{"id":75276,"date":"2024-02-02T23:46:18","date_gmt":"2024-02-02T15:46:18","guid":{"rendered":"https:\/\/version-2.com\/?p=75276"},"modified":"2024-01-26T23:49:30","modified_gmt":"2024-01-26T15:49:30","slug":"5-reasons-you-need-a-cloud-firewall","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/02\/5-reasons-you-need-a-cloud-firewall\/","title":{"rendered":"5 reasons you need a Cloud Firewall"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"75276\" class=\"elementor elementor-75276\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5fnJBsxyRc9TwrNgH2P5w1\/873972615dfa54f069c680b906ffc08f\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"473\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><h2 id=\"introduction-understanding-cloud-firewall\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Introduction: understanding Cloud Firewall\u00a0<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A Cloud Firewall is a service that allows organizations to control who and how can access their internal and cloud resources.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Gartner\u00ae <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.gartner.com\/en\/documents\/3992870\" target=\"_blank\" rel=\"noopener\">predicts<\/a> a major move towards <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/learn\/firewall\/firewall-as-a-service-fwaas\/\">Firewall-as-a-Service (FWaaS)<\/a> by 2025. This change reflects a growing need for security solutions that extend beyond physical boundaries and are easy to update. These solutions also simplify network access control for IT security teams.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/cloud-firewall\/\">NordLayer&#8217;s Cloud Firewall<\/a> makes security management more straightforward and adapts to various environments, from traditional offices to cloud platforms.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cloud Firewall improves an organization&#8217;s security by simplifying <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/learn\/access-control\/network-access-control\/\">network access control<\/a>. This improvement is vital for achieving compliance, building a mature security system, and following best practices and frameworks like Security Service Edge (SSE). Cloud Firewall&#8217;s operation in the cloud makes it especially useful for businesses with hybrid workforces, frequent travelers, or complex infrastructure systems.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In short, a Cloud Firewall is a user-friendly solution that meets various business security needs. Let&#8217;s explore how it does this.<\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6bKHdi29rzm0L4upjfwRbA\/757be836d3ebd5f8ed1858637e98888b\/NordLayer_Cloud_Firewall_workflow.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6bKHdi29rzm0L4upjfwRbA\/757be836d3ebd5f8ed1858637e98888b\/NordLayer_Cloud_Firewall_workflow.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/6bKHdi29rzm0L4upjfwRbA\/757be836d3ebd5f8ed1858637e98888b\/NordLayer_Cloud_Firewall_workflow.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/6bKHdi29rzm0L4upjfwRbA\/757be836d3ebd5f8ed1858637e98888b\/NordLayer_Cloud_Firewall_workflow.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/6bKHdi29rzm0L4upjfwRbA\/757be836d3ebd5f8ed1858637e98888b\/NordLayer_Cloud_Firewall_workflow.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/6bKHdi29rzm0L4upjfwRbA\/757be836d3ebd5f8ed1858637e98888b\/NordLayer_Cloud_Firewall_workflow.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/6bKHdi29rzm0L4upjfwRbA\/757be836d3ebd5f8ed1858637e98888b\/NordLayer_Cloud_Firewall_workflow.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/6bKHdi29rzm0L4upjfwRbA\/757be836d3ebd5f8ed1858637e98888b\/NordLayer_Cloud_Firewall_workflow.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"NordLayer Cloud Firewall workflow\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6bKHdi29rzm0L4upjfwRbA\/757be836d3ebd5f8ed1858637e98888b\/NordLayer_Cloud_Firewall_workflow.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"398\" \/><\/p><h2 id=\"key-takeaways\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Key takeaways<\/h2><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cloud Firewalls reduce data leak risks by restricting sensitive data access to only authorized users.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cloud Firewalls help organizations meet compliance with standards like NIS2, PCI DSS, ISO 27001, HIPAA, etc.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In many cybersecurity frameworks, Cloud Firewalls are valuable as they offer easier network access control that aligns with best practices.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cloud Firewalls provide a comprehensive solution for managing complex hybrid infrastructures.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For hybrid workers, Cloud Firewalls ensure safe and equal access to network resources.<\/p><\/li><\/ul><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">So why do you need a Cloud Firewall?<\/p><h2 id=\"reason-1-to-prevent-data-leaks\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Reason 1: to prevent data leaks<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/learn\/network-security\/network-segmentation\/\">Network segmentation<\/a> is vital in network access control. Without network segmentation, data leaks can occur more easily.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Not all network members need full access to all company resources. Confusion over what is confidential in different departments can lead to accidental leaks.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Network segmentation is one of the network access control methods and a primary goal of Cloud Firewalls. Network segmentation is when a network is divided into designated areas with specific access permissions. This strategy helps limit access to sensitive data to only those who need it.