Skip to content

Chapter 1: End-to-End Security & Zero Trust

A multi-layered security shield concept symbolizes the “Zero Trust” approach of assembling end-to-end defenses. Modern enterprises require such comprehensive protection for remote and cloud access.

Security Challenges in Hybrid and Multi-Cloud Environments

The rise of hybrid work and multi-cloud infrastructure has stretched traditional IT security models to a breaking point. Employees now access corporate applications from anywhere, often outside the corporate network, and data resides across on-premises data centers and multiple clouds. In this environment, perimeter-based defenses (like VPNs and classic firewalls) are insufficient. In fact, traditional VPN and firewall-centric models are struggling to protect today’s distributed workforce and hybrid IT environments. Attackers exploit VPN vulnerabilities and stolen credentials to move laterally within corporate networks, and unsecured home or public networks pose new risks. Organizations face a critical need for end-to-end security – ensuring that from the user’s device all the way to corporate applications and data, every layer is secured and verified.

Modern security frameworks emphasize a “never trust, always verify” mentality, known as Zero Trust Architecture (ZTA). Instead of implicitly trusting devices or network locations, Zero Trust requires continuous authentication, authorization, and validation of context for each user and session. This approach aligns well with hybrid and multi-cloud realities, where resources are spread out and traditional network boundaries are blurred. End-to-end security built on Zero Trust principles means every access request is treated as potentially hostile until proven otherwise. The challenge for businesses is implementing these principles in a practical, user-friendly way that doesn’t hinder productivity.

End-to-End Security Principles and the Zero Trust Approach

Achieving end-to-end security in a modern IT environment involves several core principles. First is comprehensive identity and access management – verifying that the person or system requesting access is who they claim to be, through strong authentication and strict access controls. Second is least privilege access, ensuring users only get the minimum level of access required to perform their job (for example, an employee might access a specific application but nothing else on the server). Third is encryption and session security, protecting data in transit and preventing eavesdropping or tampering on remote sessions. Finally, continuous monitoring and auditing of sessions is key, so that any suspicious activity can be detected and recorded for forensic analysis.

These principles are embodied in the Zero Trust model, which has rapidly become the preferred strategy for end-to-end cybersecurity. Under Zero Trust, the network is treated as hostile by default; no user or device is inherently trusted, and strict verification is enforced at every step. For example, even if a user is inside the corporate network, they must still authenticate and be authorized for each resource they access. Likewise, simply connecting via a VPN is no longer enough – the system should continuously ensure the user’s legitimacy and enforce policies such as device security posture or time-of-day restrictions.

Thinfinity Workspace is a remote access platform designed with these exact principles in mind. It provides a secure, cloud-ready Virtual Desktop Infrastructure (VDI) and application delivery solution that implements Zero Trust end-to-end. In the following sections, we will explore how Thinfinity Workspace addresses each layer of security – from network access, to identity verification, to session protection and audit – to meet the challenges of hybrid and multi-cloud environments.

Thinfinity Workspace: A Zero Trust Platform for Secure Remote Access

Thinfinity Workspace is an advanced remote workspace and virtualization solution that enables users to access Windows, Linux, and web applications through a browser, without needing traditional VPN clients or desktop RDP setups. It was built by Cybele Software with a “Zero Trust Network Access” (ZTNA) philosophy at its core. In practice, this means Thinfinity enforces strict identity verification and granular access controls for every session, rather than granting broad network privileges. The platform is clientless (accessed via standard web browsers) and uses an agent/gateway architecture to broker secure connections. This modern design contrasts with legacy remote access, which often required opening network ports or installing heavyweight clients.

By embracing a Zero Trust architecture, Thinfinity Workspace ensures that no one can connect to a resource without passing multiple security checkpoints. For example, an administrator can publish a set of cloud-hosted applications or desktops through Thinfinity, and users must authenticate (with possible multi-factor methods) to the Thinfinity portal. Only after verification can they launch the specific app or desktop, and even then, the internal server hosting that resource remains hidden from direct access on the internet. This approach dramatically reduces the attack surface while providing a smooth user experience. As Cybele Software notes, Thinfinity Workspace offers secure remote access with granular policy enforcement and seamless identity management – all “without the complexity of legacy VPNs”. In essence, it delivers the convenience of cloud VDI with security built in from the ground up.

Below, we delve into the key cybersecurity capabilities of Thinfinity Workspace and how each contributes to an end-to-end secure remote access solution.

Zero Trust Security Architecture: Model, Encryption, Identity and Access Management, Monitoring, and Least Privilege Access.

