Skip to content

The essentials of cloud native security

 

Summary: Cloud native security protects cloud environments by addressing risks with IAM, encryption, and disaster recovery. Learn key strategies to secure your cloud.

As more businesses move to the cloud, securing cloud environments is more important than ever. Cloud architecture offers great benefits—like on-demand computing power, scalable storage, and software services. However, without strong security, these advantages can expose businesses to cyber-attacks and data breaches.

Cloud native security is the solution. Built specifically for cloud environments, it protects applications, data, and services by embedding security into the design and operation of cloud systems. Unlike traditional on-premises setups, cloud native security handles the challenges of cloud platforms.

What makes cloud native security different? And how can businesses build a strong cloud security strategy? In this article, we’ll explore cloud native security solutions and share best practices for securing your cloud environment.

What is cloud native security?

The cloud native approach allows businesses to scale, manage infrastructure, and deploy applications efficiently while boosting security. Cloud providers handle the security of their platforms, but organizations are responsible for protecting their own resources. This division is known as the shared responsibility model.

Cloud-native security combines practices, tools, and technologies designed specifically for cloud environments. It’s a must for modern security strategies, though creating it from scratch can feel overwhelming.

Fortunately, tools like cloud native application protection platforms (CNAPP) make it easier. Features like threat detection, compliance automation, and vulnerability management can help safeguard your cloud environment.

 

Understanding the cloud native security

The cloud native approach is all about building, testing, and deploying software quickly and efficiently in the cloud. It began in the early 2000s when on-premises data centers couldn’t handle issues like traffic spikes or delays across regions.

Since then, developers have reimagined how software was produced, moving away from traditional setups. The technologies that came from this change are now the backbone of cloud native systems.

Most cloud native applications rely on these key concepts:

  • Containerization: Packages apps and dependencies to run consistently anywhere.
  • Microservices: Splits large apps into smaller, independent services for flexibility.
  • Declarative APIs: Focuses on what the system should do, not how to do it.
  • DevOps: Combines development and IT teams to speed up delivery and improve reliability.
  • Infrastructure as code (IaC): Automates resource setup with scripts for consistency.

These concepts make cloud environments more agile, scalable, and reliable.

Common risks in cloud native environments

The flexibility of cloud native systems is a double-edged sword. While the ability to scale resources on demand saves costs and improves efficiency, every new resource adds potential vulnerabilities.

The dynamic and flexible nature of containerized microservices increases the attack surface and makes security management more complex. Infrastructure can change several times a day, meaning security must keep up.

Each tool requires proper security configurations to block unauthorized access. For example, network segmentation can limit the damage if one part of the system is compromised.

While cloud native environments bring many advantages, they also introduce numerous security risks. Addressing them is key for protecting applications and data. Here are some common challenges:

  • Container vulnerabilities: Regularly update base images to patch flaws.
  • Unsecured APIs: Use strong authentication, authorization, and data validation to prevent breaches.
  • Limited visibility: Employ monitoring and telemetry tools for real-time threat detection.
  • Configuration errors: Conduct regular reviews of IAM settings, firewalls, and network routes.
  • Insider risks: Minimize access using the principle of least privilege (POLP) and adopt Zero Trust models.
  • Data breaches: Encrypt sensitive information and enforce strict access controls.
  • Compliance risks: Avoid fines by ensuring cloud setups meet data protection regulations.

Staying secure in cloud computing isn’t just about keeping the lights on—it’s about ensuring the whole house is safe. By understanding and mitigating these risks, businesses can enjoy the benefits of cloud native systems without losing sleep over security concerns.

 

Common challenges in cloud native security systems

Even though cloud native security becomes more important, many businesses find it hard to implement the right protection for their complex IT environments. Here are three security challenges organizations may face.

Challenge #1: Developers aren’t security experts

Developers can now quickly create, scale, and modify infrastructure. However, this makes ensuring security more challenging. To address this, security must be integrated into the development process from the start.

Before cloud technology, roles were more defined—developers wrote code, and security teams handled protection. They worked together to decide if a feature was safe to add. Today, such conversations are rare. Developers often lack deep security expertise, so security teams must provide clear steps that fit into the development workflow—without causing delays.

Instead of controlling every aspect, security teams should focus on helping developers to make informed, secure choices.