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/KvPOSbXclEhG52eWB654j\/7bc68e840b8f91e0807f02031821d533\/Firewall_segmentation.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/KvPOSbXclEhG52eWB654j\/7bc68e840b8f91e0807f02031821d533\/Firewall_segmentation.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/KvPOSbXclEhG52eWB654j\/7bc68e840b8f91e0807f02031821d533\/Firewall_segmentation.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/KvPOSbXclEhG52eWB654j\/7bc68e840b8f91e0807f02031821d533\/Firewall_segmentation.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/KvPOSbXclEhG52eWB654j\/7bc68e840b8f91e0807f02031821d533\/Firewall_segmentation.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/KvPOSbXclEhG52eWB654j\/7bc68e840b8f91e0807f02031821d533\/Firewall_segmentation.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/KvPOSbXclEhG52eWB654j\/7bc68e840b8f91e0807f02031821d533\/Firewall_segmentation.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/KvPOSbXclEhG52eWB654j\/7bc68e840b8f91e0807f02031821d533\/Firewall_segmentation.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Firewall segmentation\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/KvPOSbXclEhG52eWB654j\/7bc68e840b8f91e0807f02031821d533\/Firewall_segmentation.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"529\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer\u2019s Cloud Firewall offers straightforward controls for setting up detailed network segmentation. Cloud Firewall allows organizations to establish precise network access permissions. You can grant exclusive access to select resources for certain individuals or groups and restrict access for others when needed. The system can also create rules for specific team members, not just for departments or teams.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A Cloud Firewall is valuable in the fight against data breaches as it helps mitigate risks and contain potential damage.<\/p><ol class=\"RichText_ol__z_262\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Using a Cloud Firewall reduces the likelihood of a security breach. It acts as a barrier that shields your network from external threats.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Network segmentation, facilitated by Cloud Firewall, prevents lateral movement within the network. This means employees inadvertently leaking data from inside is less likely.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">If a breach occurs, the intruder gains access to only a specific network segment. The Cloud Firewall&#8217;s segmentation limits their reach.<\/p><\/li><\/ol><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In summary, Cloud Firewall simplifies setting and updating access rules. It allows designated team members specific access to sensitive data, enhancing security. Cloud Firewall is an easy-to-use tool for network segmentation, a vital part of network access control.<\/p><h2 id=\"reason-2-to-achieve-compliance\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Reason 2: to achieve compliance<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">There&#8217;s a wide array of important compliance standards and regulations that focus on network access rights control. Let&#8217;s look at some examples:<\/p><ol class=\"RichText_ol__z_262\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/blog\/how-nis2-directive-shapes-europes-security\/\">NIS2<\/a>\u2014a new EU directive aiming to enhance the Network and Information Systems (NIS) Directive of 2016;<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/learn\/pci-dss\/what-is-pci-dss\/\">PCI\u00a0DSS<\/a>\u2014an international standard which safeguards online payment security;<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/blog\/iso-27001-checklist\/\">ISO 27001<\/a>\u2014an international standard for IT security management;<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/blog\/hipaa-compliance-saas\/\">HIPAA<\/a>\u2014a US federal law focusing on health data protection.<\/p><\/li><\/ol><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">While not all are mandatory yet, they set high cybersecurity measures.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Complying with high cybersecurity standards is becoming vital for building trust and credibility in businesses. Each one requires robust network access control solutions. A Cloud Firewall is an effective tool to meet these requirements.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In 2024, the NIS2 Directive will be a significant topic as this legislative act will become mandatory later in the year. It applies to various EU industries, requiring a consistent approach to cybersecurity.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5UhwOX27uXIcWUBXTbrePu\/3c304043b7a89f37f8fc009c15e3c24e\/The_amplified_impact_of_the_NIS2_Directive.webp?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5UhwOX27uXIcWUBXTbrePu\/3c304043b7a89f37f8fc009c15e3c24e\/The_amplified_impact_of_the_NIS2_Directive.webp?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/5UhwOX27uXIcWUBXTbrePu\/3c304043b7a89f37f8fc009c15e3c24e\/The_amplified_impact_of_the_NIS2_Directive.webp?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/5UhwOX27uXIcWUBXTbrePu\/3c304043b7a89f37f8fc009c15e3c24e\/The_amplified_impact_of_the_NIS2_Directive.webp?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/5UhwOX27uXIcWUBXTbrePu\/3c304043b7a89f37f8fc009c15e3c24e\/The_amplified_impact_of_the_NIS2_Directive.webp?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/5UhwOX27uXIcWUBXTbrePu\/3c304043b7a89f37f8fc009c15e3c24e\/The_amplified_impact_of_the_NIS2_Directive.webp?