Zero Trust Network Access (ZTNA)

A cornerstone of Thinfinity’s security model is its implementation of Zero Trust Network Access (ZTNA). Traditional VPNs connect a user’s device into a corporate network, potentially exposing large segments of the network if that device is compromised. Thinfinity takes a far more granular and safer approach. No direct network access is ever granted to end-users – instead, Thinfinity acts as a broker that only allows authenticated users to reach the specific applications or desktops they are authorized for.

Agent-Based Connectivity: Thinfinity Workspace uses a clever agent-based architecture to avoid exposing any internal network ports. A small agent on the target network (where the application or desktop resides) will only initiate outbound connections to the Thinfinity gateway or broker. This means from the outside, there are no open inbound ports and no public IP addresses pointing directly to internal resources. Corporate firewalls do not need to be opened up for inbound traffic – the Thinfinity agent reaches out to the cloud gateway using an outbound TLS connection, and all user sessions are tunneled through that secure channel. The result is zero public exposure of RDP, SSH, VNC or other protocol ports, eliminating the risk of port scanning, brute-force attacks, and exploits like the infamous BlueKeep RDP vulnerability. All communication is encrypted with strong TLS, and the protocol details are encapsulated so attackers cannot even detect what protocols might be in use.

This ZTNA approach inherently minimizes the attack surface for remote access. An unauthorized person scanning the company’s network from outside would find no indication that remote desktop services even exist, because Thinfinity presents no obvious openings. Meanwhile, legitimate users who authenticate through Thinfinity’s web portal are dynamically granted access to their specific resources and nothing more. This aligns perfectly with Zero Trust principles: only authenticated, authorized users can initiate sessions, and everything is verified on a per-session basis. If a user’s account is revoked or their session time window expires, the access disappears automatically.

In practice, Thinfinity’s ZTNA means companies can retire risky VPN endpoints. There’s no need to place servers in a DMZ or assign them public IPs accessible from the internet. The internal architecture remains shielded, and Thinfinity handles the secure bridging of sessions from outside to inside. This not only improves security but also simplifies network configuration (no complex VPN client setups or network routing issues). According to Thinfinity’s documentation, it’s a “secure architecture that enables SSL web access without any open ports,” embodying Zero Trust security for cloud VDI.

Secure remote access and reduced attack surface with Zero Trust Network Access (ZTNA) by eliminating open ports.

Conclusion Chapter 1

Today’s hybrid and multi-cloud realities require more than legacy VPNs and firewalls. Thinfinity Workspace answers this challenge with a Zero Trust model—verifying every user, locking down access, and securing every session. The result? Stronger security, smoother compliance, and a seamless remote experience.

In Chapter 2, we’ll cover:

  • Advanced multi-factor authentication (MFA) and passwordless login
  • Integration with enterprise identity providers (SSO, SAML, OAuth)
  • Just-in-time and time-based privileged access (RPAM)
  • Granular session controls for data loss prevention and device security
  • Automated onboarding/offboarding and role management
  • Session recording and real-time auditing for compliance
  • Tangible business benefits: compliance, operational efficiency, and risk reduction

If you are a CIO, CISO, IT manager, system administrator, or business owner looking to secure remote access and modernize your infrastructure—don’t miss Part 2. We’ll show you how Thinfinity Workspace delivers real-world value for every role.

 

About Cybele Software Inc.
We help organizations extend the life and value of their software. Whether they are looking to improve and empower remote work or turn their business-critical legacy apps into modern SaaS, our software enables customers to focus on what’s most important: expanding and evolving their business.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Storware Backup and Recovery 7.3 Release

Storware Releases Backup and Recovery v7.3 — Enhancing Performance, Resilience, and Usability. This latest release brings significant performance enhancements, user experience improvements, and new feature support to ensure even greater flexibility, resilience, and control for IT environments across industries.
 

 

Storware 7.3 – what’s new?

Resilient Backup for VergeOS: Version 7.3 introduces support for a secondary backup destination for Verge.io, delivering enhanced data protection and greater backup resilience for users of this ultra-converged infrastructure platform. → Expanded OpenStack Capabilities: OpenStack users can now restore security groups during instance recovery and take advantage of support for multiattach volumes, making cloud-native protection even more seamless. → Optimized Performance at Scale: The Storage Area component has been optimized to improve performance, particularly in environments managing thousands of volumes — including those leveraging Ceph RBD, Nutanix Files, and other enterprise-grade storage backends. → Microsoft 365 Throttling Compliance: Storware now enforces a single-node usage per Microsoft 365 organization in response to Microsoft’s service limitations, ensuring compliant and stable backup operations. → Improved OS Agent Restore: Enhancements to the OS Agent restore process deliver faster and more reliable file-level recovery for endpoints and physical servers. → User Interface Enhancements: A redesigned, unified filter modal now provides a consistent experience across all list views. Additionally, the Mounted Backup view now matches the design of VM detail views, along with a series of minor UX upgrades to streamline daily tasks.

