Skip to content

runZero Accelerates European Growth Through Strategic Partnership with Aqaio

German Cybersecurity Specialist Appointed as Primary Distributor for runZero to Drive Expansion in the DACH-Region #

London, United Kingdom – July 24, 2025 – runZero, a leader in exposure management, today announced a strategic partnership with Aqaio, a German value-added distributor specializing in advanced IT security solutions. As runZero’s primary channel partner in Germany, Aqaio will spearhead regional growth efforts by delivering runZero’s expanded exposure management platform to organizations navigating today’s increasingly complex cyber threat landscape.

This alliance represents a significant milestone in runZero’s wider EMEA growth strategy. Leveraging Aqaio’s deep market expertise and established channel network, runZero can now accelerate its European expansion while offering localized support tailored to the specific needs of German organizations.

Partnership highlights include:

  • Localized Expertise: Aqaio brings in-depth knowledge of the German cybersecurity market, enabling specialized customer engagement and faster time-to-value.
  • Expanded Channel Reach: A top-tier network of resellers and systems integrators gain access to runZero’s powerful exposure management platform, enabling them to offer comprehensive proactive cyber defense to their end customers.
  • Streamlined Distribution and Support: Aqaio will facilitate seamless implementation via dedicated consulting, logistics, and certified training services for partners and end users.

“This partnership with runZero is a strategic win for our channel ecosystem,” said Richard Hellmeier, CEO at Aqaio. “They are no longer selling just another product — they’re delivering a vital capability. runZero’s technology is fast to deploy, easy to integrate, and solves a foundational security challenge. It aligns perfectly with our mission to deliver holistic and forward-looking solutions to the market.”

“In today’s rapidly shifting threat landscape, partnerships like this are essential to delivering resilient, scalable cybersecurity,” said Joe Taborek, Chief Revenue Officer at runZero. “Aqaio’s proven expertise and reach across the German market empower us to extend access to the runZero Platform and strengthen cyber readiness from the ground up. Together, we’re helping build a safer, smarter digital future.”

About Aqaio

Aqaio partners with resellers, system integrators, and OEMs. We focus on new technological developments, which we supplement and expand with complementary solutions from market and technology leaders in the IT security field. We also provide 2nd level support and training for our partners and their end-customers. The product portfolio consists of high-end IT products that complement each other and can be combined to create integrated solutions. Additionally, Aqaio offers services such as consulting, marketing support, logistics, training, and technical support. For more information, visit: https://aqaio.com/

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Identity Security Intelligence: Why Identity Discovery is the Bedrock of Modern Risk Management

Blind spots in identity are today’s biggest security risk. Here’s how to fix them.

In today’s hyper-connected and threat-saturated digital landscape, one truth is rapidly becoming self-evident to defenders across every industry: identity is the new perimeter, and access is the new security. As traditional network boundaries dissolve in favor of hybrid and cloud-first infrastructures, adversaries are increasingly pivoting toward the exploitation of identities—privileged accounts, service identities, orphaned users, misconfigured roles—as the primary path to breach and move laterally within environments.

But here’s the catch: you can’t protect what you don’t know exists. This is where Identity Security Intelligence becomes not just useful but essential. And at the core of that intelligence lies a foundational capability: Identity Discovery.

What is Identity Security Intelligence?

Identity Security Intelligence (ISI) is the ability to aggregate, analyze, and act on data about identities, their associated roles, privileges, behaviors, and risks across the entirety of an organization’s infrastructure—from on-premises directories to SaaS applications and multi-cloud platforms.

Think of it as the intersection between Identity and Access Management (IAM), risk analytics, and threat detection. It’s not just about managing identities; it’s about understanding them deeply—who they are, what they can do, where they exist, and how they behave over time.

The Foundation: Identity Discovery

Before an organization can reason intelligently about identity risk, it must first discover all identities that exist across its environment. This includes:

  • Traditional/On-Prem Identities: Users in Active Directory, service accounts in legacy apps, local admin accounts on servers, etc.
  • Cloud Identities: Identities in Azure AD, AWS IAM users and roles, Google Workspace users, cloud-native service principals, API keys, containers, and ephemeral workloads.
  • Shadow and Orphaned Identities: Legacy accounts no longer linked to active users, leftover access from decommissioned applications, services, and mismanaged credentials hiding in infrastructure-as-code.

A robust Identity Discovery capability surfaces all these identities, —whether they’re centralized or scattered, active or dormant, human or non-human.

Why Identity Discovery is Challenging (Yet So Crucial)

The complexity arises from the fact that identity is now distributed. No longer tethered to one central directory, identities live in different silos across multiple environments and systems. Each cloud provider has its own model. Each SaaS app may define roles and entitlements differently. Each legacy system might still have its own local accounts.

