Skip to content

Big news at Parallels! Parallels Awingu is now Parallels Secure Workspace!

Your favorite secure, unified workspace tool has a new name! Parallels Awingu is now Parallels Secure Workspace.

Introducing Parallels Secure Workspace

Previously known as Parallels Awingu, the shift to Parallels Secure Workspace signifies our solution’s integral role in the greater Parallels family of products.

While the name is changing, the product itself isn’t—and you can expect the same features, functionality, and performance you know and love.

Already have Parallels Awingu? No action is required for existing users. New installations and updates will now carry the new name and branding. New users can purchase or download a free trial now!

Secure remote access anywhere, any time

Security breaches have become commonplace, and it’s a lot for even the most skilled and experienced IT admins and managers to handle.

In a recent cybersecurity report, 41% of IT professionals reported security breaches in the past year alone. That’s alarming—and emphasizes the pressing market need for secure and user-friendly access wherever, whenever, and however your employees work. Parallels Secure Workspace is part of the solution.

What is Parallels Secure Workspace?

Parallels Secure Workspace originated as Awingu in Belgium in 2011. It quickly became known as an innovative product pioneering a “clientless” approach, operating entirely with the HTML5 web browser of the user’s choice, making it a secure alternative to traditional VPNs.

It offers seamless access to virtual apps, desktops, files, SaaS applications, and cloud storage across all devices. IT admins and end users alike enjoy its intuitiveness and rapid deployment capabilities.

In 2022, Alludo acquired Awingu, and the technology has perfectly aligned with and enhanced our efforts to bridge security and convenience.

Updates to the Parallels Partner Program

Are you already a Parallels partner, or thinking of becoming one?

Then you can learn more about Parallels Secure Workspace and access valuable training opportunities through the partner portal with our new Parallels Secure Workspace certification courses.

These courses are free of charge and offer partners an easy and fast way to enhance their skills and knowledge in order to better deliver exceptional solutions and services to their customers.

Check out Parallels Secure Workspace for yourself

If you have yet to experience Parallels Secure Workspace under its previous name of Parallels Awingu, then now is the time to try it.

Parallels Secure Workspace caters to mid-sized enterprises and large corporations, supporting Zero Trust security initiatives, secure BYOD programs, remote work setups, and controlled contractor access.

Want to learn more? Visit the Parallels Secure Workspace website for information on how to try Parallels Secure Workspace and explore the boundless, secure, and convenient future of work.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

Zero Trust strategy: Why RBI is the superior defense for today’s workforce

In the current digital landscape, remote work and Bring Your Own Device (BYOD) policies are the new normal.

These paradigms offer flexibility but also expose organizations to cybersecurity risks.

A robust zero-trust strategy is paramount, and it should include remote browser isolation (RBI) technology as a core component to protect remote and BYOD workforces effectively.

This article explores why remote browser isolation surpasses phishing training in terms of effectiveness and insights into budget allocation for enhanced security.

Ready to start your journey towards Zero Trust, including remote browser isolation? Start your free trial of Parallels RAS now!

The surging growth of malicious links

The sheer vastness of the internet has enabled the proliferation of malicious links.

It’s essential to consider some key statistics to appreciate the significance of remote browser isolation.

  • Phishing attacks on the rise: In 2021, the Anti-Phishing Working Group (APWG) reported a 22.3% increase in phishing attacks compared to the previous year. With the continuing prevalence of remote work, this trend is expected to persist and intensify.
  • Exploiting post-pandemic fears: The COVID-19 pandemic created fertile ground for cybercriminals. According to Check Point research, Corona-virus related domains were 50% more likely to be a threat than other domains, harboring malicious links aimed at stealing sensitive information.
  • Zero-day vulnerabilities: In March 2023, Mandiant’s research revealed a remarkable year over year increase in zero-day vulnerabilities. These vulnerabilities are often exploited via malicious links, underscoring the urgency of proactive security measures.

The evolving complexity of phishing attacks

Phishing attacks have evolved from simple schemes to highly sophisticated and cunning tactics. Here’s why remote browser isolation stands out as a superior solution:

  • Spear phishing prevalence: Verizon’s 2021 Data Breach Investigations Report revealed that 36% of data breaches involved phishing attacks. Spear phishing, a highly targeted form of phishing, accounted for only 4% of these attacks but resulted in a staggering 36% of the breaches. Remote workers and BYOD users are particularly vulnerable to these personalized attacks.
  • Evasive techniques: Hackers increasingly use tactics like obfuscating malicious URLs and payloads to bypass traditional security measures. A remote browser isolation solution is vital for containing and neutralizing these threats by executing web content outside the user’s device.
  • Zero Trust approach: A zero trust strategy adheres to the principle of “never trust, always verify.” Remote browser isolation aligns seamlessly with this philosophy by treating all web content as untrusted, regardless of its source. This ensures that even if a user encounters a malicious link inadvertently, their device remains unharmed.