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/5UhwOX27uXIcWUBXTbrePu\/3c304043b7a89f37f8fc009c15e3c24e\/The_amplified_impact_of_the_NIS2_Directive.webp?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/5UhwOX27uXIcWUBXTbrePu\/3c304043b7a89f37f8fc009c15e3c24e\/The_amplified_impact_of_the_NIS2_Directive.webp?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"The amplified impact of the NIS2 Directive\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5UhwOX27uXIcWUBXTbrePu\/3c304043b7a89f37f8fc009c15e3c24e\/The_amplified_impact_of_the_NIS2_Directive.webp?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"535\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NIS2, PCI DSS, ISO 27001, and HIPAA have a strong focus on ensuring safe data transfer and network protection. To adhere to these frameworks, businesses need strong network controls for data protection and secure communication.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">The role of Cloud Firewall in compliance<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer\u2019s Cloud Firewall aids businesses in meeting compliance requirements like those of NIS2 as it helps achieve network segmentation more easily. While not a mandatory requirement for compliance, Cloud Firewall is a versatile and user-friendly solution.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As compliance with the NIS2 Directive becomes crucial for EU businesses, a dependable tool such as Cloud Firewall proves valuable. It ensures controlled network access and enhances data safety. Cloud Firewall is ideal for businesses seeking to adhere to various compliance standards, offering easy use and regular updates.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Proactively implementing a Cloud Firewall before the enforcement of directives like NIS2 is a strategic move. It helps businesses to achieve the necessary network segmentation and prepare for upcoming compliance obligations.<\/p><h2 id=\"reason-3-to-implement-security-strategy-by-best-practices\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Reason 3: to implement security strategy by best practices<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Professionals often turn to established frameworks and checklists when developing a strong network security strategy. These guidelines are critical in shaping and expanding network defense strategies. Implementing network access control measures is a key step in any network security framework. NordLayer\u2019s Cloud Firewall is an effective tool for this purpose.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Popular frameworks guiding network security strategy include <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/learn\/sase\/what-is-sse\/\">SSE<\/a> and <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/nordpass.com\/blog\/cis-controls-compliance\/\" target=\"_blank\" rel=\"noopener\">Center for Internet Security (CIS) Controls v8<\/a>. Both frameworks feature components that focus on network access control, where Cloud Firewall serves as a practical solution.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The SSE framework, introduced by Gartner, merges various network security solutions into a unified cloud service. This framework helps businesses protect their data, resources, and users. SSE includes elements like FWaaS, CASB, SWG, and ZTNA, enabling businesses to counter online threats effectively. In SSE, NordLayer\u2019s Cloud Firewall enhances security and improves threat response.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3oZUt5xjSCVou4Ia3KexWx\/7b6899e626a4e6ddfa099f232011f368\/SSE_vs_SASE.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"470\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">CIS v8, another well-known cybersecurity framework, features Access Control Lists (ACLs) as one of the key components. ACLs are lists that specify which users can access certain network resources. NordLayer\u2019s Cloud Firewall operates as required for ACLs in CIS v8, managing access to different areas of the network. This is essential for complying with CIS v8 and protecting the network from unauthorized access.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">SSE and CIS v8 frameworks are just two examples. Cloud Firewall is adaptable to many other security frameworks and aids in the cybersecurity maturity of an organization. Using a Cloud Firewall aligns with top framework recommendations, offering stronger protection against modern cyber threats and enhancing an organization\u2019s security stance.<\/p><h2 id=\"reason-4-to-easily-unify-security-across-hybrid-infrastructures\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Reason 4: to easily unify security across hybrid infrastructures<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Many businesses use complex infrastructure systems. These often consist of cloud, on-premise infrastructures, and several remote physical sites. Managing and <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/blog\/what-is-hybrid-cloud-security\/\">securing hybrid cloud infrastructures<\/a> is possible but challenging.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4HUduLd4NflH5aLTWWOpn0\/ef27938e173a50b662343f2e4d3365cc\/Holistic_security_for_hybrid_infrastructures.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4HUduLd4NflH5aLTWWOpn0\/ef27938e173a50b662343f2e4d3365cc\/Holistic_security_for_hybrid_infrastructures.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/4HUduLd4NflH5aLTWWOpn0\/ef27938e173a50b662343f2e4d3365cc\/Holistic_security_for_hybrid_infrastructures.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/4HUduLd4NflH5aLTWWOpn0\/ef27938e173a50b662343f2e4d3365cc\/Holistic_security_for_hybrid_infrastructures.