Challenge #2: Complex environments outpace security

New technologies like Kubernetes, containers, and serverless frameworks are evolving quickly, and security teams often struggle to keep up. With constant updates and new tools, staying secure can feel like a race against time.

To keep pace, security tasks need to be built into everyday processes. Companies should also work closely with DevOps teams and provide developers with tools that make secure decisions easy and fast.

Challenge #3: Managing security risks in the cloud

Cloud native environments bring their own risks, and businesses need to figure out what’s acceptable.

Security teams face questions like:

  • Are containers secure on their own, or do they need extra protection?
  • Why are attacks on containers so hard to detect?
  • What risks come with serverless frameworks?
  • How does the software supply chain increase vulnerabilities?
  • What happens if weak authentication settings go unnoticed?

Balancing speed and security is critical. DevOps teams want to move fast, while security teams focus on protecting assets. It’s not about one team versus the other—it’s about finding the right balance.

By doing so, businesses can protect their cloud environments without slowing down progress.

Key features of cloud native security

Securing the cloud is like building a fortress. Every piece is critical to keeping your defenses strong. Below are the main pillars of cloud native security.

  • Identity and Access Management (IAM): IAM tools act as gatekeepers. They ensure users and services access only what they need when they need it—nothing more. By following the Principle of Least Privilege (POLP), IAM keeps unauthorized hands out of sensitive areas.
  • Cloud network security: The cloud is a complex digital environment. An open gate can allow threats in, putting your cloud network security at risk. Protecting it involves configuring firewalls, managing traffic routes, and applying Zero Trust principles to block potential threats.
  • Application security: Applications are the engines of the cloud. To secure your cloud applications, you need safe coding practices, regular vulnerability scans, and prompt patches. Encrypt data, authenticate users and handle errors properly to protect your apps.
  • Data protection: Encrypt data when it’s stored and transferred. Use protocols like HTTPS to prevent unauthorized access during transfers.
  • Infrastructure as Code (IaC) Scanning: Think of IaC as blueprints for your cloud infrastructure. Scanning tools review these blueprints to catch flaws before you build, helping you avoid vulnerabilities and stay aligned with security policies.
  • Cloud workload protection: Workloads are like the workers in your cloud factory. Keep them safe with real-time monitoring, threat detection, and quick patching to ensure smooth and secure operations.
  • Cloud security posture management (CSPM): CSPM tools act like surveillance cameras, continuously watching for misconfigurations and compliance risks. They provide a clear view of your cloud landscape, ensuring everything stays secure and in order.
  • Container security: Containers are like individual cargo boxes. Keep them lean and clean by using the smallest possible base image and scanning for vulnerabilities. To reduce risk, only open the “ports” that your app truly needs.
  • Kubernetes security: Kubernetes is the control tower for your cloud operations. Keep its access tightly restricted and enforce security policies with tools that help ensure control.

Effective strategies for cloud native security

Securing your cloud environment requires a well-rounded approach. Here are the cloud security best practices to help your organization stay protected.

Secure configuration management

Think of secure configuration as setting up the foundation for your cloud. Every cloud service should be securely configured from day one. This means setting up firewalls, access controls, and encryption to block potential threats.

But the work doesn’t stop there—configurations should be reviewed and updated regularly. This ensures that your defenses remain strong as new challenges arise.

Identity and Access Management (IAM)

Controlling who can access what is critical. IAM ensures only the right people have access to your cloud resources. Use tools like multi-factor authentication and follow the principle of least privilege so users have access only to what they truly need.

Network security

The cloud is like a busy highway, and you need barriers to keep threats out. Network segmentation, firewalls, and intrusion detection systems can help stop DDoS attacks, malware, and other risks before they reach your environment.

Data protection

You can’t protect what you can’t see. Automated tools for data discovery and classification help identify sensitive information. Once identified, encrypt data, enforce security policies, and have robust backup and recovery processes. These steps ensure your data stays safe, no matter what.

High availability and disaster recovery (HA/DR)

Disasters happen—what matters is how prepared you are. A strong HA/DR plan ensures your services keep running during unexpected events, like natural disasters or technical failures.

High availability keeps your systems online, while disaster recovery ensures you can bounce back quickly if something goes wrong. Make sure your plan defines roles, communication steps, and actions to minimize downtime and damage.

How NordLayer can help with cloud native security

Cloud native security is vital for protecting cloud environments. By using the right strategies, you can reduce risks and stay compliant with regulations.