Why remote browser isolation outshines phishing training

While phishing training programs have their merits, remote browser isolation technology offers a more effective route to technical control. Here’s why:

  • Human error mitigation: Phishing training primarily educates users to identify malicious links. However, human error remains a significant factor. Employees can still fall victim to increasingly sophisticated attacks. On the other hand, remote browser isolation acts as a proactive barrier, eliminating the risk of human error altogether.
  • Real-time protection: Training programs can be effective but often lag behind emerging threats. Remote browser isolation provides real-time protection by isolating potentially harmful web content, ensuring immediate threat containment without relying on user awareness.
  • Resource allocation: Many organizations allocate substantial budgets for phishing training, but its efficacy can vary. Redirecting some of these resources toward implementing remote browser isolation can yield a more robust security posture and better protect against a wide range of threats.

Data security budget allocation considerations

While budgets for phishing training programs can vary widely, a significant portion of this budget should be reallocated toward implementing remote browser isolation.

Here are some factors to consider:

  • Cost-effective solution: Remote browser isolation solutions often offer cost-effective licensing models, making them accessible for organizations of all sizes.
  • Reduced incident response costs: Investing in remote browser isolation can lead to fewer security incidents, ultimately reducing the costs associated with breach response, investigation, and remediation.
  • Risk reduction: The cost of a successful phishing attack can be substantial, including data breaches, regulatory fines, and reputational damage. Allocating funds toward proactive security measures like remote browser isolation can substantially reduce these risks.

Why is RBI an integral part of an effective Zero Trust Security strategy

The growing threat landscape of malicious links and the increasing sophistication of phishing attacks necessitate a zero-trust strategy for organizations with remote and BYOD workforces.

Remote browser isolation technology is superior to phishing training for safeguarding against evolving threats.

By reallocating a portion of the budget typically earmarked for training, organizations can bolster their defenses and achieve higher security resilience in the digital age.

Ready to implement a Zero Trust strategy that encompasses RBI at your organization? Get your full-featured free trial of Parallels RAS now!

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

An optimal technology stack for SMBs: fortifying your business in today’s world

In today’s fiercely competitive business environment, small and mid-sized businesses (SMBs) must be agile and resilient— and fortify themselves against security risks. Crafting the right technology stack is critical to achieving these objectives. In this blog post, I’ll explore an optimal technology stack for SMBs, encompassing cutting-edge solutions like remote browser isolation (RBI), cloud computing, Zero Trust Network Access (ZTNA), and more. loud computing, Zero Trust Network Access (ZTNA), and more. I’ll also delve into how these technologies address today’s major threat vectors, including phishing, weak passwords, remote work, and lateral movement by threat actors. Discover how Parallels RAS can help your business — download your free trial now!

Cloud computing: the foundation of security

Building your technology stack on cloud computing provides a solid foundation for addressing various threat vectors. Cloud service providers like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) offer robust security measures, including data encryption, threat detection, and identity access management. Here are some of the most common threat vectors and how cloud computing addresses them:
  • Phishing: Cloud-based email security solutions can identify and filter out phishing emails, preventing employees from falling victim to these attacks.
  • Bad passwords: Implementing multi-factor authentication (MFA) within your cloud environment enhances security by requiring additional verification beyond passwords.
  • Remote work: Cloud-based applications and data allow for secure remote access, and cloud providers ensure data encryption and security in transit.
  • Lateral movement: Proper cloud configuration and access controls reduce the risk of unauthorized lateral movement within the cloud environment.

Zero Trust Network Access (ZTNA)

In the era of remote work and evolving threats, the Zero Trust model is indispensable. ZTNA or Zero Trust Network Access models assume that no one, whether inside or outside the organization, can be trusted until their identity and device are verified. This approach is pivotal in safeguarding against the lateral movement of threat actors. Here is how ZTNA addresses various common threat vectors:
  • Phishing: ZTNA ensures that even if an employee’s credentials are compromised, access is only granted after further verification, reducing the risk of phishing attacks.
  • Bad passwords: Strong authentication policies enforced by ZTNA mitigate the impact of weak passwords.
  • Remote work: ZTNA secures remote access by requiring verification for each session, regardless of the user’s location.
  • Lateral movement: By segmenting access and verifying users and devices at every step, ZTNA reduces the risk of lateral movement by threat actors.

