Skip to content

24.3.7 Voyager released

Changes compared to 24.3.6

New Features

  • Added support for selecting Windows drives by drive letter when configuring a Disk Image Protected Item

Enhancements

  • Added a label in the Comet Server web interface and the Comet Backup desktop app to distinguish if Protected Items are enforced via the policy
  • Added the ability to convert Windows System Backup Protected Items to Disk Image Protected Items via the Users tab and Bulk Actions dropdown in the Comet Server web interface
  • Improved Microsoft 365 Drive downloads by adding configurable account concurrency and adding concurrency to single file downloads

Bug Fixes

  • Fixed an issue with default Protected Items, allowing edit and delete options when the configured policy doesn’t strictly enforce it
  • Fixed an issue with the Comet Backup desktop app deleting DeviceIdentificationEntropy and DeviceIdentificationHardwareIDOverride registry keys when uninstalled
  • Fixed an issue causing a deadlock when too many requests to a Storage Vault fail during decompression in a single job
  • Fixed an issue causing restores to panic when Comet fails to load a directory included in the files being restored
  • Fixed an issue with some search results not appearing when multiple partial matches exist in the Comet Server web interface
  • Fixed an issue with search results not appearing for results with non-ASCII characters in the Comet Server web interface
  • Fixed an issue allowing search invocation underneath an active dialog in the Comet Server web interface
  • Fixed an issue causing Comet Server to segfault when starting on Linux
  • Fixed an issue causing clients running on Windows Server 2008R2 and Windows 7 to lose their live connection and become unable to be remotely upgraded after a Comet Server upgrade

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Enhancing Parallels RAS: Explore what’s new in version 19.4

The latest Parallels® RAS release, version 19.4, introduces remarkable new features that refine and enhance the capabilities of Parallels RAS 19 and 19.3. 

Among these enhancements are expanded go-to-market opportunities for our partners to promote Parallels RAS and extended support for Nutanix AHV for the latest image management features.

Additionally, there are improved security measures, newly introduced customizable administrative options, and improved end-user functionality. Now, let’s take a closer look at the exciting additions in Parallels RAS 19.4.

New go-to-market (GTM) opportunity for partners

Extended GTM route for partners with Azure Marketplace listing (coming soon)

Parallels RAS is now listed as a transactional offering in the Microsoft Azure Marketplace in addition to the current bring your own license (BYOL) listing. This enables Parallels RAS to be more accessible and efficient through deployment automation.

Parallels partners can benefit through private offerings and simplified selling through personalized offerings, allowing for easier access and connecting Parallels solutions with businesses and organizations across the globe.

Provisioning and Automation

Extended image management for Nutanix AHV (AOS)

We’re thrilled to announce a significant expansion of our image management capabilities, initially introduced in the 19.3 release. It is now available for Microsoft Azure, Azure Virtual Desktop, Hyper-V and VMware vCenter, and ESXi and includes support for Nutanix AHV (AOS).

This is a pivotal step forward, enabling businesses considering migration to Nutanix to do so seamlessly with Parallels RAS. This comprehensive support encompasses a suite of powerful features, including template versioning, enhanced image lifecycle management facilitated by tags, and convenient template scheduling functionalities.

By extending our support to Nutanix AHV, we’re providing organizations with unparalleled flexibility to select their preferred infrastructure. This empowerment enables businesses to tailor their virtual environments precisely to their unique needs and preferences.

Find out more about the latest image management features with our Tech Bytes videos.

Support for scale computing SC//HyperCore 9.2

With Parallels RAS 19.4, integration with SC//HyperCore 9.2 is now available as a provider option. This enables organizations to use the latest supported SC//HyperCore versions 9.1 and 9.2 with Parallels RAS to automate provisioning, scaling, and power management of session host workloads.

Streamlined admin experience with Agent Auto-Upgrade

Managing upgrades across numerous backend session hosts can be daunting for IT administrators. To alleviate this challenge, Parallels RAS 19.4 introduces Agent Auto-upgrade, a feature that automates the upgrading of RDSH, VDI, AVD, and Remote PC (within a host pool) guest agents according to a maintenance schedule set by the IT administrator.

