Skip to content

How VIAS3D achieved peace of mind by securing flexible remote working

VIAS3D stands as a pioneering force in the software sales and support field. It offers comprehensive simulation solutions across various industries, such as aerospace, defense, oil and gas, electromagnetic manufacturing, and more. 

Since its start in 2015, the company has grown from a small team of five to a global workforce of 250 employees spread across seven countries.

VIAS3D prides itself on tackling the toughest problems for its clients, ranging from design and part manufacturing simulations to optimizing assembly line efficiency through advanced software solutions like Delmia and Abaqus.

While working on solutions for its clients, VIAS3D must find the right tools for its own network security. The company’s IT manager, Robert Brazzell, shares their journey of enabling the team to feel secure while out of the office and protect the network using NordLayer.

The challenge

Tackling unsecure connections in the face of remote work

Key pain points

With adopting a fully remote work policy triggered by the pandemic, VIAS3D faced new challenges. Specifically, the company struggled with maintaining secure and reliable connections for its globally dispersed team.

“Before, we really didn’t need a VPN when everybody was staying at the same IP address all the time. But once people felt more comfortable traveling, we noticed increasing vulnerabilities. We needed to create security through obscurity.”

Click to tweet

As employees embraced the flexibility of remote work, moving from static office environments to dynamic remote settings, the company noticed an increase in unreliable connections and security vulnerabilities. This was particularly noticeable when employees accessed the network from public Wi-Fi networks during travel or work from cafes and parks.

“With a fairly lax hybrid model, we wanted that extra layer of security anytime employees were working someplace a little bit more pleasant than their home office.”

Click to tweet

This new way of working required a robust solution to ensure data security and connectivity reliability, essential for sustaining the company’s operations and client service delivery.

The solution

Building safety via credibility and flexibility

Main criteria choosing the solution

To address the challenges, VIAS3D opted for NordLayer, drawn by its strong reputation for secure network access and superior connectivity speed.

“We already knew NordLayer was about the industry standard, and a quick glance shows you that it has the fastest connectivity, which is very important. So any other outliers that we assessed were almost non-contenders.”

Click to tweet

The selection process was straightforward, given NordLayer’s industry-standard status and the company’s prior positive experience with NordVPN.

“We were using NordVPN selectively about a year before getting NordLayer, which heavily influenced our hand in adopting the solution company-wide.”

Click to tweet

The implementation of NordLayer was seamless. It was facilitated by its compatibility with then-Azure AD (now Entra ID), which allowed for easy distribution and self-adoption among employees.

“We pushed NordLayer out through Azure AD—everybody got an email and got excited about the new toy. It pretty much was a system of self-adoption”

Click to tweet

This move was not just about adopting a new tool—it was a strategic decision to empower the remote workforce with a secure and efficient working environment.

Why choose NordLayer

NordLayer was selected for its comprehensive security features, ease of implementation, and exceptional support. The platform’s fast connectivity was a key factor, ensuring that remote employees could work efficiently without sacrificing security.

How NordLayer covers the performance and security needs of remote teams

it managers users

Furthermore, NordLayer’s reputation for reliability and the positive experience with NordVPN, which was previously used by the company, cemented its choice as the optimal cybersecurity solution.

The outcome

Secured connections and peace of mind

The benefits of implementing NordLayer

The integration of NordLayer into vias3ds’ operations has significantly bolstered the company’s cybersecurity posture, allowing IT managers like Robert to sleep better at night, knowing their employees are protected regardless of their location.

While the integration of NordLayer didn’t directly lead to process efficiencies or significant time savings, the value it added in terms of securing remote connections was immense.

“It’s just textbook security through obscurity. It makes me feel a lot better when I hear about them connecting to a public network in an airport, knowing that NordLayer is there to protect them.”

Click to tweet

IT managers and employees alike now enjoy peace of mind, knowing they are protected regardless of where they choose to work.