This fragmented landscape creates massive blind spots:

  • Privileged accounts in cloud environments that bypass central logging.
  • Orphaned identities with persistent access to sensitive data.
  • Service accounts with excessive, never-reviewed permissions.
  • Redundant roles due to M&A, org restructuring, or tool proliferation.

Without discovery, these blind spots can easily lead to compromised credentials.

Beyond Inventory: Discovering Roles, Privileges, and Entitlements

Discovery doesn’t stop at listing accounts. To enable true security intelligence, you must also map the roles, privileges, and entitlements tied to each identity.

This means answering questions like:

  • What can this identity do?
  • Where can it go?
  • What data can it access?
  • What systems does it control?
  • Are these privileges aligned with its purpose?

For example, discovering an AWS IAM user is useful. But understanding that the user has AdministratorAccess across multiple production accounts—and the account hasn’t logged in for 90 days—is critical.

Or take an identity in Microsoft 365 that has full mailbox access across HR, Finance, and Legal departments. Is that intended? Necessary? Or a remnant of an old project no one cleaned up?

Mapping these entitlements and privilege chains across your hybrid estate helps you:

  • Identify toxic combinations of access.
  • Enforce the principle of least privilege.
  • Detect privilege escalation paths.
  • Uncover misconfigurations before attackers do.

Identity Risk: The Unseen Attack Surface

The more fragmented and complex your identity environment, the greater your exposure. Attackers thrive in this chaos.

From techniques like Kerberoasting, Golden SAML, and token theft, to exploiting cloud misconfigurations and unused admin roles, modern adversaries are experts at chaining together identity weaknesses and misconfigurations.

By contrast, organizations that maintain a comprehensive view of identity risk across the board can:

  • Detect anomalous behavior in context (e.g., a service account accessing finance systems for the first time).
  • Shut down dormant or orphaned accounts.
  • Flag privilege drift over time.
  • Simulate attack paths based on current entitlements.
  • Proactively remediate risk without waiting for incidents.

What Makes Identity Security Intelligence Actionable?

Let’s be clear: data alone is not intelligence. Intelligence emerges when data is correlated, contextualized, and operationalized.

An effective Identity Security Intelligence program must provide:

  • Continuous Discovery: Real-time or near-real-time visibility into new, removed, or changed identities.
  • Entitlement Mapping: Deep visibility into fine-grained privileges across cloud and on-prem environments.
  • Risk Analytics: Automated scoring based on behavior, privilege level, and exposure.
  • Historical Context: Identity behavior over time—who did what, when, and whether it deviated from the norm.
  • Integrations: Feeds into SIEM, SOAR, and IAM/PAM platforms for proactive and reactive response.

This turns identity data into strategic insight—fuel for critical decisions in security operations, compliance, audits, and incident response.

Getting Started: Build Your Identity Intelligence Baseline

If your organization is just starting down this path, here’s a basic roadmap:

  1. Inventory all identities—human, service, machine—across on-prem and cloud.
  2. Map entitlements for each identity across applications, infrastructure, and data.
  3. Assess privilege levels and compare against business needs and least privilege standards.
  4. Identify toxic combinations—privilege escalations, cross-boundary access, unused high-risk roles.
  5. Establish continuous discovery and monitoring, not just point-in-time scans.
  6. Feed this intelligence into your risk models and threat detection systems.

The Bottom Line

In the same way that endpoint detection changed the game a decade ago, Identity Security Intelligence is becoming table stakes for defending against modern threats. Attackers know that identity is the weakest link in many organizations. Our job as defenders is to turn it into a strength.

By investing in identity discovery—including deep insight into roles, entitlements, and privileges—you build a clear, contextual picture of your true identity surface. Only then can you manage it, reduce it, and defend it with confidence.

In a world where credentials are more valuable than malware, identity intelligence isn’t just good hygiene—it’s your first line of defense.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

More visibility to admins: Failed Logins data and revamped Dashboards

Summary: NordLayer’s new Failed Logins data and revamped Dashboards offer instant visibility, detailed logs, and clearer insights to enhance proactive threat detection.

Every access attempt to your network is significant—and quickly detecting unusual patterns can be critical for protecting your organization’s sensitive data. While occasional failed logins are normal, a sudden surge in login attempts can indicate brute-force attacks, signaling that someone may be trying to gain unauthorized access.

At NordLayer, we’re committed to protecting what matters most to your business while keeping security simple to manage. That’s why we continue to improve the Control Panel, which gives IT teams greater visibility and monitoring capabilities. These updates are part of our mission to provide layered, proactive protection without disrupting daily operations, helping you stay ahead of modern risks with confidence.