 

Storware 7.3 high level architecture:

 

Backup → Recover → Thrive

Storware Backup and Recovery ability to manage and protect vast amounts of data provides uninterrupted development and security against ransomware and other threats, leverages data resilience, and offers stability to businesses in today’s data-driven landscape. Get started with a free version or unlock the full potential of Storware Backup and Recovery with a 60-day trial! Choose Storware and protect your success today. For detailed changes, fixes and improvements, see Press Release.

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

ESET will discontinue ESET Parental Control for Android

Keeping families safe in cyberspace has been one of the top priorities for ESET since its start in 1992. Throughout all these years, ESET has been improving its protection and bringing new features to make people’s digital lives as safe as possible.

The latest testament to this commitment is the AV-Comparatives’ Product of the Year 2024 Award for ESET HOME Security Essential, a welcomed accolade for our all-in-one household cybersecurity solution.

However, sometimes this journey ends and we need to say goodbye to some of our well-loved solutions, and currently the time has come for ESET Parental Control for Android.

Why has ESET Parental Control for Android reached its end-of-life?

Usually, IT products reach their End-of-Life (EOL) due to obsolescence. They are no longer desired, or better solutions replace them.

However, parental control apps are not out of favor. For example, approximately four in five parents living in the U.K. use at least one online safety tool, such as broadband parental control, screentime management apps, gaming console parental controls, or streaming and search safety settings, according to a 2023 study conducted by Internet Matters, a nonprofit organization.

Another reason for EOL is that, over time, maintenance and necessary upgrades to old products becomes increasingly difficult until companies decide to replace their functionality with entirely new software that is not limited by older code structure.

But that’s also not the case with ESET Parental Control, which is still available as a feature of ESET HOME Security.

So, what is the reason behind this move?

It’s quite simple. ESET Parental Control for Android is no longer needed. Built-in parental control features have reached such a high quality that users naturally utilize this option instead of stand-alone solutions.    

For ESET developers, this means that, from now on, they can focus on other tasks, bringing even more advancements to the ESET technology protecting households.   

What does it mean for users?

The End of Sales date for ESET Parental Control for Android date is June 30, 2025. After this date, customers cannot purchase a new subscription or renew their existing one.  

The End-of-Life date for ESET Parental Control for Android is June 30, 2026. After this date, users can no longer install, activate, or use the application and web portal. The app will no longer be active on their devices and unavailable on either the Google Play Store or the ESET HOME platform.

Monthly auto-renewals via Google Play will be active until May 2026, and monthly auto-renewals purchased through the ESET e-Store will stop after June 2025.  

ESET Parental Control features will continue to be available in ESET’s Windows products, including ESET HOME Security.

For more information, please visit ESET EOL website.

Worried about family? Opt for full protection

If you have enjoyed ESET Parental Control, consider ESET HOME Security, which protects households from various kinds of attacks, including malware, phishing, or identity theft, and covers commonly used smart devices such as smartphones, tablets, webcams, and more.

The purpose of ESET HOME Security is to secure families with an all-in-one solution that is effortless to use, easy to manage, and brings peace of mind with multilayered protection. And, yes, this means that users of ESET HOME Security for Windows still have ESET Parental Control available, so they don’t have to search for multiple cybersecurity products to protect their digital lives.   

So, let’s bid farewell to ESET Parental Control for Android knowing that this is not the end, but rather the next step in ESET’s devotion to protecting households and families with robust cybersecurity. 

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Stronger Together: Enclave and SafeDNS Advance Zero Trust with DNS-Level Security

In the modern cybersecurity landscape, organizations need more than just isolated tools – they need tightly integrated solutions that work hand-in-hand to deliver scalable protection, simplicity, and visibility across every layer of their digital infrastructure. That’s why we’re excited to announce a strategic partnership between SafeDNS and Enclave, a leading provider of zero-trust network access.

Secure Connectivity + Smart DNS Protection

Both SafeDNS and Enclave are built on a foundation of proactive defense. With Enclave, you can eliminate network attack surfaces and create encrypted connection that restrict access to only trusted, authenticated users. At the same time, SafeDNS protects your users at the DNS layer – preventing threats before they reach your infrastructure.