This outcome underscores the importance of proactive cybersecurity measures in today’s remote and flexible working environments. It ensures businesses can operate securely and without interruption.

Top cybersecurity tips

Robert emphasizes the importance of constant vigilance, open communication, and a discerning eye as crucial to maintaining cybersecurity.

Pro cybersecurity tips

For VIAS3D, adopting NordLayer was not just about implementing a VPN solution but about creating a secure and efficient working environment for a global team embracing the new normal of remote work.

Through this partnership, VIAS3D has not only enhanced its cybersecurity framework but also reinforced its commitment to providing its team with the tools they need to succeed in a flexible and secure manner.

This case study demonstrates the importance of selecting the right cybersecurity solutions to meet the unique challenges of today’s dynamic work environments, ensuring that companies like VIAS3D can continue to innovate and lead in their respective industries.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Why you need immutable data protection in your ransomware strategy

And why a lean, purpose-built tech stack is the way to do it

Immutability is a key feature that plays a pivotal role in safeguarding data integrity, boosting data resilience, and protecting data against threats, including ransomware, but certain considerations need to be addressed when evaluating backup solutions. Let’s look into the concept of data immutability, its significance, and what it means for Keepit’s SaaS data protection platform.

Data immutability definition: Why it’s important

Immutable storage operates on a simple principle: Data can only be added. Once data is written, it can’t be changed, effectively locking it and preventing any unauthorized tampering or deletion. In the context of data protection, this means that once data is stored immutably, it remains unchanged and is safeguarded against unauthorized modifications or deletions, ensuring data integrity at all times.

How an immutable backup solution will enhance your overall security posture

The importance of data immutability in data protection is multifaceted. Here’s a quick rundown of some of the main drivers for deploying a solution leveraging data immutable technology:

  • Data integrity: First, immutability ensures that data remains in its original, unaltered state, preserving its integrity. This is critical for basically all industries.
  • Ransomware defense: In the battle against ransomware, data immutability offers a robust defense. Here’s why: Even if ransomware infiltrates a system, it cannot manipulate or delete immutable data. Because of this, it’s providing a secure fallback option for data recovery.
  • Compliance and legal requirements: Since regulatory bodies require organizations to maintain unaltered records for a specified period of time, having a backup solution that guarantees this is vital. In this way, immutability helps organizations meet these compliance requirements.
  • Historical data preservation: Immutability enables organizations to keep historical data records that are unchangeable. This is valuable for auditing, investigations, and analysis of past data.

 

So, which features should you look for when evaluating backup options that all offer immutability? First, I’d say simplicity, because it’s not always simple.

“Simplicity as a shield”

Who doesn’t like a good acronym hijacking: Software as a service (SaaS) meets “simplicity as a shield.” Our solution distinguishes itself in data backup and recovery by having the most efficient tech stack. It’s cloud native and purpose built for SaaS data storage with the clear security goal of keeping data tamper proof and always immutable.

But what does simplicity mean for defining immutability and how it impacts a data protection strategy? Or alternatively, what does complexity mean for immutability? Let’s look at both, starting with the latter.

Vulnerabilities for backup providers with complex adaptations

Many backup providers have legacy systems that were initially designed for on-premises environments. In order to adapt to storing cloud data, these providers had to implement bolt-on solutions via additional layers to their old, on-prem tech stack, resulting in a much more complex architecture.

There are two main considerations that I want to discuss, from a security standpoint, with cloud adaptions to on-premises solutions: First, the complexity is significantly increased with the added layers required to retrofit an on-premises deployment for the cloud, thereby increasing the attack surface and potential attacker entry points; Second, these bolted-on layers often have immutability as a configuration, not baked into the architecture.

While these top layers often offer options for manual configuration to achieve immutability, this configurability and added complexity create potential entry points for attackers. Effectively, this results in more entry points — more “doors” that bad actors will come knocking on to see if someone forgot to lock up. (Read about why backups are key ransomware targets.)