Whether operating on-premises, in the cloud, or in hybrid environments, this functionality simplifies upgrades, enabling administrators to focus on more strategic initiatives while ensuring all endpoints remain up to date.

Continuous improvement of template versioning

Building upon our commitment to improvement and optimization, the latest release of Parallels RAS includes several updates aimed at enhancing template versioning capabilities.

These improvements are designed to optimize the IT administrator experience, ensuring more seamless management and better version control for virtualization templates.

Security

Self-service registration for email-based one-time passwords (OTPs)

Security remains a top priority in today’s digital landscape. Accordingly, Parallels RAS 19.4 introduces a new, robust multi-factor authentication option with email OTP.

This feature provides organizations with an additional layer of security by delivering one-time passwords directly to user email addresses. Even external email addresses not stored in the company’s Active Directory are supported, ensuring comprehensive protection against unauthorized access. This capability provides a simple yet efficient use of email-based OTPs without relying on complex, third-party dependencies services.

Validate host headers

We have introduced HTTP host header validation at the gateway. This validation process serves to mitigate vulnerabilities associated with HTTP host header injection, enhancing the overall security posture of our platform.

With this feature implementation, administrators gain comprehensive control over custom HTTP host headers with the high availability load balancers and secure gateways being automatically included in the approved list.

Activation of this feature ensures that any request lacking a recognized host header from the specified list will result in a 404 error, thereby fortifying our defenses against potential security breaches originating from unauthorized host headers.

Configuring certificate authority templates

Administrators of Parallels RAS for organizations using SAML for their enrollment servers can now leverage a larger key size for security purposes.

This new feature enables the configuration of the PrlsEnrollmentAgent and the PrlsSmartcardLogon certificate templates used by the Enrollment Server at a minimum key size of 4096 bits. Previously, the minimum key size was 2048 bits.

User experience

Enhanced user experience with multi-monitor support

End-users leveraging the Parallels Client for Web will benefit from enhanced productivity with the introduction of multi-monitor support.

This feature empowers users to fully utilize all available displays during published sessions, whether they’re working within an application or in a desktop environment. By maximizing screen real estate, multi-monitor support enhances the overall user experience, facilitating seamless multitasking and workflow efficiency.

New built-in reports

The Parallels RAS 19.4 release introduces new host pool reporting options for IT administrators, further improving its reporting capabilities. These new reports track areas in user sessions and include:

  • Sessions disconnect for host pool

New reports are dedicated to monitoring session disconnects within host pools, akin to session activity reports for individual sessions.

  • Transport protocol for host pool

New reports tailored to track the transport protocol usage within host pools, mirroring the functionality of session activity reports for host pools.

  • Bandwidth availability for host pool

New reports focused on assessing bandwidth availability within host pools, providing insights like session activity reports but at the pool level.

  • Latency for host pool

New reports aimed at measuring latency within host pools, offering analysis akin to session activity reports while focusing on pool-wide latency metrics.

  • Connection quality for host pool

New reports designed to evaluate connection quality within host pools, providing insights like session activity reports but focusing on the overall connection quality across the pool.

  • UX evaluator for host pool

New reports dedicated to assessing the user experience (UX) within host pools, offering insights like session activity reports but focusing on UX metrics at the pool level.

  • Log-on duration for host pool

New reports aimed at analyzing logon duration within host pools, providing insights like session activity reports while focusing on pool-wide logon duration metrics.

SAML SSO capability

SAML SSO capability is now available when using Parallels RAS + Azure Virtual Desktop under the standard feature set.

Administration experience

Custom administration for tailored control

This feature introduces a custom menu under ‘Help’ within the RAS Console and allows customization of a URL in the management portal Support section.

This URL can redirect power or custom administrators to local or internal support or any other designated URL. It’s particularly beneficial for organizations that utilize Security Event and Incident Management frameworks, using local support to address IT tickets and enhance the efficiency of the support process.

Active Directory-based (AD) permissions for session management

Administrators can now define session management permissions tailored to Parallels custom administrators based on their AD group membership. This feature enhances the granularity of session management administration, ensuring that only designated administrators can oversee specific end-user sessions. This capability is particularly advantageous for service providers or larger enterprises with multiple designated help desk administrators.