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/4HUduLd4NflH5aLTWWOpn0\/ef27938e173a50b662343f2e4d3365cc\/Holistic_security_for_hybrid_infrastructures.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/4HUduLd4NflH5aLTWWOpn0\/ef27938e173a50b662343f2e4d3365cc\/Holistic_security_for_hybrid_infrastructures.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/4HUduLd4NflH5aLTWWOpn0\/ef27938e173a50b662343f2e4d3365cc\/Holistic_security_for_hybrid_infrastructures.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/4HUduLd4NflH5aLTWWOpn0\/ef27938e173a50b662343f2e4d3365cc\/Holistic_security_for_hybrid_infrastructures.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Holistic security for hybrid infrastructures\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4HUduLd4NflH5aLTWWOpn0\/ef27938e173a50b662343f2e4d3365cc\/Holistic_security_for_hybrid_infrastructures.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"462\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A Cloud Firewall simplifies the management of these systems. It provides a straightforward, transparent, and potentially cost-saving method for handling complex infrastructures. Saving time in management is one of its major advantages. The Cloud Firewall is beneficial for security and improving operational efficiency in managing these systems.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Businesses with hybrid infrastructures, especially those with multiple physical locations and extensive cloud systems, require a holistic approach. A Cloud Firewall serves this need effectively. It integrates well with different infrastructure components and allows for management from a single point\u2014a browser tab.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The Cloud Firewall offers a unified defense system that meets the varied needs of modern business infrastructures. It efficiently combines cloud and physical network elements and provides detailed control over both.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This unified approach is convenient for businesses and ensures consistent security policies across various environments. It encompasses both cloud services and on-site data storage and simplifies protection and administration.<\/p><h2 id=\"reason-5-to-enable-and-ensure-safety-in-the-hybrid-work-model\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Reason 5: to enable and ensure safety in the hybrid work model<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The move away from a solely on-site work model is permanent. Employees now prefer options like working from home, working from anywhere, business trips, and workations.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">CEOs may easily accept these flexible models, but the IT department faces a bigger task. They must not only enable remote work but also ensure its security. This change in the work model brings new risks and requires stronger security measures.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Security teams seek solutions suitable for the hybrid work environment that also gives them peace of mind. They need tools that <b>enable <\/b>and<b> protect<\/b> remote workers. A Cloud Firewall is an effective solution for both these needs.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cloud Firewalls work independently of location. They provide equal access to network resources for employees, whether they are abroad or in the office.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Uniform access is essential for maintaining high productivity and collaboration, especially in widespread teams. Cloud Firewall is very helpful for international companies or those with staff who travel often.<\/p><h2 id=\"conclusion-why-cloud-firewall-is-the-smart-choice-for-your-business\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Conclusion: why Cloud Firewall is the smart choice for your business<\/h2><p><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5nzmhfN06vkvR52Ki0QDSB\/4a9871e3b8d4f28b070dd32f23ceb68b\/5_reasons_you_need_a_Cloud_Firewall.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5nzmhfN06vkvR52Ki0QDSB\/4a9871e3b8d4f28b070dd32f23ceb68b\/5_reasons_you_need_a_Cloud_Firewall.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/5nzmhfN06vkvR52Ki0QDSB\/4a9871e3b8d4f28b070dd32f23ceb68b\/5_reasons_you_need_a_Cloud_Firewall.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/5nzmhfN06vkvR52Ki0QDSB\/4a9871e3b8d4f28b070dd32f23ceb68b\/5_reasons_you_need_a_Cloud_Firewall.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/5nzmhfN06vkvR52Ki0QDSB\/4a9871e3b8d4f28b070dd32f23ceb68b\/5_reasons_you_need_a_Cloud_Firewall.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/5nzmhfN06vkvR52Ki0QDSB\/4a9871e3b8d4f28b070dd32f23ceb68b\/5_reasons_you_need_a_Cloud_Firewall.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/5nzmhfN06vkvR52Ki0QDSB\/4a9871e3b8d4f28b070dd32f23ceb68b\/5_reasons_you_need_a_Cloud_Firewall.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/5nzmhfN06vkvR52Ki0QDSB\/4a9871e3b8d4f28b070dd32f23ceb68b\/5_reasons_you_need_a_Cloud_Firewall.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"5 reasons you need a Cloud Firewall\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5nzmhfN06vkvR52Ki0QDSB\/4a9871e3b8d4f28b070dd32f23ceb68b\/5_reasons_you_need_a_Cloud_Firewall.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"565\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Cloud Firewall, especially NordLayer\u2019s FWaaS, brings a major upgrade in network security. It meets the needs of modern businesses with its ease of use and cost efficiency.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Setting up a Cloud Firewall is easy, but you need to be a NordLayer Premium plan user. It\u2019s manageable through the NordLayer Control Panel.