 2023 compared to 2022. 

EU Cyber Resilience Act

On a legislative level, the EU is taking this seriously. The upcoming Cyber Resilience Act (CRA) is already striking fear into the hearts of device manufacturers the world over. But for consumers, the future of IoT looks bright, or at least more secure.

If passed, the CRA “would see inadequate security features become a thing of the past with the introduction of mandatory cybersecurity requirements for manufacturers and retailers of such products, with this protection extending throughout the product lifecycle.”

This is a huge development: Device makers will have to ensure the security of their products past sale. That means regular updates, security patches, and consumer safety being higher on the priority list than ever before. It’s a big shift towards a more secure digital landscape. Smart and secure homes are the future.

US Cyber Trust Mark

While the EU is laying down the law, the US Federal Communications Commission (FCC) is planning to roll out its new “labeling program for smart devices” in 2024. The Cyber Trust Mark will be the shiny new seal of approval for cyber-secure products.

Jessica Rosenworcel, FCC Chairwoman says: “The Cyber Trust Mark will help consumers make more informed decisions about what kind of devices they bring into their homes and businesses. So when you need a baby monitor, or a new appliance, you’ll be able to look for a Cyber Trust Mark… device manufacturers are going to be able to showcase privacy and security in the marketplace by displaying this mark”.

Manufacturers will be permitted to place the seal on products only after official assessment. And though this is still a voluntary seal, i.e. manufacturers aren’t legally obliged to earn it, it’s a step in the right direction for IoT cybersecurity. If you’re in the US, keep an eye out for this logo when making future device purchases.

IoT vulnerabilities & security tips

While most IoT malware attacks are aimed at businesses (manufacturing and education are among the most targeted sectors), consumers should stay vigilant as well. There are several avenues through which attackers can infiltrate your home networks using IoT devices. Here are a few ways that you can protect yourself.

  • Default logins – ISPs and modem/router companies tend to distribute network devices with default logins. These credentials are easily accessible online. A typical username is “admin”, passwords might be basic codes like 1234 or 0000. Easy pickings for hackers – and easy for you to change.

  • Auto-update – If this feature is turned off and you miss security updates, your device will stay open to vulnerabilities longer. Turn on auto-update to avoid this. Smart devices with legacy firmware are the bread and butter of IoT hackers.

  • Separate network for IoT – Keep your devices insulated from your main home network. This acts as an effective layer of security if one of your devices is compromised.

  • Principle of least privilege – Turn off certain “smart” features that you don’t use. Why does your toaster have a camera anyway?

With new regulations taking effect this year and our own proactive security measures at home, a safer cyber future is possible for all.

Listen to the Cyberview podcast on Spotify.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Scale Computing Announces 2024 Speakers for Second Annual Platform Summit

INDIANAPOLIS – February 6, 2024 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced the speaker lineup for its Scale Computing Platform Summit (Platform//2024). The second annual event, held April 16-18, 2024 at Resorts World in Las Vegas, NV, is open to all Scale Computing customers, partners, and technology alliances.

Platform//2024 will feature insightful Scale Computing company updates, networking opportunities, and educational and best practices sessions with industry-leading speaker presentations. The event will consist of both live and virtual sessions, with agenda topics including the power of automation and security, data protection, hybrid cloud, edge computing, and more. This year’s program features a curated speaker lineup of technology leaders from key Scale Computing customers who will offer expert insights on the use of virtualization technology, artificial intelligence, automation, and more. Presenters will discuss their direct experience with Scale Computing, use cases, and benefits of the infrastructure technology. This year’s speakers include:

“We are delighted to welcome our valued customers, partners, and colleagues back to Las Vegas for Platform//2024,” said Jeff Ready, CEO and co-founder, Scale Computing. “Last year’s summit was a resounding success, convening over 1,000 attendees from across the globe. Building upon that momentum, we are excited to bring together twice the attendees and present a program that delves deeper into the transformative power of edge computing, virtualization, and hyperconvergence solutions. This year’s Platform Summit will be an unparalleled experience, featuring a speaker lineup of our esteemed customers and colleagues at the forefront of these critical technologies. We look forward to welcoming everyone to the 2024 event.”

Over 2,300 attendees are expected at this Platform Summit, including Scale Computing customers and its reseller and technology alliance partners. Leaders from Scale Computing will share insights into the company’s Product Roadmap, as well information about Scale Computing Platform (SC//Platform) and its other products and services. The conference will also offer networking opportunities, an awards reception, and Scale Computing Advanced Training to provide customers and partners with a deep dive into the advanced technical and theoretical features of SC//HyperCore. The Keynote address will be delivered on April 17th by Brian Chambers.

Current sponsors of the 2024 Scale Computing Platform Summit include Mako Networks, Simply NUC, OpenText, Dell, Climb Channel Solutions, Eaton, Lenovo, The Channel Company, and Ingram Micro. If you are interested in becoming a sponsor of Platform//2024, please email platform@scalecomputing.com.

To register for this year’s conference, visit the Platform//2024 event website. More information about event speakers can be found on the Platform Summit Speakers page.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×