Remote Browser Isolation (RBI)

Phishing attacks often target web browsers, making remote browser isolation a game-changer. RBI or remote browser isolation technology keeps web browsing activities away from the local device, preventing malware and malicious code from infiltrating your network. How remote browser isolation addresses today’s major threat vectors:
  • Phishing: Remote browser isolation ensures that even if an employee clicks on a malicious link, the threat remains isolated in a remote environment, unable to access your network.
  • Bad passwords: Remote browser isolation can also protect against keyloggers, which are often used to steal passwords.
  • Remote work: With employees working from various locations, remote browser isolation provides an added layer of security for web browsing, reducing the risk of malware infections.
  • Lateral movement: Isolating web browsing activities further mitigates the risk of lateral movement via compromised web content.

Business digitization and collaboration

To effectively combat threats, SMBs must embrace digitization and collaboration tools. Modern collaboration platforms like Microsoft Teams and Slack, integrated into your technology stack, facilitate secure communication and collaboration among remote teams. Here’s business digitation and collaboration technologies can protect you against various common threat vectors:
  • Phishing: Collaboration platforms enable employees to verify suspicious emails with colleagues before taking any action, reducing the chances of falling for phishing attempts.
  • Bad passwords: Encourage the use of password managers and MFA within collaboration tools to fortify password security.
  • Remote work: Collaboration platforms centralize communication, making it easier for remote teams to collaborate securely.
  • Lateral movement: With centralized communication and access controls, collaboration platforms limit the potential for lateral movement by threat actors.
In conclusion, constructing an optimal technology stack for SMBs is a strategic move in today’s digital landscape. Cloud computing, ZTNA, remote browser isolation, and collaboration tools collectively address major threat vectors, fortifying your business against phishing attacks, weak passwords, remote work challenges, and the lateral movement of threat actors. By adopting these technologies, SMBs can not only protect their assets but also position themselves for growth and resilience in an ever-evolving threat landscape. See how you can protect your business and set yourself for success in 2024 (and beyond) with Parallels RAS. Try it now Did you enjoy this post? Check out Dr. Zero Trust’s previous blog posts on Zero Trust strategies, remote browser isolation, and more.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

Parallels Awingu introduces version 5.5

On June 21st 2023, we released Parallels Awingu 5.5!. The latest version of our secure unified workspace offers enhanced security options and other innovations that further enrich your investment.

What is available in this release and why should you upgrade to Parallels Awingu 5.5?

The key features delivered in Parallels Awingu 5.5 focus on security and maintenance.

New certificate settings for external HTTPS requests

Starting with Parallels Awingu 5.5, customers are now able to have granular control on the certificates used for external HTTPS requests used by the following features: audit logging, reverse proxied web applications, WebDAV with SSL, and SSO metadata.

External requests can now be granularly controlled by verifying identity and only allowing trusted services, or deliberately choosing to allow the connection to an unverified/untrusted service. In addition, administrators can now add certificates for identity verification.

Organizations that rely on internal certificates issued by internal certificate authorities or self-signed certificates can use such certificates for the HTTPS requests to external services. In addition, administrators can manage those requests either by allowing or disallowing external HTTP requests to internal services.

Maintenance

As with most minor releases, bug fixes are included in this release. If you previously reported issues to Parallels Awingu technical support that were deemed to be bugs, they have likely been remedied as part of this release. Find an overview of all changes in the Parallels Awingu 5.5 release notes.

Upgrading to Parallels Awingu 5.5

Parallels Awingu 5.3 and earlier are no longer supported as of this update, so it is critical that you upgrade earlier versions immediately. Upgrading is a straightforward process and is performed right within the admin console. Consult the release notes for instructions on upgrading to Parallels Awingu 5.5.

Parallels Awingu 5.5 is a minor release, and product development is underway for an upcoming major release that will include a variety of enhancements. For further details about Parallels Awingu 5.5, please consult the admin guide.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

How to integrate Jumpcloud and Awingu

Cloud access management has become increasingly important for businesses of all sizes, as an increasing number of employees work remotely and rely on cloud-based tools to stay connected and productive. Azure AD is the most popular solution, but more companies are also looking at solutions like JumpCloud for managing cloud access. In this article, we will explore how easy it is to integrate Awingu and JumpCloud by using the custom SAML app.