Together, these solutions form a powerful security stack: SafeDNS fortifies DNS resolution and content access, while Enclave governs encrypted communications between trusted endpoints. By integrating these layers, organizations can block malicious domains and unauthorized communications in a single motion – whether users are remote, hybrid, or on-prem.

What makes SafeDNS even more aligned with today’s compliance-driven security frameworks is its 3R Concept – Reveal, React, Resist:

– Reveal: Gain full visibility into DNS activity across your network, uncovering hidden threats, suspicious behavior, and usage anomalies in real time.
– React: Instantly apply policies or blocklists to respond to new or emerging threats as they arise.
– Resist: Harden your infrastructure against future attacks through intelligent filtering, dynamic AI-based threat detection, and DNS-layer access control.

This model directly supports compliance with NIST Cybersecurity Framework (CSF) functions: Identify, Protect, Detect, Respond, and Recover, by extending protection and visibility into the foundational layer of internet communication: DNS.

By using SafeDNS as the primary DNS resolver inside the Enclave environment, organizations can align their operations with NIST best practices while benefiting from two solutions that are truly complementary by design.

Joint Value: Why It Matters

The real value emerges in the synergy between SafeDNS and Enclave. Here’s how:

– Zero Trust Meets DNS Security: Enclave creates encrypted overlays and strict access policies, SafeDNS ensures no one in that overlay is reaching out to risky or unknown destinations.
– Seamless Policy Enforcement: With SafeDNS set as the primary DNS resolver inside Enclave, admins can apply DNS filtering, block lists, threat detection, and regulatory compliance rules globally, without complex routing or hardware.
– Visibility & Control Across the Stack: Security teams can enforce and monitor DNS policies even across dynamic Enclave-created overlays. That means granular visibility into both who is connecting and what they’re resolving, which is critical for detecting lateral movement, data exfiltration, or insider threats.

Use Case: Secure, Compliant, and Easy

Imagine a distributed team using Enclave for secure access to internal systems. With SafeDNS embedded as the DNS resolver in their Enclave environment, the same team benefits from:

Automatic blocking of malware, phishing, and DNS tunneling attempts
Protection from dynamic DNS Threats (DNS Spoofing, DNS Hijacking, DNS Injection and more)
CIPA, ISO, SOC, HIPAA, and KCSIE compliance at the DNS level
Smart categorization of over 116M domains and 2B+ URLs with real-time updates
One-click DNS-based content filtering for productivity, legal compliance, and security

Why This Matters to You

Whether you’re an MSP, a security-conscious enterprise, or a growing remote-first company, by implementing Enclave + SafeDNS solutions, you can deploy Zero Trust access and DNS-layer protection as a unified experience. It’s easier, more powerful, and doesn’t require rip-and-replace changes.

To activate SafeDNS within your Enclave network:

1) Select SafeDNS as your primary DNS resolver in the Enclave setup.
2) Apply your DNS filtering policy via the SafeDNS dashboard.
3) Enjoy a clean, threat-resistant, and regulation-compliant DNS layer across your infrastructure.

Still have questions or want to see how it works in your environment? Our team is ready to help, just book a demo using the form below.

 

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox Named Cloud-Based Solution of the Year Runner-Up at 2025 Network Computing Awards

Portnox was also a finalist for Innovation of the Year.

 

AUSTIN, TX – May 28, 2025 – Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced that Portnox Cloud was named runner-up for Cloud-Based Solution of the Year for the second year in a row at the 2025 Network Computing Awards. Portnox was also a finalist for Innovation of the Year.

“Cyber threats aren’t just increasing—they’re evolving faster than most security teams can keep up,” said Denny LeCompte, CEO of Portnox. “That’s why we’re helping organizations worldwide ditch passwords and legacy infrastructure in favor of a smarter approach: cloud-native that scales with them. Our unified platform takes the friction out of going passwordless and building a zero trust architecture—without the baggage of traditional on-prem deployments. It’s security that just works, wherever your users and data live.”

Portnox delivers a unified access control platform – the Portnox Cloud – that brings together passwordless authentication, authorization, risk mitigation, and compliance enforcement for enterprise networks, applications, and infrastructure. Purpose-built for distributed organizations with complex IT environments, Portnox Cloud is 100% cloud-native and offers unparalleled ease of use coupled with the robust security capabilities needed to protect against increasingly sophisticated attacks.

This recognition from the Network Computing Awards follows Portnox Cloud being awarded a 2025 Product of the Year Award by Cloud Computing Magazine. The Cloud Computing Product of the Year Awards honor vendors with the most innovative, useful, and beneficial cloud products and services available to deploy within the past year.

 

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×