View “license” permission options

This feature introduces a dedicated license view permission for administrators, available in both the RAS console and Web Management portal, tailored for both power and customer administrators. It provides the flexibility to restrict the visibility of certain license information from other administrators who have access to all license data.

Ready for Parallels RAS 19.4?

Parallels RAS continues to raise the bar with its feature offerings while ensuring the best possible admin and user experience.

From Nutanix AHV image management support to multi-factor authentication options and streamlined administrative controls, Parallels RAS empowers organizations to achieve greater efficiency, security, and flexibility in their virtual environments.

For a full list of features, refer to the Parallels RAS 19.4 release notes.

Frequently asked questions (FAQs)

1. What is the release date for 19.4?

The general availability date for Parallels RAS 19.4 is April 30, 2024.

2. What do I need to do to install the latest version of Parallels RAS?

IT managers can access the latest version of Parallels RAS through the management console two weeks after GA by going to Parallels RAS Console > Administration > Settings > Check now > Update and following the instructions from there. To access the new version immediately, managers can go to public downloads or through My Parallels Account.

3. Is there any supporting information to help me learn more about these features?

Yes, the best place for more information is in our 19.4 release notes.

Ready to explore what’s new in Parallels RAS 19.4? Get started here!

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

Enhancing your network security: the role of access control lists (ACLs)


Does your business rely on access control lists (ACLs) to manage user access? If not, you’re not alone. Many organizations shy away from using them due to the challenges of maintaining numerous lists across different network areas. However, an access control list can provide an extra layer of security for your network in specific scenarios and can be effectively integrated with role-based groups when needed.

This article will explore how an access control list can streamline your access management processes. We’ll also dive into the benefits of ACLs, including improved security measures and their adaptivity to various environments. Finally, we’ll offer practical insights into how access control lists are used to manage access and protect sensitive information.

Read on if you want to untangle the complexities of ACLs and enhance your network’s security.

What is an access control list (ACL)?

An access control list (ACL), sometimes called just an access list, filters network traffic based on source and destination. It’s a set of rules that determines which users can access particular network objects or devices. Users not included on the list are denied access to these resources.

Moreover, an access list can enhance role-based access control (RBAC). For example, they can be configured to allow only members of a development team to access a specific codebase while blocking access to all other users with DevOps roles who aren’t involved in the project.

Additionally, implementing network access control best practices involves using ACLs to manage user access and enhance security across the network.

What are ACLs used for?

An access control list (ACL) is a vital tool for managing permissions in computer systems and networks. It is mainly used for essential network security tasks, like controlling user access, protecting data, and preventing intrusions.

ACLs are also key for meeting cybersecurity standards and certifications, such as those related to network access control and network segmentation. Implementing ACLs is often a necessary step on the path to compliance, ensuring an organization fulfills required regulations.

ACLs help regulate the flow of data in and out of network components that users directly access, such as gateways and endpoints. For instance, a network administrator might have the permissions to read, write, and edit sensitive files, while a guest user may only view these files. An access control list ensures such selective control access based on specific criteria like IP addresses, protocols, or ports. This enhances network security by allowing precise control of who can access what.

Additionally, ACLs can be set up on various network devices, including routers, switches, VPNs, or databases. This provides a clear and effective way to manage access, improving traffic flow for better efficiency and security. By blocking malicious traffic and giving IT admins granular control, ACLs play a key role in keeping network systems safe and running smoothly.

How ACLs work

Access control lists manage access and monitor traffic within networks and systems, ensuring that only authorized interactions are permitted. Primarily installed in routers and switches, ACLs play a critical role in traffic control by guiding the flow of data throughout the network.

Each ACL contains access control entries (ACEs), which list user or group names along with their granted access rights. These rights are organized in a string of bits known as an access mask. Whether used for packet filtering or file access, ACLs provide a structured, rule-based security approach that helps administrators maintain control over network and system resources.

Rule creation and ordering

ACLs function by using predefined rules to allow or deny packets, with the order of these rules being critical in determining how traffic is managed. The process starts with rule creation and ordering, where admins set up ACL rules in a specific sequence that prioritizes certain traffic over others based on security policies.