NordLayer is a comprehensive platform that offers cloud security solutions for businesses of all sizes. Here is how we can help secure your cloud environment.

Internet access security features

  • IP masking and traffic encryption (VPN service): Secures data in transit between users and cloud services, preventing eavesdropping and ensuring user privacy by hiding their IP addresses.
  • DNS Filtering (BETA): Prevents users from accessing malicious or non-compliant content online, reducing the risk of phishing or malware targeting cloud services.
  • Deep Packet Inspection (DPI): restricts unauthorized apps, ports, or protocols that could be exploited to attack cloud resources.
  • Download Protection: Scans files for malicious content before they reach cloud environments, preventing malware from infiltrating the cloud ecosystem.

Private access security features

  • Cloud Firewall: Provides granular control over traffic flows within the cloud, allowing admins to enforce segmentation and block unauthorized access to critical resources.
  • Device Posture Security: Ensures only devices that meet compliance standards, such as OS type, version, and location, can access sensitive cloud resources, reducing the attack surface.
  • Multilayered authentication options: Strengthen identity verification for virtual private gateways, mitigating unauthorized access risks even if credentials have been compromised.

Network connectors

  • Site-to-Site: Establishes secure and reliable connections between cloud networks, physical networks, and remote offices, ensuring the confidentiality and integrity of sensitive data in hybrid setups.
  • Cloud LAN: Creates a virtual network for interconnecting devices, enabling secure, isolated communication between devices in a cloud environment.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Multi-factor authentication: the ins and outs

What is multi-factor authentication (MFA)?

Multi-factor authentication, also referred to as “multi-step authentication” by some experts, is an access management component that requires users to provide two or more authentication factors to log in and access an account. Essentially, users must provide extra proof of identity besides their username and password. Think of MFA as an extra lock on your door.

Unfortunately, misconceptions about MFA exist: they’re especially prevalent in the business world and often deter users from using it and taking advantage of its security. Organizations tend to think that mandating multi-factor authentication in the IT infrastructure for the entire company is cumbersome and could be counterproductive.

The reality of the matter is actually the opposite: with today’s security technologies, setting up MFA company-wide is quick and causes practically no interruptions. Once it’s done, the benefits that MFA brings to the table far outweigh any possible inconveniences that a company might face during the implementation.

How does MFA work?

Multi-factor authentication employs various technologies, like one-time passwords, tokens, and biometrics, to authenticate users when they try to access their accounts. First, the user enters their username or email and their password. But besides these credentials, and with MFA switched on, the user is also asked to authenticate their identity using their selected secondary verification method. Once the two factors are authenticated, the user is granted access to their account.

One of the most popular MFA factors is known as one-time passwords (OTPs). They’re security codes that can be used only once to authenticate a login attempt. A one-time password is usually 4–8 digits long and can be valid for anywhere between 15 seconds and a few hours. When a user attempts to log in, a one-time password is sent via text message or email for authentication. OTPs can also be generated using an authentication app, like NordPass’ built-in Authenticator.

As you set up multi-factor authentication, your one-time password will be generated in one of two ways: either as a time-based one-time password (TOTP) or a hash-based one-time password (HOTP). Their core difference is how frequently a new code is generated. An authentication app refreshes a TOTP at a set interval (for example, every 30 seconds), while a HOTP only refreshes upon a new login attempt.

One-time passwords rely on two factors—a seed and a moving factor. The seed is a static secret key that stays on the server side, while the moving factor is affected by the counter, which ensures the periodical generation of new passwords. The process of generating a one-time password is randomized, and the number of OTPs that can be generated is practically limitless.

The process of multi-factor authentication takes 3 steps:

  • Registration. You create an account on a website or app and, in addition to your login credentials, select a preferred method of additional authentication. You may use your phone number to receive authentication via text messages, get emails with the code, switch on biometrics, or use an authentication app. The exact method may vary depending on the platform’s permissions.

  • Authentication. As you log in to your account, you enter your login credentials first and are then prompted to enter your multi-factor authentication code. Use your selected means of authentication to access and input the code. Some apps allow you to autofill the code so that you don’t lose it before it resets.

  • Access. If the one-time code you entered matches the server request, your login attempt is authenticated and you can access your account. If you log out, you must start the process over.

how does mfa work

Types of MFA factors

Varying from platform to platform, a number of different factors are used to authenticate login attempts. The most common examples include the following.