Instant visibility with the Failed Logins data

We’re introducing powerful new Failed Logins data within your Control Panel’s Dashboards section. It provides an overview of suspicious or unauthorized access attempts across your NordLayer Control Panel, apps, and Browser Extension—whether users log in via SSO or email/password, with or without 2FA.

Now, you’ll find a dedicated Failed Logins widget and graph that offers visibility into:

  • The number of attempts to log in within 24 hours
  • Trends that might indicate a targeted brute force attack
  • Anomalies that require your immediate attention
NordLayer Dashboards Security category displaying Failed Logins widget and graph, and the percentage of 2FA enablement

This instant insight helps you spot potential threats early, allowing you to stay in control and act before issues escalate. It’s a proactive approach to mitigating security risks.

Activity section upgrade—detailed Failed Logins log

To complement the Dashboards feature, we’ve also improved the Activity section. Now, a detailed Failed Logins log is available, providing 24-hour data and granular context for each unsuccessful access attempt.

NordLayer Control Panel showing Failed Logins log for monitoring suspicious login attempts

This comprehensive log equips IT admins with crucial information, including:

  • Name and email—who attempted to log in
  • Exact date and time—when the attempt occurred
  • Device IP address—the location of the attempt
  • Device or browser Information—what was used
  • Login method—SSO or email and password
  • Failure reason—which part of the login process failed
  • Number of failed attempts (per session)—to identify persistent efforts
  • Role (owner, member, etc.)—context about the user’s permissions
  • Status of the user—active, invited, etc

This level of visibility empowers your team to react faster to anomalies, investigate suspicious patterns thoroughly, and strengthens your overall threat response strategy with confidence.

By analyzing these patterns, admins can detect anomalies in user behavior, which may indicate brute force attacks, compromised accounts, or insider threats.

Dashboards overview

Beyond the new Failed Logins data, our redesigned Dashboards experience makes your security and usage insights clearer and more actionable.

Your NordLayer Dashboards continue to offer a wealth of valuable information, including:

  • User activity. Monitor who is connecting, when, and from where.
  • Throughput usage. Track data consumption across your network.
  • Server load. Keep an eye on performance and optimize resource allocation.
  • Connection trends. Understand network patterns and peak usage times.

These insights are vital for optimizing network performance, managing user access, and maintaining a robust security posture, all from a centralized control point.

Usage vs. Security categories

We’re restructuring the dashboard to improve clarity and streamline your experience. You’ll now find insights clearly grouped under two new, intuitive categories: Usage and Security.

NordLayer Dashboards displaying Usage category with network activity, such as Active sessions during the last seven days

Usage

This section provides an overview of network activity, throughput consumption, and user engagement, helping you manage resources efficiently. You’ll still find familiar visualizations, including:

  • Graphs for sessions, protocols, server bandwidth
  • Donut charts for device OS distribution, browser type distribution, and NordLayer client versions

Security

This new dedicated section consolidates all critical security-related data, including the new Failed Logins data, threat alerts, compliance-related metrics, and 2FA enablement percentages. This clear separation ensures that your most vital security information is easily accessible, allowing for rapid assessment and decision-making.

The new structure not only simplifies navigation but also makes it easier to focus on specific areas of your network’s performance and security health.

Why it matters

These updates are more than just new additions; they’re about giving IT admins and organization owners better visibility and monitoring capabilities for proactive security and streamlined operations.

  1. Monitor failed logins to instantly spot potential unauthorized access attempts or brute-force attacks, helping mitigate security risks before they escalate.
  2. Gain deeper insights into user behavior patterns to detect anomalies indicating compromised accounts or insider threats.
  3. Enforce stricter access controls and align with Zero Trust principles by continually verifying access based on failed login data. This allows you to quickly implement additional authentication measures or adjust permissions when suspicious activity is detected.
  4. When a spike in failed logins occurs, quickly investigate, block suspicious IPs, or temporarily suspend accounts, reducing response time and minimizing exposure.
  5. Contribute to audit trails with detailed logs of failed login attempts for compliance with regulations like GDPR and HIPAA, fostering accountability and demonstrating due diligence.
  6. Highlight areas where users might need additional training on password management or where access policies require refinement, such as implementing MFA for frequent failures.

By providing clear, actionable intelligence, NordLayer helps your organization detect threats early, stay in control, and act before issues escalate into significant incidents.

Final thoughts

The new Failed Logins data and the redesigned Dashboards experience represent a significant step forward in improving your cybersecurity with NordLayer. These tools will give you greater peace of mind and more effective control over your network’s security, empowering you to manage complex challenges with greater efficiency.