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Choosing NordLayer\u2019s Cloud Firewall isn\u2019t just an upgrade. It&#8217;s a strategic step towards a more secure, efficient, and forward-looking network.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For more details about Cloud Firewall, <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/contact-sales\/\">contact sales<\/a> for further assistance.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6a493c elementor-widget elementor-widget-text-editor\" data-id=\"c6a493c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Introduction: understanding Cloud Firewall\u00a0 A Cloud Fir [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1130,1273,61],"tags":[974,1132,1272],"class_list":["post-75276","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordlayer","category-1273","category-press-release","tag-nord-security","tag-nordlayer","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 reasons you need a Cloud Firewall - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 reasons you need a Cloud Firewall - Version 2\" \/>\n<meta property=\"og:description\" content=\"Introduction: understanding Cloud Firewall\u00a0 A Cloud Fir [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-02T15:46:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5fnJBsxyRc9TwrNgH2P5w1\/873972615dfa54f069c680b906ffc08f\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/5-reasons-you-need-cloud-firewall\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/5-reasons-you-need-a-cloud-firewall\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"5 reasons you need a Cloud Firewall\",\"datePublished\":\"2024-02-02T15:46:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/5-reasons-you-need-a-cloud-firewall\\\/\"},\"wordCount\":1614,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/5-reasons-you-need-cloud-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5fnJBsxyRc9TwrNgH2P5w1\\\/873972615dfa54f069c680b906ffc08f\\\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"NordLayer\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordLayer\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/02\\\/5-reasons-you-need-a-cloud-firewall\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/5-reasons-you-need-cloud-firewall\\\/\",\"name\":\"5 reasons you need a Cloud Firewall - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/5-reasons-you-need-cloud-firewall\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/5-reasons-you-need-cloud-firewall\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5fnJBsxyRc9TwrNgH2P5w1\\\/873972615dfa54f069c680b906ffc08f\\\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-02-02T15:46:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/5-reasons-you-need-cloud-firewall\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/5-reasons-you-need-cloud-firewall\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/5-reasons-you-need-cloud-firewall\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5fnJBsxyRc9TwrNgH2P5w1\\\/873972615dfa54f069c680b906ffc08f\\\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/5fnJBsxyRc9TwrNgH2P5w1\\\/873972615dfa54f069c680b906ffc08f\\\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/5-reasons-you-need-cloud-firewall\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 reasons you need a Cloud Firewall\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 reasons you need a Cloud Firewall - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/","og_locale":"en_US","og_type":"article","og_title":"5 reasons you need a Cloud Firewall - Version 2","og_description":"Introduction: understanding Cloud Firewall\u00a0 A Cloud Fir [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/","og_site_name":"Version 2","article_published_time":"2024-02-02T15:46:18+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5fnJBsxyRc9TwrNgH2P5w1\/873972615dfa54f069c680b906ffc08f\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/02\/5-reasons-you-need-a-cloud-firewall\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"5 reasons you need a Cloud Firewall","datePublished":"2024-02-02T15:46:18+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/02\/5-reasons-you-need-a-cloud-firewall\/"},"wordCount":1614,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5fnJBsxyRc9TwrNgH2P5w1\/873972615dfa54f069c680b906ffc08f\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","NordLayer","2024"],"articleSection":["Nord Security","NordLayer","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/02\/5-reasons-you-need-a-cloud-firewall\/","url":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/","name":"5 reasons you need a Cloud Firewall - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5fnJBsxyRc9TwrNgH2P5w1\/873972615dfa54f069c680b906ffc08f\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-02-02T15:46:18+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/5fnJBsxyRc9TwrNgH2P5w1\/873972615dfa54f069c680b906ffc08f\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/5fnJBsxyRc9TwrNgH2P5w1\/873972615dfa54f069c680b906ffc08f\/5_reasons_you_need_Cloud_Firewall_Blog_cover.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/5-reasons-you-need-cloud-firewall\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"5 reasons you need a Cloud Firewall"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jA8","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=75276"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75276\/revisions"}],"predecessor-version":[{"id":75280,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/75276\/revisions\/75280"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=75276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=75276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=75276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}