Step 1: Create Awingu in JumpCloud via the Custom SAML App

The first step in integrating Awingu and JumpCloud is to create a custom SAML app in JumpCloud. SAML (Security Assertion Markup Language) is a protocol used for single sign-on (SSO) authentication, which allows users to log in to multiple applications with a single set of credentials. Awingu supports SAML 2.0, which means that it can be integrated with JumpCloud using SAML.

To create a custom SAML app in JumpCloud, follow these steps:

1. Log in to your JumpCloud admin console and navigate to Applications.

2. Click the “+ Add New Application” button and select the “Custom SAML App”

3.  Enter a name for the app (e.g., Awingu) and on the SSO page set following parameters:

As Awingu only supports Service Provider initiated authentication, the following settings are also mandatory:

The last step is to create two attributes that can be passed on as claims to Awingu. The first one needs to correspond with the UPN of the user in Awingu’s local AD, and the second one will be used as the user display name in the Awingu user interface.

In this example, the UPN matches the email address of the user. If this is the case, you can also create a custom attribute for the user and pass this custom attribute to Awingu:

4. Before saving the application, make sure you assign the right group of users to this application and click “Save” to finish the creation of the SAML app in JumpCloud.

5. Once the app is created, select the app in the list of applications and download the XML metadata file by clicking on the “Export Metadata” button.

Once this is done, you are ready to configure the Awingu side.

Step 2: Enable Federation on Awingu

The second step in integrating Awingu and JumpCloud is to enable federation on Awingu. Federation is the process of establishing trust between two identity providers (in this case, JumpCloud and Awingu) so that users can log in to Awingu using their JumpCloud credentials.

Before you start the Awingu configuration part, make sure you know the username and password of the built-in management user. This is the user account that was created during the initial installation of Awingu. If you have activated pre-authentication or single sign-on within Awingu and you have a problem with the configuration, this is the only account that still allows you to login. All other (admin) users will no longer work as they will be forced to go over to the IdP, JumpCloud in this case.

To enable federation on Awingu, follow these steps:

  1. Log in to your Awingu appliance with an admin user and open the system settings.
  1. Go to “Configure” -> “User Connector” -> “Federated Authentication” and set the Type to “Pre-authentication” and the Protocol to SAML”.
  1. Set the Entity ID to “Awingu” and upload the Metadata XML file downloaded earlier onto the Awingu appliance after switching the Metadata Type from “URL” to “XML”.
  1. Set the Username & Display Name claim to the same names as set on the Jumpcloud side, in this example “username” and “displayname”.
  1. Set the Workspace URL to your public Awingu DNS name.
  1. Click Apply.

Once this is done, test your configuration by opening an incognito web browser window and go to your Awingu URL. If all is correct, you will be redirected to JumpCloud.  After a successful login to JumpCloud, you will be redirected to Awingu, and Awingu will ask you to type in your password. This will be your local Windows AD password. No need to panic, this is normal behavior as we only have activated so far in the “pre-authentication” and not yet the full single sign-on.

In case something goes wrong, and the pre-authentication is not working you can still login to the Awingu appliance with the built-in management user. To do this, open a new incognito window and go to https://your.awingu.url/login?noPreAuth (be careful, this is case sensitive). This will allow you to login and make modifications to the configuration.

Step 3: Go full Single Sign-On in Awingu

Once you have a working pre-authentication and know the integration with JumpCloud is done correctly,  you can go to the last step, which is switching the Federation Authentication type from “Pre-Authentication” to “Single sign-on”.

This last step is independent from the IdP that is used (JumpCloud in this case) and will remove that popup for the local AD Windows password. You’ll need to make Awingu a sub-CA of your Active Directory. By doing so, Awingu can generate user certificates and then via Kerberos and other standard Windows protocols, Awingu can let the user login to the applications and drives without the need of a Windows password or without the need to install any Awingu software onto the Windows environment.

Have a look at this video: https://youtu.be/8343EIAVHns or to the admin guide to learn more about how to generate those certificates. Be careful, because certificates and Kerberos are sensitive to DNS and other details. Follow the instructions to the letter to make it work.

Once you have uploaded the certificates to your appliance, your users can log in to Awingu with their JumpCloud credentials. This means that you can manage cloud access for your entire organization using a single platform (JumpCloud), while still providing your users with a seamless login experience.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×