What you know (knowledge factor)

The knowledge factor typically consists of a password, PIN, passphrase, or security questions whose answers are known only to the rightful account holder. For the knowledge factor to work correctly, the user must enter the correct information requested by the online application.

What you have (possession factor)

Before smartphones existed as MFA devices, people carried tokens to generate an OTP that would be entered as an authentication factor. These days, smartphones are the primary physical tools for generating OTPs, usually via authenticator apps. However, physical security keys are also available as a possession factor, often considered one of the most secure MFA options.

What you are (inherence factor)

Biometric data, such as fingerprints, facial features, retina scans, voice recognition, or other biometric information, can also be used for multi-factor authentication. Biometric authentication is gaining more traction by the day, as this method is frictionless when compared to other types of authentication.

Where you are (location factor)

Last but not least, location-based authentication checks the user’s IP address and geolocation. Users can whitelist certain geolocations and block others. If the login attempt comes from an unrecognized location, MFA blocks access to the account and vice versa.

inner types of mfa

Why is multi-factor authentication important?

As cybercrime continues to increase in frequency and sophistication, individuals and companies alike look for effective and simple ways to ensure the security of their online accounts. Passwords are no longer enough. In fact, considering how frequently weak passwords are the culprit of breaches and how susceptible to attacks the most common passwords in the world are, additional security measures are not just a recommendation but a necessity. Multi-factor authentication provides that extra layer of security that can make the difference between a secure account and a hacked one.

When bad actors steal passwords and usernames, they can easily gain unauthorized access to accounts and network systems. But with MFA security in place—whether it’s OTP, biometric authentication, or other means—having correct login credentials alone wouldn’t be enough to get into the account. All of that complicates things for attackers, as they would need access to smartphones or other authentication devices related to the user to execute their scheme successfully.

Given that around 68% of data breaches are related to human error in one way or another, adding MFA to your accounts can significantly improve your security. According to the 2024 Elastic Global Threat Report, brute-force techniques grew by 12%. But that’s not all. Security experts and researchers continue to see an increase in phishing attacks, which are usually at the top of the hacking funnel. As cybercrime continues to rise in prominence, MFA is quickly becoming a critical part of everyone’s security, whether it’s an individual or a large organization.

What’s the difference between MFA and two-factor authentication?

As the name suggests, the difference between two-factor authentication (2FA) and multi-factor authentication lies in the number of authentication factors required to authenticate a given user. Two-factor authentication requires exactly two authentication factors, whereas MFA requires two or more factors to work as intended. Essentially, you can think of multi-factor authentication as an umbrella term that includes 2FA as one of the options.

Multi-factor authentication examples

As already mentioned, multi-factor authentication involves two or more authentication factors that identify a given user. These factors include static and one-time passwords, PINs, passphrases, tokens, and biometrics like fingerprint recognition and face ID. By combining a range of these factors, you can build authentication sequences with different levels of security—but any combination can be stronger than using a single factor.

Usually, your login credentials—your username, account number, or email address and your password—are the first step in the authentication process. Once you provide this information, your login attempt is validated. However, if your login details are breached, anyone can use them to log in to the account and pretend to be you. There is no way of guaranteeing the person logging in is actually you, unless the platform checks to see if the IP matches your usual one—but this would fall under location authentication.

To truly prove it’s you logging in, you need to get the second factor in place. This can be a single-use code sent to you by text, the one-time password generated by your authentication app, or a pop-up on your phone requesting you to verify your fingerprint. For improved accessibility, you can also receive an automated call that uses text-to-speech to list the numbers of your verification code.

From here, you can take it up a notch and add another authentication method. For example, you can combine the one-time password with a biometric proof of identity. However, the principle of “less is more” still stands true—introducing too many authentication factors may negatively affect the overall user experience, making the process too burdensome. Imagine using a token as your second layer and biometrics as your third. If you forget or lose either of the two, you’re barred from accessing your account.

MFA benefits

We’re now familiar with the technical side of MFA and how it works to support data protection. Let’s take a minute to see the practical benefits of using multi-factor authentication to protect your personal and work-related credentials.