We encourage you to log into your Control Panel today, explore the new Dashboards categories, and use the data to strengthen your threat detection and response strategies.

Your proactive security journey just got a powerful upgrade.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Penta Security 實現「三連冠」,連續第三年榮獲 Frost & Sullivan 年度 WAF 公司大獎

Penta Security 實現「三連冠」,連續第三年榮獲 Frost & Sullivan 年度 WAF 公司大獎

此項殊榮彰顯了 Penta Security 旗下先進 WAAP 解決方案 WAPPLES 及 Cloudbric WAF+ 的市場領導地位。

全球研究機構 Frost & Sullivan 連續第三年將 Penta Security 評選為「2025 年度南韓網站應用程式防火牆(WAF)產業最佳公司」。這項享負盛名的獎項旨在表彰在領導能力、技術創新及客戶價值方面持續表現卓越的企業。

Frost & Sullivan 是一家擁有超過 60 年歷史的公司,透過深入分析來評選出各行業的領先企業。Penta Security 因其提供穩健且安全的解決方案,滿足了快速發展的雲端安全市場中客戶的多樣化需求而備受肯定。

這份持續的肯定源於我們對新一代網站安全的承諾,而這份承諾體現在我們的兩款旗艦解決方案中:

  • WAPPLES(為企業打造的智慧型 WAAP)

    WAPPLES 是傳統 WAF 的進化版,一款基於雲端原生架構的先進網站應用程式與 API 保護(WAAP)解決方案。其專有的智慧偵測引擎 COCEP,能針對新興的攻擊模式提供即時防禦。WAPPLES 已連續 17 年在韓國 WAF 領域保持市場佔有率第一。

  • Cloudbric WAF+(易於存取的一站式網站安全)

    作為韓國首個安全即服務(SECaaS)平台,Cloudbric WAF+ 透過 DNS 重新導向即可實現即時部署。它將 WAF、惡意機器人緩解、DDoS 防護等功能整合到一個為各種規模企業設計的直觀平台中。

此獎項證明了 Penta Security 的技術不僅是韓國國內的領導者,其創新實力也獲得了全球的認可。我們將繼續致力於建立一個更安全的未來,並以值得信賴的安全效能和經實證的品質作為後盾。

 

About Penta Security

Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Looking for help? Here’s how you can contact NordPass Support

Where and how to contact NordPass

At NordPass, we offer several methods for clients to find answers and resolve issues — our dedicated Help Center, live chat, and subreddit.

Please keep in mind that NordPass does not offer customer support over the phone. Any parties claiming to provide phone support for NordPass or any other Nord Security product are fraudulent.

We’re aware that scammers sometimes attempt to impersonate our team and trick users into revealing their passwords, payment details, and other personal information. To ensure your safety while using NordPass and to successfully guide you through our product, here are the official ways you can get in touch with the NordPass team.

Help Center

The NordPass Help Center is an information hub for all Personal and Business clients. It contains all the information you need to get started with our password manager. From creating your account and selecting a plan to managing advanced security features — we’ve covered it all.

The Help Center is split into two directories — Personal and Business. They cover features specific to each plan. You can browse the topics based on categories like “Getting started,” “Account management,” and “Troubleshooting,” or you can use the search function to look up a specific question.

Under each Help Center article, you can submit a request or launch our live chat to get more assistance.

Live chat

For urgent issues, we offer live chat support. To contact us, select “Chat with us” on our Support page. An agent will respond to your inquiry and help you quickly resolve your issue. You can find the option to access live chat support under all articles in our Help Center.

Reddit

If you’re unsure which channel to use or want to share suggestions for our product, you’re always welcome to join our Reddit community. The NordPass subreddit is a place to discuss features and product experience with other users, join AMA sessions, report issues, and receive assistance with any questions you might have.

How to spot and report unofficial and fake support services

The four communication methods listed above are the main ways you can contact NordPass for product assistance. There are no other official channels, and we will alert users if and when we introduce other ways to get in touch with our team. We do not offer assistance via postal mail or phone. Please ensure that the communication channels you use are listed on the official NordPass website, and do not share your login details with anyone.

Although NordPass occasionally sends email correspondence, we will never ask you to provide sensitive personal information via email. NordPass or Nord Security will never ask for your Nord Account login credentials or your Master Password. Any party that requests direct access to your account or claims to be able to see your login credentials is committing fraud.

If you suspect someone is pretending to be NordPass Support or have noticed a scam, you can report these instances to our Support team or share them on the NordPass subreddit.

The official NordPass social media accounts are on Facebook, Reddit, X, Instagram, YouTube, LinkedIn, and Bluesky. Any other accounts are fraudulent and should be reported.

 

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×