Skip to content

Scale Computing Recognized with CRN 2024 Annual Report Card (ARC) Award for Sixth Consecutive Year

Solution Providers Rank Scale Computing as the Top Performer in Hybrid Cloud Infrastructure

INDIANAPOLIS — August 20, 2024 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that it won a 2024 CRN Annual Report Card (ARC) Award in the Hybrid Cloud Infrastructure category from CRN®, a brand of The Channel Company. This is the sixth consecutive year Scale Computing has been recognized as a CRN ARC Award winner, and the company once again swept all subcategories, including Product Innovation, Support, Partnership, and Managed & Cloud Services. Among the most prestigious honors in the IT industry, CRN’s ARC Awards recognize vendors who are committed to growing the IT channel through technology innovation and partner relationships. The award is based on solution provider evaluations of technology vendors’ efforts to design channel-friendly product offerings, develop high-value partner benefits, and foster long-term, successful partnerships. “We are honored to receive a CRN ARC Award for the sixth year in a row as it is a true testament to our continued investment in our partner community,” said Jeff Ready, CEO and co-founder of Scale Computing. “To win the Hybrid Cloud Infrastructure category and sweep all subcategories underscores our unwavering commitment to excellence and investment in making our partner community successful. There has been a lot of uncertainty in the market this year, but we have proudly stayed true to our core values of being a channel-first organization and setting new standards in both customer and partner satisfaction.” The ARC Award win comes on the heels of other major channel award recognitions for Scale Computing, including CRN Tech Innovator finalist, Channel Chief, Women of the Channel, and a CRN Partner Program Guide 5-star rating. Ready was also recently named the number one IT Innovator and Scott Mann named a Top 25 Channel Sales Leader in CRN’s Top 100 Executives list. The company is also currently offering two VMware alternative promotions. New and current partners looking to switch customers to Scale Computing can participate in the VMware Rip & Replace promotion and receive a 25% discount on Scale Computing software and services for each new customer implementation. VMware customers seeking VMware Alternatives can transfer existing software licenses and exchange existing hardware through the Seamless Switch: Trade-Up to Scale Computing promotion. The award-winning Scale Computing Platform (SC//Platform) brings together simplicity and scalability, replacing existing infrastructure and providing high availability for running workloads in a single, easy-to-manage solution. SC//Platform eliminates complexity, lowers costs, reduces management time, and maximizes uptime, delivering faster time to value than competing solutions and enabling organizations to run applications in a unified environment that scales from 1 to 50,000 servers. The ARC Awards highlight the top-performing vendors in one or more of the 27 technology product categories or four subcategories: product innovation, support, partnership, and managed and cloud services. Survey participants rated 58 vendor partners across 27 technology product categories, evaluating satisfaction levels in four main subcategories and 22 criteria, including GenAI, ease of integration, marketing support, and partner communication. “We’re thrilled to recognize technology vendors who partners have selected as the gold standard for products, services, and programs that support solution provider success in the channel,” said Jennifer Follett, VP, U.S. Content, and Executive Editor, CRN, The Channel Company. “The winners of this year’s CRN Annual Report Card Awards demonstrate continuous dedication to building strong partnerships and delivering long-term value and opportunity for their solution provider partners. Congratulations to all the winners for this notable achievement and unwavering commitment to excellence.” Coverage of the CRN 2024 ARC winners can be found online at CRN.com/ARC, and full results will be featured in the October 2024 issue of CRN Magazine. About Scale Computing Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Using patented HyperCore™ technology, Scale Computing Platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime, even when local IT resources and staff are scarce. Edge Computing is the fastest-growing area of IT infrastructure, and industry analysts have named Scale Computing an outperformer and leader in the space, including being named the #1 edge computing vendor by CRN. Scale Computing’s products are sold by thousands of value-added resellers, integrators, and service providers worldwide. When ease-of-use, high availability, and TCO matter, Scale Computing Platform is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, G2, and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

SaaS Security: Best practices and challenges

First, what is SaaS security?

The term software-as-a-service (SaaS) security refers to the measures and security protocols implemented to safeguard the data, applications, and infrastructure associated with SaaS solutions used by a given organization.

To put it differently, SaaS cybersecurity is about implementing the right strategies to protect an organization against unauthorized access, data breaches, and other security threats that may compromise the confidentiality, integrity, and availability of its SaaS-based resources.

So, the core focus of SaaS security requirements is making sure the digital tools and data you use through SaaS services are safe and sound. This is usually achieved through incorporating measures such as encryption (to maintain the confidentiality and integrity of the data), authentication (to verify user access), and access control (to manage permissions). In addition, SaaS security monitoring plays a crucial role in overseeing these measures and ensuring their effectiveness. Regular security assessments are also necessary to identify and address potential vulnerabilities.

The most common SaaS security threats

Switching to SaaS is a significant move for businesses aiming for success, even though it means they sometimes have to give up some control over how their data is handled, how apps are managed, and how systems are customized.

This shift in approach, known as SaaS security management, introduces its own set of risks, particularly concerning SaaS data security. Let’s now explore the top seven challenges that organizations using SaaS solutions must face these days:

Data breaches — Unauthorized access to sensitive information can result in data breaches, leading to the exposure of confidential data.