The number one advantage that MFA brings to the table is, naturally, enhanced security. Multi-factor authentication works hand in hand with strong passwords to ensure more robust account and app security. Switching on MFA makes it harder for bad actors to access accounts or system networks without accessing the authentication device.

While increased security is one of the biggest benefits of multi-factor authentication, it’s far from the only one. MFA can be crucial for regulatory compliance. Many cybersecurity policy guidelines list it as a necessity to meet appropriate data protection standards. For instance, the CIS Password Policy Guide has different standards for accounts that use a password only and those that have MFA mandated. Compliance adherence allows businesses to build stronger trust with customers as it shows they take precautions against cyber threats.

Of course, it cannot be understated that multi-factor authentication is a user-friendly and convenient solution. It may seem contrary at first, as it does require extra steps than just logging in. However, with features like autofill for one-time passwords or biometric authentication, the MFA process can take as little as a tap on the screen. Furthermore, passkeys are a type of multi-factor authentication that reduces login time by eliminating the password step altogether while maintaining a high level of security. They combine biometric verification with cryptographic keys, ensuring no one else can access your accounts without your authentication.

In the long term, setting up multi-factor authentication is a cost-effective strategy for businesses. With the average breach costing small and medium-sized businesses as much as $3.31 million, setting up company-wide MFA policies can help protect your organization’s reputation and stop the threats before they get to your doorstep. Thanks to its range, MFA can help future-proof businesses from emerging threats. For instance, users can opt for biometric authentication over one-time passwords and vice versa.

What types of multi-factor authentication does NordPass Business support?

Multi-factor authentication is tightly knit with password protection and is essential for businesses and individuals alike. So, it’s unsurprising that password managers aim to improve not just your credential storage but the way you handle MFA as well.

NordPass is a secure and intuitive password manager that’s purpose-built to facilitate smooth and secure management of passwords, passkeys, credit card details, and other sensitive information. It offers support for 3 types of multi-factor authentication:

  • An authenticator app

  • A security key

  • Backup codes

NordPass supports major authenticator apps such as Google Authenticator, Microsoft Authenticator, and Authy. However, it makes things easy for you by letting you generate and store your one-time passwords directly in your vault. NordPass Authenticator for Business allows you to set up two-factor codes alongside your passwords, eliminating the need for third-party authentication apps. You can also stay flexible, as NordPass will autofill your one-time passwords for you, whether you’re on your mobile device or desktop browser.

NordPass comes equipped with other security features that help you optimize your business credential security. With features like Password Health and Data Breach Scanner, you can ensure that all credentials used in your organization are strong and secure. Furthermore, you can set up a centralized Password Policy to enforce compliance with high security standards. Try NordPass today and see for yourself how it can help fortify your corporate security.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Anywr: enhancing cybersecurity and compliance for global teams and operations

Meet Anywr

Established in 2012, Anywr is an HR services provider specializing in global mobility and staffing solutions. Its mission is to support organizations in addressing their human resource challenges with tailored, expert-driven solutions.

 They deliver comprehensive services to assist with immigration, relocation, international mobility policies, and employer of record (EOR) solutions. Additionally, Anywr offers other services, including direct recruitment, executive search, and consulting, focusing on IT, life sciences, and recruitment process outsourcing industries. Anywr combines operational excellence with a deep commitment to customer proximity, ensuring its services are responsive, efficient, and aligned with its clients’ needs.

The company operates across 12 countries and 4 continents, with employees based in France, Spain, Belgium, Luxembourg, the Netherlands, Sweden, India, Vietnam, China, Morocco, Ivory Coast, and Canada.

The challenge of staying compliant

In a nutshell, compliance means that an organization adheres to applicable laws and regulations. This includes country-specific laws, requirements from regulatory authorities, and internal company rules.

Companies employ various tools that help facilitate compliance. One of them is a password manager, as most regulatory compliance standards require organizations to implement security measures to limit the possibility of unauthorized access. For example, GDPR, PCI DSS, GLBA, and CIS Controls have outlined guidelines for ensuring the security of personal data processing and storage.

For companies like Anywr, cybersecurity is critical as they handle a lot of personal documentation, such as for their clients’ immigration processes. That’s why they must ensure that documents like these are secured, processed, and stored following the GDPR requirements. Additionally, they have to overview multiple country-specific security regulations.

So, they started looking for a trusted password manager that would allow their employees to securely store and generate strong passwords and keep their company accounts safe.

