Skip to content

Scale Computing Reports Record Q3 Results with 60% YoY Growth, Outperforms Targets

INDIANAPOLIS – October 22, 2024 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced record growth for the third quarter of 2024. The company saw an increase in software sales of over 60 percent year over year (YoY), more than doubling its number of new customers over the same period last year. The increased demand for both VMware alternative virtualization platforms and edge computing solutions continues to drive record company growth.

“Edge computing is driving IT transformation; AI is accelerating edge computing adoption; and both channel partners and customers are hungry to move on from VMware as they make this next leap forward. Scale Computing Platform’s unmatched capabilities and ecosystem partners empower distributed enterprises anywhere in the world and across all verticals to embrace the future of edge computing, driving efficiency, compliance, and profitability,” said Jeff Ready, CEO and co-founder of Scale Computing. “Each quarter this year, we have experienced record demand and an accelerating growth rate, which now exceeds even our highest growth forecasts. With no sign of slowing down, we’re welcoming record numbers of new customers and new partners who will continue to drive growth into 2025 and beyond.”

The company continues to expand in key vertical markets, including the retail industry. Scale Computing recently announced new edge computing customer Royal Farms, operator of fast and friendly neighborhood convenience stores with 260 locations throughout Maryland, Delaware, Virginia, Pennsylvania, West Virginia, and New Jersey. The company is transforming the landscape of IT infrastructure in the retail sector by delivering a single platform for unparalleled performance, reliability, and ease of use for the deployment, management, and growth of on-premises applications like POS, IoT, pump monitoring, video surveillance, and customer experience.

In Q3, Scale Computing released Scale Computing Migrate (SC//Migrate), a new solution designed to streamline and simplify the migration process for businesses transitioning away from VMware. The company also offers an SC//Migrate Quickstart Service with expert support to further assist in the migration process. Additionally, Scale Computing unveiled its Total Cost of Ownership (TCO) Calculator tool, a free online tool for estimating the cost savings customers can achieve across specific technology categories and server models by migrating application workloads to Scale Computing Platform (SC//Platform). TCO calculation enables customers to evaluate purchasing decisions based on the comprehensive costs of owning and operating IT infrastructure over its lifecycle or other set periods of time. The company also introduced HC3450FG, new GPU-enabled hardware for data-intensive applications and AI workloads.

Other key Q3 2024 awards, recognitions, and partnerships include:

For more information about Scale Computing, please visit scalecomputing.com.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What is a Virtual Private Cloud? Understanding key components and architecture

Summary: Virtual Private Clouds (VPCs) enhance cloud security and flexibility by isolating resources within the public cloud domain. Learn how VPCs work.

Cloud computing has revolutionized business networks, cutting the need for hardware and maintenance tasks while making network design more flexible than ever.

On the other hand, the public cloud can feel a little exposed. Sharing space with other users increases security risks – and those risks may be unacceptable when storing or processing client data.

Virtual Private Cloud (VPC) deployments offer a practical solution.

VPCs create private zones within the public cloud, blending the pros of cloud computing with robust security. Even so, using VPCs safely is essential. Let’s explore the subject and understand how private cloud technology can work for you.

What is Virtual Private Cloud infrastructure?

A Virtual Private Cloud is a private virtualized domain within the public cloud. VPCs contrast with public cloud computing, where tenants share cloud space with other users. VPC deployments use single-tenant architecture, creating private spaces within the public cloud.

VPCs allow companies to benefit from cloud computing’s flexibility and easy scaling while securing critical resources via logical isolation.

How does a Virtual Private Cloud work?

Unlike public cloud solutions, VPC cloud infrastructure is owned and maintained by the organization that uses it.

A VPC resides in a standard public cloud data center. Owners source software and cloud hosting facilities and may hire additional IT management professionals. However, the VPC is effectively private. Isolation minimizes links to other publicly hosted assets.

Technicians use logical isolation to separate VPC resources from the public cloud. This technique uses Virtual Local Area Networking (VLAN) technology and private IP subnets to create barriers and protect private assets.

Private subnets make local IP addresses inaccessible from the public internet. VLANs isolate types of traffic, prevent access from unauthorized devices, and ensure all traffic relates to the VPC owner.

Most VPC instances also use Virtual Private Network coverage (VPNs). A VPN connection creates an encrypted zone around the shared public cloud. Users log into the VPC via their VPN gateway. The VPN conceals their identities and activity when using the Virtual Private Cloud.