Packet evaluation

This is another key function of ACLs, where the data within each packet is checked against the ACL rules to decide if it should be allowed through or blocked. This evaluation is based on criteria like IP addresses, port numbers, and packet content, aligning with established security measures.

Default actions

For file systems, ACLs detail specific user access privileges to system objects such as files and directories, dictating actions like reading, writing, or executing based on the user’s role (e.g., administrator or guest).

This granularity extends to default actions, where ACLs enforce predetermined responses when a packet or access request does not meet any of the specified rules. Typically, this results in a denial of access to protect the network’s integrity.

An access control list: various types

Access control lists come in various types, each serving a unique purpose based on functionality and scope.. There are two basic ones:

  • File system ACLs manage access to files and directories within an operating system. They dictate user access permissions and privileges once the system is accessed.

  • Networking ACLs regulate network access by providing instructions to network switches and routers. They specify the types of traffic allowed to interface with the network and define user permissions within the network. Networking ACLs function similarly to firewalls in controlling network traffic.

Additionally, ACLs can be categorized according to their traffic filtering capabilities:

  • A standard ACL does not differentiate between IP traffic. Instead, it allows or blocks traffic based on the source IP address.

  • An extended ACL offers a more granular level of control. It uses both the source and the destination IP addresses, such as a source IP address, destination IP addresses, port numbers, and protocol types (ICMP, TCP, IP, UDP). It can differentiate IP traffic to dictate what is allowed or denied access.

The advantages of using an access control list

An access control list isn’t a one-size-fits-all solution for network security. However, using roles for access management offers several benefits:

  • Enhanced security. Users access only resources aligned with their roles, minimizing the risk of credential theft or phishing attacks. ACL implements separation of duties, reducing the threat posed by privileged users.

  • Improved efficiency. ACLs streamline access control maintenance. Admins can assign new hires to role groups, granting them associated permissions without creating individual profiles.

  • Optimized network performance. With ACLs, admins can define criteria such as source and destination IP addresses, ports, and protocols to regulate traffic flow. By restricting access to certain resources based on these criteria, ACLs help prevent unnecessary network congestion and improve overall network performance.

  • Scalability & flexibility. ACLs allow for flexible role adjustments as organizations evolve. Changes can be applied globally, reducing the chance of security vulnerabilities.

  • Compliance & auditing. ACLs help meet regulatory requirements like HIPAA. Healthcare entities, for example, can limit access to patient records through role-based restrictions. Additionally, ACLs simplify auditing access, making it easier to track access requests and user activity.

Enhancing device security with ACLs

While ACLs offer significant advantages in network security, it’s essential to extend this protection to device-level security. By adopting Device Posture Security (DPS), your organization can evaluate the security of devices connecting to the network.

Through DPS, you can evaluate and monitor devices according to your predefined rules. But that’s not all. You can also automatically restrict network access for accounts using non-compliant devices. This integrated approach enhances overall network security by addressing vulnerabilities at both the network and device levels.


IT administrators can easily implement ACLs for Device Posture Security using our web-based Control Panel. To enable DPS checks, create various rules such as existing file check, OS version, jailbreaking or rooting status, and device location. Setting up ACLs in the panel is simple. Just create a profile and specify the desired rules. Once configured, it’s important to test the ACL to ensure that it is functioning as expected. Finally, activate the ACL to start enforcing the specified access control rules on your network.


ACLs for internal network segmentation

Protecting your data from leaks and insider threats is more crucial now than ever. It’s not just about safeguarding information; it’s about maintaining the credibility of your business. That’s where access control lists (ACLs) come in. They act as gatekeepers, deciding who gets access to what within your network. By setting up ACLs, you can stop unauthorized users from moving laterally through your network, helping to prevent data breaches.

Additionally, when you combine ACLs with role-based access control (RBAC), you gain even more control over who can access different parts of your network. With our Cloud Firewall feature, you can optimize your network by implementing granular segmentation using ACLs. These lists act as virtual bouncers, controlling who can access which parts of your network.

Our intuitive Control Panel facilitates the creation and management of ACLs, providing a streamlined and centralized approach to network security management.