Streamlining compliance with NordPass

NordPass’ end-to-end encryption and zero-knowledge architecture ensure the finest privacy and security standards for businesses. It offers a secure way to store and access passwords and other sensitive information in line with regulatory requirements.

To tick more boxes for the Anywr password manager needs, with the NordPass Password Generator, their employees can generate unique and strong passwords that are then safely stored in the vault that’s encrypted with the XChaCha20 encryption algorithm. The passwords are generated according to a company-wide password policy. These rules are defined with the Password Policy feature and set standards for password complexity: the use of upper- and lower-case letters, special symbols, numbers, and the minimum character limit.

So, by implementing NordPass’ company-wide password policy, Anywr has ensured a consistent and secure password standard across its global offices, which is critical for meeting regulatory compliance requirements such as GDPR.

Additionally, Anywr teams can securely share credentials if needed. They also use Shared Folders, a feature allowing users to share multiple items simultaneously. These folders are dedicated to each service and country that Anywr is located in, and hold specific IT teams’ access to that country. This ensures that different teams can share them seamlessly when needed, making cross-country and cross-team collaboration a breeze without compromising security.

Aiming for the highest security

According to Florian Laskowski, a Head of IT Operations and PMO at Anywr, the company takes cybersecurity seriously and believes it’s a continuous improvement process.

During the onboarding, Florian’s team ensures that the new employees are familiar with the security systems and explains how each application works. Additionally, the company organizes concurrent, in-depth cybersecurity training for its employees. In these trainings, they emphasize the necessity of using a password manager, highlighting that it’s not enough to just remember passwords or autosave them in the browser.

To make their employees’ lives even easier (and safer), the IT team directly implements security solutions such as NordPass directly into their chosen browsers via the company portal so they can instantly start using them.

Anywr also employs User and Group Provisioning via Microsoft Entra ID that seamlessly integrates with NordPass to ensure everything is in sync across multiple systems and applications.

Effortless cybersecurity

Florian Laskowski says that NordPass has made password management easier and safer for the company’s employees. According to him, NordPass’ Admin Panel is equally intuitive. For example, when the team needs to offboard an employee, the Admin can easily transfer the data to another employee so that important accesses don’t get lost.

 

This ease of use, coupled with top-tier security and streamlined compliance via features like Password Generator, Password Policy, and Shared Folders, has improved Anywr’s cybersecurity posture and made it a tool that employees actually use. 

So, if your company is facing similar challenges while ensuring cybersecurity and compliance posture, NordPass can help you improve security and help to meet regulatory requirements. Contact our experts today to see what NordPass can offer for your business. 

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

CORE relies on a Dedicated IP for secure work with finance and enterprise clients

Summary: For 5 years, CORE has relied on NordLayer’s Business VPN and Fixed IP to support their cybersecurity strategy, ensuring compliance with banks and other regulated industries.

Results at a glance

CORE, a UK-based digital agency, works on branding, web design, digital marketing, and paid advertising. They handle everything from strategy to development as well as hosting and ongoing digital marketing services. We spoke with Ceri Richmond, CORE’s founder and managing director, about how NordLayer helps them stay secure and compliant.

Profile of CORE

The challenge

CORE works with banks, legal firms, and other regulated clients, as well as a rich-mix of clients from other sectors. They are Cyber Essentials Plus and ISO 27001 certified, which require strict security measures.

Banks, in particular, must comply with Financial Conduct Authority (FCA) rules and European regulations. As well as at least annual audits with the various certification bodies CORE uses Financial Supplier Qualification System (FSQS) and Risk Ledger to show they meet these standards, and they undergo annual audits to stay certified.

Before hybrid work, CORE relied on its office’s fixed IP for secure connections to clients and servers and for file transfers. Moving to a hybrid model meant they needed a Business VPN and a Server with a dedicated IP to meet their own and their clients compliance requirements.

After comparing options, they chose NordLayer because of its transparent European ownership and trusted reputation.

“Some VPN providers have unclear ownership. We wanted a reliable company we could trust.”

Step 1. Simple setup with SSO

CORE needed a VPN that was quick and easy to implement.

They use Google accounts, so new hires log in with their Google ID, which integrates directly with NordLayer. This reduces the need for extra credentials. Two-factor authentication and other measures are enabled through Google for added security.