Phishing attacks — Cybercriminals can use various social engineering techniques to trick users into revealing sensitive information, compromising the security of SaaS accounts.

Insecure interfaces and APIs — Vulnerabilities in interfaces and application programming interfaces (APIs) can be exploited by cybercriminals, which poses a risk to data integrity and security.

Insufficient data encryption — When the protective layer around your information during transmission or storage isn’t strong enough, it makes it easier for unauthorized parties to intercept or access your data without permission.

Account hijacking — Cyberattackers might break into user accounts, getting unauthorized access to potentially mess with or steal data.

Configuration flaws — Improperly configured SaaS settings can lead to security vulnerabilities, creating opportunities for unauthorized access or data exposure.

Non-compliance issues — Failing to meet regulatory compliance standards can not only result in legal consequences but also jeopardize the overall security of SaaS applications.

What is SaaS Security Posture Management (SSPM)?

SaaS Security Posture Management (SSPM) is a strategic approach that organizations can adopt to help ensure SaaS application security. In other words, it involves continuously monitoring, assessing, and improving the security of the company’s SaaS applications to protect it from potential threats and vulnerabilities.

The key benefits include enhanced visibility into the security of SaaS applications, which allows organizations to quickly identify and address any issues. Additionally, SSPM helps ensure compliance with security policies and regulations, reducing the risk of data breaches and improving the overall security posture.

SaaS security: Best practices

When it comes to keeping your online activity safe and sound, especially with software as a service (SaaS) applications, it’s crucial to follow the best practices outlined in what we refer to as “the SaaS security checklist.” Here are the most crucial guidelines:

Protect data using encryption

Encryption plays a vital role in ensuring the security of sensitive data. The way it works is by transforming sensitive information into an unreadable code, decipherable only by authorized parties possessing the right decryption key. This protective measure can help secure your data both in transfer and at rest so that confidential information remains confidential.

Implement identity and access management tools

Identity and access management (IAM) are essential tools in software as a service (SaaS) environments, helping control access to applications and data. In essence, IAM solutions help you make sure that only authorized individuals have the necessary permissions, reducing the risk of unauthorized access and data breaches. IAM is also involved in tasks like setting up, removing, and overseeing user identities throughout their time using the system.

Introduce effective authentication methods

Using multi-factor authentication (MFA) is a way to take your organization’s SaaS security standards to the next level. When you enable this feature, users will be required to provide more than just a password — for example, a special code or a security token — to confirm their identity and get access to company resources. Therefore, MFA makes it much harder for someone to get in without permission, giving an added layer of protection beyond the usual passwords. Making MFA a key component of your SaaS security solution can help ensure that sensitive data and resources are securely protected.

Become compliant with data privacy standards

Achieving compliance with data protection standards such as the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA) underscores an organization’s ability to legally and securely handle sensitive data. Therefore, if a company aims to ensure the safety of the data it stores, nurture customer trust, and avoid potential legal complications, it must prioritize compliance efforts, regularly update policies, and educate employees on the significance of adhering to the standards.

Raise awareness among your customers

It’s no surprise that human error plays a huge role in SaaS cybersecurity. Gartner even predicts that by 2025, 99% of cloud security breaches will be due to customer mistakes. To help avoid these issues, it’s crucial to keep both new and existing customers updated on any system changes. They need to know how each update might impact their security and how their actions could potentially jeopardize it.

Moreover, as more companies shift to cloud-based systems, some customers might not fully understand the risks involved with that transition. That’s why you need to make sure they’re informed on how to keep their information safe and avoid security problems when dealing with your SaaS applications.

Ask the provider about certifications

One of the most important steps toward ensuring a secure SaaS environment is teaming up with the right cloud services provider. Therefore, before making a decision, it’s essential to do your research. Ask potential providers about their certifications and the standards their solutions adhere to, particularly regarding SaaS network security.

For instance, you might want to check for compliance with certificates like SOC 1, SOC 2, and ISO 27001, but also consider other relevant certifications based on your specific needs. Also, be sure to request documentation from providers to check if their solution meets your security requirements, and choose the one that offers the best value.

Improve SaaS security with NordPass

All the practices we mentioned above can be followed by using just one cybersecurity solution, NordPass. Let us prove it to you.

First, NordPass is an encrypted password management platform, which means that you and your team can use it to securely and easily generate, store, manage, and share company credentials, knowing that they are protected by advanced encryption algorithms.

Second, you can use NordPass as an identity and access management (IAM) tool, ensuring the secure provision of access to company data, services, and applications. In other words, with NordPass, you have full control over access to company resources, plus, you can monitor all company logins in real time so that you know exactly who accessed what and when.

Third, NordPass enables multi-factor authentication (MFA) and the single sign-on (SSO) method, allowing you to double-check and confirm the identity of each user whenever they attempt to access one of the company accounts.

Fourth, NordPass can play a crucial role in helping you meet regulatory compliance by adhering to some of the most essential data privacy standards such as HIPAA. Also, you can use the platform to set up various rules, procedures, and policies in a way that will allow your organization to be in line with specific requirements.

Of course, there is a lot more to NordPass than we can discuss in just one blog post. So if you want to learn more about how it can help your organization improve its cybersecurity and productivity.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×