To make matters worse, the complexity added by having those extra layers makes comprehensive testing challenging. More potential entry points with less comprehensive testing means a larger attack surface to protect and test to ensure that they’re secured. That’s not great for data integrity, ransomware defense, or historical data preservation.

In solutions deploying these bolt-on cloud adaptations to “modernize” legacy systems, attackers can exploit these optional higher levels (I say optional since these levels only exist because they’re modifying an on-prem solution for the cloud). These retrofitted legacy systems can be (and should be) thought of as having more potential access points for threats.

Retrofitted complexity: The Achilles’ Heel of many backup solutions? 

“Defenders need to be perfect all of the time, while the attacker only needs to succeed once.” 

-Popular security axiom 

 

So, where does all this lead to? As a result of these legacy on-premises systems being retrofitted for cloud data, cybercriminals are finding easier entry points into the targeted environment, gaining access (Think: social engineering like phishing) into the ecosystem at these more vulnerable higher levels (where the stakes perhaps don’t seem so severe) before drilling down through the layers to lower-level access with their highjacked rights. 

 

Here they can then gain entry to the lowest, most-important (and secure) levels to corrupt, encrypt, or otherwise destroy backup data — attackers typically assume access at a higher level, but the main concern here is that if the assumption that the higher the level you go, the easier entry is, then those solutions with the highest complexity would also be the most vulnerable. 

 

To say it another way: The deeper the layer of attempted entry, the fewer chances for access and exploitation. Therefore, less complex solutions — “less complex” meaning something good because you’re more deliberate on the design — have fewer options to exploit and can be tested much more holistically. That’s a win win. 

 

There are three notions I want to keep top of mind:

  • Typically, higher levels can be immutable, but sometimes these must be configured manually. 
  • Attackers use these “immutable optional” higher levels as easier entry points and then drill down to the immutable, lower-level access points with assumed access rights they acquired. 
  • Having fewer layers means a smaller attack surface for exploitation. Simple is a good thing because it means you’re more deliberate on the design (and can test more holistically). 

 

What an efficient tech stack means for cyberattack defense 

Unlike legacy systems with bloated, bolted-on complexities, Keepit’s purpose-built and streamlined architecture minimizes potential access points for threats. The leanness of our software means having fewer layers of complexity and therefore having fewer points of entry for threat actors. Not only that, but since it’s simpler, we can test holistically (and testing is key). 

 

Put simply, Keepit has fewer layers since our tech stack is purpose built for cloud data storage. In this way, it avoids a lot of the complexity other backup providers “need” to have but only because they’re running legacy systems from the on-premises days with bolt-on cloud modifications. 

 

The level of leanness, efficiency, and simplicity we’ve achieved directly adds to the strength of immutability in our solution. 

 

We’re able to achieve this because we designed our solution for the cloud, in the cloud, and to do “one thing” extremely well, and that’s to protect and store cloud SaaS data securely on an independent cloud, air gapped, so customers can always have access to clean backup copies of their data. 

 

Simplicity is key: Fewer layers are much more secure 

SpaceX, the company that revolutionized commercial spaceflight, has a philosophy that states “the best part is no part,” which resonates here. By embracing simplicity and efficiency in design, Keepit aligns with a principle that’s also reaching for the sky (well, the cloud at least) — it’s a design choice that enhances security, boosts efficiency and agility, and integrates seamlessly with a multitude of SaaS applications due to its API-only design. 

 

Software can be infinitely complex, with no way to test everything (among other issues, like development and maintenance). From a security standpoint, if your solution is too complex, there’s just no way you could test sufficiently. And so, simplicity is key. That’s my philosophy and the philosophy behind Keepit. 

 

Immutable by default 

Deep at the core of the Keepit platform, there’s simply no way to overwrite data in storage: It’s just not possible. Like the backup tapes of the past, our disk-based storage systems do not offer a mechanism for modifying backup data. Hypothetically, even if an attacker — or a malicious insider — were to gain access, they just couldn’t do anything there. That’s immutability. 

