{"id":76211,"date":"2024-03-14T19:06:54","date_gmt":"2024-03-14T11:06:54","guid":{"rendered":"https:\/\/version-2.com\/?p=76211"},"modified":"2024-03-09T19:10:39","modified_gmt":"2024-03-09T11:10:39","slug":"how-accrete-inc-prepared-for-failover-to-protect-the-sensitive-data-of-high-profile-clients","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/03\/how-accrete-inc-prepared-for-failover-to-protect-the-sensitive-data-of-high-profile-clients\/","title":{"rendered":"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"76211\" class=\"elementor elementor-76211\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7mTJUpiFak8ApsotsCTquP\/55fb4b7bdc7c91eebdca1bf58c147ead\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"473\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Accrete Inc. is an artificial intelligence company that specializes in a variety of sectors. Its wide range of products supports government, entertainment, financial services, and consumer packaged goods. The company has established a reputation for its innovative supply chain analysis and social media aggregation solutions.\u00a0<\/p><p data-testid=\"text\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/mzHeC3DNFTlC1dgXzkxI3\/a360a5ed09909d6a30cbe843ca654e55\/Profile_of_Accrete_Inc..png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"412\" \/><\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/mzHeC3DNFTlC1dgXzkxI3\/a360a5ed09909d6a30cbe843ca654e55\/Profile_of_Accrete_Inc..png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/mzHeC3DNFTlC1dgXzkxI3\/a360a5ed09909d6a30cbe843ca654e55\/Profile_of_Accrete_Inc..png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/mzHeC3DNFTlC1dgXzkxI3\/a360a5ed09909d6a30cbe843ca654e55\/Profile_of_Accrete_Inc..png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/mzHeC3DNFTlC1dgXzkxI3\/a360a5ed09909d6a30cbe843ca654e55\/Profile_of_Accrete_Inc..png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/mzHeC3DNFTlC1dgXzkxI3\/a360a5ed09909d6a30cbe843ca654e55\/Profile_of_Accrete_Inc..png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/mzHeC3DNFTlC1dgXzkxI3\/a360a5ed09909d6a30cbe843ca654e55\/Profile_of_Accrete_Inc..png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/mzHeC3DNFTlC1dgXzkxI3\/a360a5ed09909d6a30cbe843ca654e55\/Profile_of_Accrete_Inc..png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/mzHeC3DNFTlC1dgXzkxI3\/a360a5ed09909d6a30cbe843ca654e55\/Profile_of_Accrete_Inc..png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Profile of Accrete Inc.\" width=\"0\" height=\"0\" data-nimg=\"future\" \/>Peter Bierfeldt, the Chief Information Security Officer, oversees the security of the company\u2019s intellectual property, customer data, and overall reputation. He shared how working with governmental and other high-risk clients requires a focus on layered security and how <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.accrete.ai\/\" target=\"_blank\" rel=\"noopener\">Accrete Inc.<\/a> achieved it using NordLayer.<\/p><h2 id=\"the-challenge\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The challenge<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Securing cloud environments for high-risk data clients<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Accrete\u2019s unique position in the market, dealing with sensitive government contracts and a global workforce, posed significant cybersecurity challenges.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The company works with a diverse range of clients, including the US Department of Defense. This requires them to follow stringent security standards like FedRAMP and NIST 800-171.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cWe knew it\u2019s a good practice to have a VPN solution in place to have everybody enter our client cloud network through an allowlisted IP, whether you&#8217;re talking AWS GovCloud or AWS commercial production.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CWe%20knew%20it%E2%80%99s%20a%20good%20practice%20to%20have%20a%20VPN%20solution%20in%20place%20to%20have%20everybody%20enter%20our%20client%20cloud%20network%20through%20an%20allowlisted%20IP,%20whether%20you're%20talking%20AWS%20GovCloud%20or%20AWS%20commercial%20production.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-accrete-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The primary concern was securing a virtual, cloud-based network environment against potential threat actors, particularly in high-risk countries.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cWe are a virtual company with no on-premise network. We don&#8217;t have anything like that. We are 100% in the cloud, and protecting that cloud is really, really important.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CWe%20are%20a%20virtual%20company%20with%20no%20on-premise%20network.%20We%20don't%20have%20anything%20like%20that.%20We%20are%20100%25%20in%20the%20cloud,%20and%20protecting%20that%20cloud%20is%20really,%20really%20important.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-accrete-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Additionally, Accrete faced challenges in managing a globally dispersed team with offices in the U.S. states and India, requiring secure and reliable access to the network from various locations worldwide.<\/p><h2 id=\"the-solution\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The solution<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Combining multiple security functionalities for the best result<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Accrete Inc. chose NordLayer as their cybersecurity partner, transitioning from their previous VPN provider.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cAccrete Inc. needed one more piece of the puzzle for getting into our network, an additional layer of security that you can put in place to protect your production and entire network.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CAccrete%20Inc.%20needed%20one%20more%20piece%20of%20the%20puzzle%20for%20getting%20into%20our%20network,%20an%20additional%20layer%20of%20security%20that%20you%20can%20put%20in%20place%20to%20protect%20your%20production%20and%20entire%20network.