Setting up a new user is straightforward:

  • Install NordLayer
  • Assign the user
  • Connect

Step 2. Virtual fixed IP

CORE uses NordLayer to recreate their office’s fixed IP in the cloud. This allows remote workers to securely access systems, replacing the old office-based model. This setup is crucial for hybrid work.

NordLayer Virtual Private Gateway

Step 3: Fixed IP for client data transfers

Many of CORE’s clients require access to shared resources restricted to specific IPs.

With NordLayer’s Server with a dedicated IP, CORE ensures secure, reliable connections that meet their own and their client’s firewall requirements. This is critical when working with sensitive data, especially in the financial sector.

NordLayer Server with a dedicated IP

Step 4: Dashboards for better control

CORE uses NordLayer’s Dashboards to monitor connections and confirm that only authorized users access their systems. This helps them stay compliant with their ISO 27001 ISMS (Information Security Management System) and maintain strong security practices.

“NordLayer doesn’t make certification automatic, but it’s an important part of our ISMS.”

NordLayer Dashboards

Step 5: Future plans for network segmentation

CORE plans to introduce network segmentation to assign different access levels for teams, such as developers and designers. This will give them more control over who can access specific resources while keeping the VPN in use across the company.

NordLayer Cloud Firewall

Why NordLayer works for CORE

CORE has trusted NordLayer for five years. They test other options every two years but renewed their contract in 2024 after finding NordLayer still the best choice for their needs and against the other main competitors in the VPN space.

  1. Ease of use
    Setting up the VPN is quick, and employees rarely face issues
  2. Fixed IP control
    Clients need IPs in specific locations, and NordLayer delivers
  3. Mac compatibility
    As a Mac-based company, CORE finds NordLayer’s app more user-friendly than others

“Other VPN apps feel outdated. NordLayer works smoothly without causing support headaches.”

Adding a new employee takes just 10 minutes:

“It’s simple. Part of onboarding is setting up NordLayer, and it’s done quickly.”

Pro cybersecurity tips from CORE

CORE combines an ISO 27001 training program with a strong focus on continued learning and awareness. Ceri emphasises that staying informed is essential, especially as cyber threats are constantly evolving.

Quote by Ceri Richmond

Regular training ensures everyone, regardless of experience, stays sharp and prepared for evolving threats.

Conclusion

CORE protects sensitive client data with NordLayer’s Server with a dedicated IP. This solution supports their hybrid work model and helps them meet compliance requirements for industries like banking and finance. With NordLayer, they ensure secure connections for their team and clients.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Zettasecure: coupling a password manager with XDR for extra client security

Meet Zettasecure

Zettasecure GmbH is a cybersecurity consulting firm based in Vienna, Austria. It specializes in cybersecurity services for small and midsize businesses.

Founded in 2020, Zettasecure was driven by Philipp Mandl’s experience in a large enterprise security operations center (SOC). After successfully building and managing a SOC, he saw an opportunity to create a similar service offering comprehensive security solutions with the expertise he had gained.

The company also provides a managed SOC for continuous monitoring and tailored cybersecurity support, mitigating threats affordably and without relying on high-cost solutions. Currently, they cater mainly to German-speaking countries, such as Switzerland, Germany, and Austria.

Password managers matter as much as antivirus systems

From his experience as an MSSP, Philipp Mandl finds that companies often believe that if they already have antivirus software, for example, they are cybersecure. However, sound password management is a necessity equivalent to an antivirus or firewall system—without it, the company won’t be as secure. After all, password managers are a best practice to comply with NIS2 requirements.

One of Zettasecure’s first clients in need of a password manager came to them with a unique challenge: they wanted not only a centralized and intuitive password management tool but also one that would allow them to get notified in real time when data loss occurred. In other words, they wanted to know if a malicious IP had logged into the password manager and was now trying to copy all the passwords as fast as possible, or to share them with multiple sources that shouldn’t be shared per company rules.

As their MSSP, Zettasecure was happy to offer a solution: NordPass, a password manager that has a centralized and smooth user onboarding and offboarding that the IT team manages through the NordPass Admin Panel.