 

So, our approach disrupts the pattern ransomware attackers are exploiting in other backup solutions. By providing a more secure foundation through not only avoiding these superfluous layers, but by being designed specifically for cloud backup data storage, we leverage immutability through simplicity. 

 

In addition to immutability, we leverage a number of other data protection best-practice security methods. 

 

Adding to immutability: Data protection best practices 

Some of our other security methods deployed for data resilience and data immutability are the immediate encryption of backup data, incremental backup, and data deduplication.

The Keepit solution is running on a vendor-independent, tamper-proof and air-gapped cloud infrastructure. Our cloud offers true backup, where data is stored separately from the primary production data set, regardless of if the data is in Microsoft Azure storage, AWS, Gcloud, or otherwise. 

“True backup” is air gapped in line with the 321 backup rule, meaning your ability to recover clean backup copies is always there, regardless of the status of your SaaS vendor.

To sum up what makes Keepit’s approach to data immutability uniquely strong against ransomware and other cyberthreats:

  • Cloud native: Our tech stack is purpose-built for cloud data storage, so we avoid unnecessary layers of complexity and the associated vulnerabilities with legacy systems. 
  • Efficient tech stack: Our efficient tech stack minimizes potential access points and reduces the overall attack surface. 
  • Holistic testing: The simplicity of our solution (remember, simple is good) allows for more holistic testing, ensuring a robust and secure environment. 
  • Immutability: Administrative access cannot overrule or unconfigure the immutability as it is baked into the solution from the ground up, so even if a customer account is fully compromised, the immutable data storage will retain the historical backup data in pristine condition.

Where to go next

This post is part three of a five-part series on ransomware resilience. Read part one “Why backups are key ransomware targets” and part two “Why air gapping is your best defense.” Check back soon to catch the fourth installment of the series, where we’ll discuss the importance of SaaS data protection for identity systems like Microsoft Entra ID. 

 

Want to keep learning? Watch our on-demand webinar co-hosted with Enterprise Strategy Group (ESG) entitled “Surviving ransomware: 2023 data protection insights and strategies.” Learn how to be data resilient in the face of cyberattacks. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Even legitimate websites can become traps, and small/home offices need to be prepared

One’s personal digital life may be a threat to business. Small offices and home offices need proper prevention. 

Heads of small or home offices most likely know how difficult it is to set boundaries between work and their personal lives. One minute you are doing taxes, and the next, you are browsing the internet looking for leisure-time activities for your family. 

Having basic cybersecurity knowledge, you also probably know that sometimes you need to be careful out there. Clicking URLs mentioned in unfamiliar emails could bring trouble, and downloading new apps from unknown sources with no background information isn’t a good idea either.

But, what if a legitimate website that you or your employees have been regularly visiting gets compromised? How do you secure your cherished small office when downloading a legitimate application, or when its update suddenly turns out to be malicious?

ESET researchers have recently discovered such a campaign, which abused several legitimate websites to spread spyware which targeting a wide group of users coming from India, Taiwan, Hong Kong, Australia, and the United States. Facing such elaborate attacks, small offices and home offices need to take a prevention-first approach.

Interesting target

While, compared with large enterprises, small offices and home offices do not work with such large amounts of data or money, unfortunately, this can create the false impression that they are not interesting targets for cybercriminals. But the opposite is true.

Considering the massive numbers of small offices and home offices globally, in combination with their limited budgets for cybersecurity, they make appealing targets for threat actors who aim campaigns at indistinct groups of people or businesses, rather than some corporate giant.

Therefore, it is no surprise that 31% of businesses with fewer than 10 employees surveyed in the UK during the winter of 2022 – 2023 experienced a cyberattack or a security breach in the past 12 months.