ACLs in external access control

Managing network access isn’t just about your team. You also have to consider third-party vendors, contractors, and other external partners who might need access to your systems. With access control lists, you can ensure that these third parties only have access to the specific resources they need, minimizing the risk of unauthorized access and potential security breaches.

By setting up granular segmentation and ACL rules, you can protect your network against potential threats while enabling collaboration with external partners. Our Cloud Firewall feature makes managing external access easy, ensuring your network is protected from all angles.

Boost your network security with NordLayer’s ACLs

Access control lists (ACLs) make role-based access control more precise, ensuring only the right people have access to your data and resources, and improving network performance. They’re the frontline defense against unauthorized access and potential breaches.

But the benefits of ACLs don’t stop there. By combining ACLs with our Cloud Firewall feature, you’re not just building walls—you’re creating an impenetrable fortress around your devices and network. With NordLayer, setting up and managing ACLs is a breeze, giving you peace of mind knowing your network is fortified against any threats that come its way.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How to find Citrix NetScaler ADCs and Gateways

What are Citrix NetScaler ADCs and Gateways? #

NetScaler Application Delivery Controller (ADC), formerly known as Citrix ADC, acts in a number of capacities to ensure reliable application delivery to users. This can include load balancing across application servers, off-loading of certain operations, security protections, and policy enforcement.

NetScaler Gateway, formerly known as Citrix Gateway, provides single sign-on (SSO) from any device to multiple applications through a single URL.

Latest Citrix vulnerability #

A new vulnerability was disclosed in NetScaler ADC and Gateway products for version 13.1-50.23

There is currently no associated CVE with this particular vulnerability because Citrix had already disclosed and issue with a previously assigned CVE-2023-4996.

What is the impact? #

The vulnerability would enable an attacker to remotely obtain sensitive information from a NetScaler appliance configured as a Gateway or AAA virtual server via a very commonly connected Web interface, and without requiring authentication. This bug is nearly identical to the Citrix Bleed vulnerability (CVE-2023-4966), except it is less likely to return highly sensitive information to an attacker.

Are updates or workarounds available? #

Citrix recommends customers update to version 13.1-51.15 or later.

How do I find potentially vulnerable systems with runZero? #

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

product:netscaler

CVE-2023-3519 (July 2023) #

In July, 2023, Citrix alerted customers to three vulnerabilities in its NetScaler ADC and NetScaler Gateway products. Surfaced by researchers at Resillion, these vulnerabilities included a critical flaw currently being exploited in the wild to give attackers unauthenticated remote code execution on vulnerable NetScaler targets (CVE-2023-3519). Compromised organizations included a critical infrastructure entity in the U.S., where attackers gained access the previous month and successfully exfiltrated Active Directory data. And at the time of publication, there appear to be over 5,000 public-facing vulnerable NetScaler targets.

What was the impact? #

The three reported vulnerabilities affecting NetScaler ADC and Gateway products were of various types, and each include different preconditions required for exploitation:

  • Unauthenticated remote code execution (CVE-2023-3519; CVSS score 9.8 – “critical”)
    • Successful exploitation required the NetScaler target be configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, or RDP Proxy) or “authentication, authorization, and auditing” (AAA) virtual server.
  • Reflected cross-site scripting (XSS) (CVE-2023-3466; CVSS score 8.3 – “high”)
    • Successful exploitation required the victim to be on the same network as the vulnerable NetScaler target when the victim loaded a malicious link (planted by the attacker) in their web browser.
  • Privilege escalation to root administrator (nsroot) (CVE-2023-3467; CVSS score 8.0 – “high”)
    • Successful exploitation required an attacker having achieved command-line access on a vulnerable NetScaler target.

U.S.-based CISA reported attackers exploiting CVE-2023-3519 to install webshells used in further network exploration and data exfiltration, causing CVE-2023-3519 to be added to CISA’s Known Exploited Vulnerabilities Catalog. Other common attacker goals, like establishing persistence, lateral movement, and malware deployment, were all potential outcomes following successful exploitation.

Citrix made patched firmware updates available. Admins were advised to update older firmware on vulnerable NetScaler devices as soon as possible.