VPC components and architecture

VPC networks tend to have elements in common. As the VPC diagram below shows, core components include:

  • Web gateways: These create a connection between the VPC environment and the public cloud or the Internet. Each VPC requires a separate internet gateway, which serves as a location for access control measures. Best practices advise users to guard every web gateway with a VPN.
  • NAT gateways: One-way gateways that enable outward connections from the VPC to the public internet.
  • Subnets: A subnet is a group of IP addresses linking assets within your VPC. VPC subnets can be public or private. Public subnets define resources users can connect with inside the internet gateway. Private cloud subnets are off-limits to public web users and connect to the NAT gateway.
  • Routers and route tables: Route tables define the movement of VPC network traffic. Routers use route tables to direct traffic to apps or data containers. Without a properly configured route table, elements of the VPC cannot communicate.
  • Security groups: VPC security groups operate like firewall rules at the instance level, regulating traffic between the private and public cloud.
  • Network access control lists (NACLs) provide security at the subnet level. They set rules for traffic that enters or leaves a subnet and block unauthorized users.
  • VPC peering: Sometimes, users need to connect resources on different Virtual Private Clouds. Peering uses IPv4 or IPv6 addresses to safely link VPC resources and ensure smooth data flows.

Benefits of using a Virtual Private Cloud

There are many reasons to deploy a VPC instead of relying on public cloud infrastructure or locally-hosted network resources. For instance, Virtual Private Cloud benefits include:

  • Easy scaling: Users can add VPC capacity as needed. They don’t need to install hardware or software solutions; they can purchase cloud space from vendors when needed.
  • Improved performance: Well-designed VPCs generally perform better than equivalent on-premises networks or public cloud resources.
  • Flexibility: Users can connect VPC infrastructure to the public cloud or on-premises assets. They can accommodate remote working arrangements and communicate across geographical regions without relying on public internet connections.
  • Security: VPCs provide secure work and data storage environments, provided cloud vendors update their infrastructure regularly. Logical isolation also makes VPCs more secure than relying on public cloud computing.
  • Value for money: Deploying a Virtual Private Cloud is cost-effective. Installation requires little human labor, and you can often rely on off-the-shelf solutions. Hardware overheads are low, while your cloud vendor should handle most maintenance needs.

Security challenges associated with using VPCs

One of the main benefits of virtual private cloud systems is that VPC deployments are usually more secure than public cloud alternatives and traditional networking.

However, using VPC in cloud infrastructure can create security vulnerabilities. Users should understand the risks before permanently moving assets to private cloud services.

1. Improper configuration allows paths from the public internet

Generally, attackers find it difficult to hop from a public cloud provider to private cloud assets. Isolation by VLANs and subnets minimizes the risk of unauthorized infiltration.

However, default subnet configurations can leave open routes to and from the external internet. Administrators may also fail to secure subnets via network access control lists. Hence, VPC best practices always include changing default configurations to reflect your cloud architecture.

Adding access control lists is also recommended. The absence of ACLs makes it easier for attackers to access subnets that should be restricted within the VPC.

2. Preventing lateral movement within the VPC

Malicious actors accessing VPC infrastructure can move between peered resources and seek compromised applications or storage containers. For instance, infrequently updated security rules may not cover virtual machines, raising the risk of data breach attacks.

Similarly, access control lists and subnets can become misaligned, enabling lateral access to resources that should be off-limits.

3. Ensuring secure access

The issues above are important, but unauthorized access is the most significant VPC cybersecurity risk.

Problems often arise when cyber attackers obtain credentials or breach firewall protection. Insecure service endpoints may enable easy access to the entire deployment. Weak access controls and privileges management can allow excessive access – exposing customer records or financial data.

When that happens, attackers can roam freely within a virtual private cloud and cause chaos. So, how should you secure access to your VPC and prevent unauthorized intrusions?

VPN coverage is essential. Site-to-site VPNs create secure connections between offices or remote work locations and your VPC gateway. When users log in, the VPN shields their activity, making credential theft attacks much less likely.

NordLayer enables users to connect directly to AWS or another cloud provider via a dedicated VPN. We recommend adding this security feature to ensure watertight private cloud security.

Major Virtual Private Cloud providers

VPCs are not mom-and-pop operations. Big global corporations usually host virtual cloud infrastructure and offer diverse products to suit client needs. Let’s run through popular cloud provider options before exploring how to perfect your VPC setup.