There are 5.28 million such businesses in the UK, which means that, theoretically, 1.64 million small offices and home offices experienced a cyber incident within a single year.

Multi-staged attacks

ESET researchers discovered a cyberespionage campaign well-suited to paint the picture. Since at least September 2023, cybercriminals have been victimizing Tibetans through a multi-staged attack that combines several techniques in order to install spyware on victims’ devices. Researchers attribute this campaign to the China-aligned Evasive Panda APT group.

Shortly before the 2024 Kagyu Monlam Festival, which is held annually by Tibetan Buddhists in India, cybercriminals abused a website that belongs to the Kagyu International Monlam Trust. Expecting a higher visitor rate ahead of the upcoming festival, the attackers placed a malicious script on the site which showed a fake error page to users. This enticed them to download an “Immediate Fix.” However, the file was in fact a malicious downloader for both Windows and macOS.

The same threat actors also compromised a website belonging to a software development company, based in India, that produces Tibetan language translation software. The attackers placed several trojanized installers there for legitimate software that deployed the same malicious downloaders.

These malicious downloaders were designed to download and install backdoors, which can avoid normal authentication procedures and allow access to a system.

When successful, the downloaders compromised devices with a malware capable of receiving commands to collect information about files and running processes and sending them to attackers.

Small offices dealing with big attacks

For average users, these advanced multi-staged attacks will be most likely difficult to spot. It is not hard to imagine a user clicking on a link that is part of a warning message coming from a trusted website. And there is no possibility for humans to discover that a legitimate software they are about to download was trojanized.

Considering their limited options in such situations, small offices and home offices need to be smart about their safety.

This means protecting your business as much as possible, and leaving the rest to professional tools that can minimize the threat landscape in a way that average Joes cannot.

Here are preemptive measures that businesses can take:

Educate yourself and your employees – Some attacks are difficult to spot, but it does not mean that awareness training is useless. There are plenty of threats in cyberspace that can be easily avoided if you and your employees stay vigilant.

Use strong passwords or passphrases – Minimum length should be 12 characters, with a wide variety of letters, special characters, lower/upper cases, etc. Hard to remember? Switch to passphrases! They are longer, yet easier to remember.

Stay on top of software updates – For cybercriminals it is not uncommon to exploit previously known vulnerabilities simply because users do not update their software.

Split your network into segments – For small offices and home offices, network segmentation does not have to be difficult. For example, use a guest Wi-Fi for devices that only need the internet to operate, then use VLANs to split a network into two segments – private and work.

Back up your data – If everything fails and your systems get compromised, it is essential to have an effective backup strategy to run your business without unnecessary delays.

Professional protection

Adopting the previous measures, you can cover some attack vectors, such as brute-force attacks against passwords or exploitation of known vulnerabilities. But the threat landscape is way bigger.

To cover all small office and home office needs, ESET now delivers its new all-in-one protection, ESET Small Business Security

ESET Small Business Security offers: 

  • Reliable, easy-to-use security, with a minimum system footprint
  • Multi-OS protection, including Windows, Android, MacOS and Windows Server
  • Safe Banking
  • Safe Browsing
  • Password Manager
  • VPN
  • Ransomware Shield
  • Anti-Theft
  • Botnet Protection
  • Network Inspector
  • Safe Server – Protection of company and customer data stored on a file server running on Windows Server OS, automatically scans all inserted USB flash drives, memory cards, and CDs/DVDs
  • Support for up to 25 devices

The number of features that one person needs to manage may look scary, but do not worry. ESET Small Business Security runs on ESET HOME, a complete security management platform that turns home admin duties into a walk in the park.

Never let your guard down

When average users browse trusted websites or download software from trusted sources, they often let their guard down, and it’s quite understandable. Heads of small offices or home offices already have enough problems just running their businesses and taking care of their families.

With comprehensive solutions, such as ESET Small Business Security, you can be sure that your business is protected, even when facing similar threats.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×