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-accrete-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The company\u2019s network security combines layers of different capabilities and functionalities. It includes virtual private gateways, IP allowlisting, SSO and MFA implementation, strong passwords, and antivirus protection. Thus, it must have been not only just a VPN but a solution that does more.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cOur old VPN didn\u2019t do anything beyond being a VPN. We looked for a solution that secures the network when connected to untrusted Wi-Fi and is reliable regarding performance.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9COur%20old%20VPN%20didn%E2%80%99t%20do%20anything%20beyond%20being%20a%20VPN.%20We%20looked%20for%20a%20solution%20that%20secures%20the%20network%20when%20connected%20to%20untrusted%20Wi-Fi%20and%20is%20reliable%20regarding%20performance.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-accrete-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As Peter notes, different from free tools, the company is paying for the service to protect their information. Having government customers dealing with financial services and insurance, Accrete Inc. must ensure that nobody\u2019s snooping on their traffic, and with a company like NordLayer, they don\u2019t have to worry about it.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Why choose NordLayer<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer was selected for its robust VPN solutions, global points of presence, and seamless integration with existing systems like Okta SSO providers.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cOur clients must know that we don\u2019t relax our security. An outage and going down temporarily is an issue with high-sensitivity data, but with failover, we don\u2019t need to worry about it.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9COur%20clients%20must%20know%20that%20we%20don%E2%80%99t%20relax%20our%20security.%20An%20outage%20and%20going%20down%20temporarily%20is%20an%20issue%20with%20high-sensitivity%20data,%20but%20with%20failover,%20we%20don%E2%80%99t%20need%20to%20worry%20about%20it.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-accrete-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">One of the main objectives for Accrete Inc. was to establish a <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/en\/blog\/how-to-ensure-high-availability-network-security\/\">failover in case of an outage<\/a>. Deploying at least two private servers ensured high service availability. This approach means security isn&#8217;t compromised, even if one of the virtual gateways flatlines for a few minutes.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">A solid mesh of security and business continuity measures established with the NordLayer tool<\/h3><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/5JpYiia3tXMAWdDOGYjssa\/4616077dd6dda7fa1645137ec32e8fc7\/Why_choose_NordLayer.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"490\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The key reasons for this choice were:<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer&#8217;s global network infrastructure provided low-latency, secure connections for their international team, which was particularly beneficial for the office in Mumbai.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The ability to establish failover systems ensured uninterrupted access and network resilience.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer\u2019s reputation for reliability and security compliance aligned with Accrete\u2019s needs for protecting sensitive government-related data.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The ease of onboarding and user-friendly nature of NordLayer\u2019s services minimized IT overhead and facilitated smooth integration into Accrete&#8217;s operations.<\/p><\/li><\/ul><h2 id=\"the-outcome\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">The outcome<\/h2><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Complete team protection to enable full network security<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Implementing NordLayer resulted in a strengthened cybersecurity posture for Accrete Inc. The new system enhanced network security without compromising on performance, even for remote and international team members.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Accrete Inc. added VPN gateways to cover both the United States and India, supporting all staff.\u00a0 VPN usage mitigates the risk of leakage of even relatively benign information like email addresses and user names.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cInvesting in 100% user coverage in the organization makes sense. When people get used to using the VPN, it limits network exposure\u00a0 and mitigates the impact of compromise to our network even if an endpoint is compromised.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CInvesting%20in%20100%25%20user%20coverage%20in%20the%20organization%20makes%20sense.%20When%20people%20get%20used%20to%20using%20the%20VPN,%20it%20limits%20network%20exposure%C2%A0%20and%20mitigates%20the%20impact%20of%20compromise%20to%20our%20network%20even%20if%20an%20endpoint%20is%20compromised.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-accrete-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Accrete Inc. successfully met the compliance requirements for their government contracts and ensured the integrity of their intellectual property and customer data.\u00a0 FedRAMP requires that only trusted devices access the network.\u00a0 By combining allowlisting via the VPN to access the network via Okta, Accrete Inc. was able to address several FedRAMP controls.<\/p><div class=\"Quote_root__31D_c\"><blockquote class=\"Quote_blockquote__n7q70\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">\u201cNordLayer plays very nicely with Okta. It integrated well with the onboarding process, making it easy and simple as we\u2019ve got other systems with much more overhead and hand-holding.\u201d<\/p><\/blockquote><p><a class=\"Link_stillDarkBlue__cqlBe Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 TwitterShareButton_root__YFyZU Quote_twitterShareButton__sglFW\" href=\"https:\/\/twitter.com\/intent\/tweet?text=%E2%80%9CNordLayer%20plays%20very%20nicely%20with%20Okta.%20It%20integrated%20well%20with%20the%20onboarding%20process,%20making%20it%20easy%20and%20simple%20as%20we%E2%80%99ve%20got%20other%20systems%20with%20much%20more%20overhead%20and%20hand-holding.