 

“We came to NordPass for a solution because we knew it had an Activity Log API that we are now utilizing for this specific use case. We use the Activity Log data from our customers and us, push it to the XDR platform from our customers and our side, and then analyze it.“

Philipp Mandl,

CEO of Zettasecure

Additionally, NordPass provides an Activity Log API that became a holy grail for this client’s use case. The Activity Log API is a NordPass Enterprise feature that helps companies manage employee access and monitor the organization’s activities. Zettasecure coupled this feature with XDR (extended detection and response) by pushing the data collected via the Activity Log API to SIEM so they could:

  • Get an alert or set an automation rule on a third-party tool

  • Get notified about user activity outside of working hours

  • Automate emails/messages to a user who hasn’t used NordPass in X days.

This works similarly if a threat actor is within the company and tries to search for specific passwords or copy them from NordPass as quickly as possible. Zettasecure noted that if a user is excessively viewing or copying passwords from NordPass, they mark it as malicious via the XDR platform, so that the company can automatically tackle this threat actor by locking down their computer and investigating what’s happening.

The CEO of Zettasecure believes that NordPass and the XDR solution have become a perfect fit that he can now offer to his customers and happily uses at his own company.

Sharing passwords in a secure way

The other Zettasecure client faced yet another challenge. This company is in the transportation business and was looking for a way to share passwords safely among their teams. Namely, they have several departments, like legal and finance, that use certain shared accounts.

NordPass came through as a tool that was just right for their needs. With Shared Folders, employees can now easily share passwords in bulk and have all the necessary access at hand by simply autofilling credentials when needed. This eased the company’s stress on handling access quickly and securely among the teams.

In addition, NordPass provided the company with other great benefits that further improved its security and convenience. For instance, it allows the client to see who has access to what accounts in the company via the Admin Panel, helping to streamline compliance. Additionally, when an employee is offboarding, the company can quickly transfer data to their colleague, so no access is ever lost.

A password manager helps to save companies’ money

Sometimes, convincing people that they need an additional app to manage only their company’s passwords can be hard. After all, they already use a built-in browser password manager, and it’s already there.

However, Philipp Mandl believes this line of thought is a big issue: a built-in browser password manager doesn’t help a company see possible cyber threats coming their way, which can have devastating consequences. For example, such password managers are particularly vulnerable to malware attacks: when malware appears on the device, it simply copies browser cookies and their stored passwords.

 

“I think the problem is that most people are using an in-built browser password manager, and that’s a big issue that can have devastating consequences. For example, such browser password managers are particularly vulnerable to malware attacks. So when malware appears on the device, it simply copies browser cookies, and then cybercriminals can sell that copied information on the darknet market. This valuable info can later be used for hacking the said company with credential spoofing.”

Philipp Mandl,

CEO of Zettasecure

And there’s always a human error: most data breaches occur when someone accidentally enters their credentials on a phishing website, which is then leaked on the darknet. That’s why it’s crucial to invest in a dedicated password manager.

So, it’s no surprise that the most used NordPass feature among Zettasecure clients is the Data Breach Scanner. It allows companies to catch whether any of their email domains or passwords have ever appeared in a data breach. If such data is ever found in a data breach, the company gets timely alerts so they can act quickly to mitigate the cyber threats. NordPass includes the Data Breach Scanner in all of its Business plans without any additional cost.

inner asset zettasecure msp case study

Philipp says that it allows their customers to save thousands of euros if they notice that their data appeared in a breach so they can act proactively to prevent their credentials from ending up on the dark web. MSSPs, as Zettasecure, can also monitor the security health of their end-users through the MSP Admin Panel and alter their clients if needed.

A password manager fit for an MSSP

When choosing which password manager to partner with, there were a few decisions why Zettasecure chose NordPass:

  • Zero-knowledge architecture: NordPass’ end-to-end encryption and zero-knowledge architecture ensure the finest privacy and security standards for MSPs and their clients.

  • Activity Log API helps manage client employee access and monitor company activities. For extra security, MSPs can effortlessly import data collected through the Activity Log API into SIEM and then use XDR, a technology that collects and automatically correlates data across multiple layers of security. This enables alerts and immediate response in case of a cyber threat.

  • Data Breach Scanner scans the dark web for data breaches involving the client company’s email domains or passwords. If such data is ever found, the client receives a timely alert. This tool is included in all Business plans.

  • No hidden costs: NordPass has transparent pricing across all Business tiers for MSPs and their clients.

    So, if you are looking for a way to improve your clients’ security, please reach out to our experts today to learn more about NordPass for MSPs.

 

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×