CISA also made additional information available around indicators of compromise and mitigations.

How did runZero customers find potentially vulnerable NetScaler instances with runZero? #

From the Asset inventory, they used the following prebuilt query to locate NetScaler instances on their network:

hw:netscaler or os:netscaler
NetScaler asset query

Results from the above query should be triaged to verify they are affected ADC or Gateway products and if they are running updated firmware versions.

The following query could also be used in on the Software and Services inventory pages to locate NetScaler software:

product:netscaler
NetScaler software query

Results from the above query should be triaged to verify they are affected ADC or Gateway products and if they are updated versions.

As always, any prebuilt queries are available from your runZero console. Check out the documentation for other useful inventory queries.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

CRN Recognizes Scale Computing’s Marlena Fernandez, Rachael Galey on the 2024 Women of the Channel List

INDIANAPOLIS – May 13, 2024 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that CRN®, a brand of The Channel Company, has named Marlena Fernandez, vice president, marketing, to the 2024 Women of the Channel Power 100, an elite subset of prominent leaders selected from the CRN® 2024 Women of the Channel list. CRN also named Rachael Galey, regional channel manager, to its coveted Women of the Channel list.

Every year, CRN highlights women from vendor, distributor, and solution provider organizations whose vision and leadership have a beneficial influence on the technology industry. The CRN 2024 Women of the Channel honorees are creative, strategic leaders who show ongoing commitment to using their skills to innovate and drive success for their partners and customers.

From within this impressive group, the annual Power 100 recognizes some of the most influential women leaders from technology vendors and distributors who consistently contribute their advocacy and expertise to advancing the channel. Every woman on the Power 100 is an inspiration to industry peers and shows deep dedication to improving outcomes and opportunities for their own organizations and the full IT channel ecosystem.

Fernandez has been named to the Women of the Channel list for five consecutive years and to the Women of the Channel Power 100 for the past three years for her leadership within the Scale Computing Partner Community. She joined Scale Computing in 2019 and was the first executive to be named to both lists. This past year, Fernandez significantly contributed to Scale Computing achieving record revenue growth and expanding the company’s partner community. She was instrumental in the success of last month’s Platform//2024, Scale Computing’s annual partner and customer event.

“We are tremendously proud of what Marlena and Rachael have accomplished this past year, not just for Scale Computing, but for the overall channel partner ecosystem. Marlena is a pivotal member of our executive team, bringing expertise from her 20+ years of results-oriented global marketing, and Rachael is extremely dedicated to partner success, making Scale Computing the consistent choice for channel partners,” said Dave Hallmen, chief revenue officer, Scale Computing. “They’re continued commitment to growing our business through our award-winning Scale Computing Partner Community and strong leadership make both very deserving of this recognition. As more and more partners seek VMware alternative solutions, we look forward to growing our partner program through the rest of 2024 and beyond.”

Galey joined Scale Computing in 2023 as a regional channel manager and focuses on Scale Computing solution sales and account management. She has played a crucial role in expanding the Scale Computing partner community, as the increased demand for new virtualization and edge computing solutions drove the company’s record growth this year. Passionate about mentorship, collaboration, and customer satisfaction, Galey’s drive to develop and support colleagues while exceeding client expectations has made her an asset to both Scale Computing and its partners.

“It is a great privilege to honor the remarkable achievements of these women leaders in the IT channel,” said Jennifer Follett, VP, U.S. Content and Executive Editor, CRN at The Channel Company. “Each woman on the list has demonstrated a deep commitment to innovation and leadership that advances their organizations and drives transformation and success across the IT channel.”

Earlier this year, Scale Computing launched an exclusive promotion for VMware partners looking for new virtualization solutions. Current and new partners looking to switch customers to Scale Computing can participate in the VMware Rip & Replace promotion and receive a 25% discount on Scale Computing software and services for each new customer implementation. Additionally, Scale Computing launched Scale Computing Showcase, offering partners and their customers open access to trial the Scale Computing Platform solutions suite.

The 2024 Women of the Channel list will be featured in the June issue of CRN Magazine, with online coverage starting May 13 at CRN.com/WOTC

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×