%E2%80%9D&amp;url=https%3A%2F%2Fnordlayer.com%2Fblog%2Fcase-study-accrete-x-nordlayer\" aria-label=\"Share on Twitter\"><span class=\"Quote_tweetText__hNFS5\">Click to tweet<\/span><\/a><\/p><\/div><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The shift also demonstrated a commitment to utilizing leading-edge technology solutions to address complex security challenges.<\/p><h2 id=\"pro-cybersecurity-tips\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Pro cybersecurity tips<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">We talk with our clients not only to learn their experience using NordLayer but also to understand how cybersecurity experts perceive online security. Thus, we asked the Chief Information Security Officer at Accrete Inc. to share his personal favorite tips for building digital hygiene habits.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2ezpjtlr1Yd9QrzWltQNuN\/42c3eaea92ad5c5d940a0c2804aa1e38\/Quotes_of_Accrete_Inc..png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"416\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Accrete Inc. is a perfect example of how a layered approach to security can ease and improve your network protection journey. NordLayer is a solution that takes granular control of establishing different security measures, so they create a robust mesh against digital threats.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Accrete Inc. is an artificial intelligence company that [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1129,1273,61],"tags":[974,1131,1272],"class_list":["post-76211","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordpass","category-1273","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients - Version 2\" \/>\n<meta property=\"og:description\" content=\"Accrete Inc. is an artificial intelligence company that [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-14T11:06:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/7mTJUpiFak8ApsotsCTquP\/55fb4b7bdc7c91eebdca1bf58c147ead\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-accrete-x-nordlayer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/how-accrete-inc-prepared-for-failover-to-protect-the-sensitive-data-of-high-profile-clients\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients\",\"datePublished\":\"2024-03-14T11:06:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/how-accrete-inc-prepared-for-failover-to-protect-the-sensitive-data-of-high-profile-clients\\\/\"},\"wordCount\":980,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-accrete-x-nordlayer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/7mTJUpiFak8ApsotsCTquP\\\/55fb4b7bdc7c91eebdca1bf58c147ead\\\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordPass\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/03\\\/how-accrete-inc-prepared-for-failover-to-protect-the-sensitive-data-of-high-profile-clients\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-accrete-x-nordlayer\\\/\",\"name\":\"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-accrete-x-nordlayer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-accrete-x-nordlayer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/7mTJUpiFak8ApsotsCTquP\\\/55fb4b7bdc7c91eebdca1bf58c147ead\\\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-03-14T11:06:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-accrete-x-nordlayer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-accrete-x-nordlayer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-accrete-x-nordlayer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/7mTJUpiFak8ApsotsCTquP\\\/55fb4b7bdc7c91eebdca1bf58c147ead\\\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/7mTJUpiFak8ApsotsCTquP\\\/55fb4b7bdc7c91eebdca1bf58c147ead\\\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/case-study-accrete-x-nordlayer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/","og_locale":"en_US","og_type":"article","og_title":"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients - Version 2","og_description":"Accrete Inc. is an artificial intelligence company that [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/","og_site_name":"Version 2","article_published_time":"2024-03-14T11:06:54+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/7mTJUpiFak8ApsotsCTquP\/55fb4b7bdc7c91eebdca1bf58c147ead\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/03\/how-accrete-inc-prepared-for-failover-to-protect-the-sensitive-data-of-high-profile-clients\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients","datePublished":"2024-03-14T11:06:54+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/03\/how-accrete-inc-prepared-for-failover-to-protect-the-sensitive-data-of-high-profile-clients\/"},"wordCount":980,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/7mTJUpiFak8ApsotsCTquP\/55fb4b7bdc7c91eebdca1bf58c147ead\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","NordPass","2024"],"articleSection":["Nord Security","NordPass","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/03\/how-accrete-inc-prepared-for-failover-to-protect-the-sensitive-data-of-high-profile-clients\/","url":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/","name":"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/7mTJUpiFak8ApsotsCTquP\/55fb4b7bdc7c91eebdca1bf58c147ead\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-03-14T11:06:54+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/7mTJUpiFak8ApsotsCTquP\/55fb4b7bdc7c91eebdca1bf58c147ead\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/7mTJUpiFak8ApsotsCTquP\/55fb4b7bdc7c91eebdca1bf58c147ead\/Accrete_Inc.x_NordLayer_web-cover_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/case-study-accrete-x-nordlayer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jPd","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/76211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=76211"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/76211\/revisions"}],"predecessor-version":[{"id":76215,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/76211\/revisions\/76215"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=76211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=76211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=76211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}