  • Amazon Web Services (AWS). AWS is the market leader in VPC services, claiming around 32% of all cloud hosting revenues. Users can rent virtual machines via the Amazon Elastic Compute Cloud (EC2) and use Amazon Relational Database Service (RDS) to manage databases in the cloud. Basic VPC is free, but extra costs apply for services like NAT gateways.
  • IBM Cloud. IBM’s VPC offering uses a Software-Defined Network (SDN) model to deliver VPC solutions. Users mix and match computing, storage, and networking architecture. Pay-as-you-use billing allows flexibility and cost-effective scaling.
  • Google Cloud. Google’s VPC is similarly flexible and covers every geographical region. Features include flow logs, peering, central firewall management, and free credits to get smaller businesses started.
  • Microsoft Azure. Azure is Amazon AWS’ main competitor. Microsoft’s VPC includes a built-in IPSec VPN, granular controls over communication between subnets, and peering and NAT gateways for maximum flexibility.

Securing access to a VPC with NordLayer

If you decide to use a VPC, you must also implement the right security options to safeguard your data and applications. NordLayer is compatible with the most popular VPC solutions and can enhance your security by protecting who can access the information stored there.

To secure your VPC, consider implementing the following measures:

  • Secure remote access: Users need secure access to resources and applications inside the VPC. NordLayer’s Site-to-Site VPN provides an encrypted tunnel. This allows secure access to the VPC without exposing data to public internet threats.
  • Preventing unauthorized access: NordLayer’s Cloud Firewall adds an extra security layer by allowing you to control who can access the VPC. You can restrict VPC access to authorized users, prevent accidental data leaks, and implement multilayered authentication methods with SSO and MFA. That way, you can double or triple-check identities before granting access.
  • Device Posture Security: NordLayer’s Device Posture Security ensures that only approved devices that meet company security policies can connect to the VPC. This reduces the risk of compromised or non-compliant devices accessing sensitive data.

NordLayer’s powerful suite of security tools makes it easy to protect your VPV and ensure that only the right users and the right devices can access your resources. We can help you benefit from VPC architecture without putting critical information at risk. To find out more, contact the NordLayer team today.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scalefusion Declares Day Zero Support for Android 15: Fresh Enrollment Ready!

At Scalefusion, our decade-long expertise in Android MDM empowers us to confidently deliver Day Zero support for Android 15 fresh enrollments. For over 10 years, we’ve been committed to equipping IT administrators with seamless, efficient device management solutions. With the release of Android 15, we’re continuing our legacy of ensuring that organizations are ready to manage their Android devices from day one.
Android 15
Android 15 for Enterprise
Our focus remains on providing prompt, comprehensive support that meets your evolving needs, while you focus on what matters most- your business.

What’s New in Android 15?

Android 15, introduces a range of features designed to enhance security and user experience. Here’s a quick overview of some of the standout features:
  • Enhanced Privacy Controls: Users now have more granular control over app permissions and data access, putting privacy in the spotlight.
  • Improved Performance: Android 15 brings optimizations for better battery life and faster app responsiveness.
  • Refreshed UI: A sleeker design with new themes, animations, and accessibility features.
  • AI-Powered Enhancements: From smarter predictive text to improved recommendations, AI integration is more powerful than ever.
  • Better Multitasking: Improved split-screen and pop-up views make multitasking a breeze.
  • New Widgets: Fresh and customizable widgets that elevate home screen personalization.
  • Security Enhancements: Advanced security measures, including more robust encryption, to protect user data.
  • Upgraded Messaging: Updates to messaging apps include scheduled messages and enhanced group chats.

Android 15 for Enterprise

Android 15 comes with specific improvements for enterprise users, making it easier for IT teams to manage devices and protect corporate data:
  • Advanced Security Features: Thanks to improved encryption, advanced threat protection, and robust compliance features, organizations can manage sensitive data more securely. These enhancements help safeguard corporate information against unauthorized access and data breaches.
  • Enhanced Device Management: With more flexible tools available for IT admins, device configuration and management across the organization become more efficient. The improved integration with Enterprise Mobility Management (EMM) solutions streamlines administrative tasks and policy enforcement.
  • Work Profile Enhancements: A more robust separation between personal and work data facilitates better security and privacy. This feature ensures that corporate data remains protected while allowing employees to enjoy their personal device experience without compromising sensitive information.
  • Zero Trust Integration: Built-in support for Zero Trust security models guarantees that every access request is verified. This enhancement strengthens security protocols by ensuring that only authenticated users and devices gain access to corporate resources.
  • Streamlined App Management: Easier access to enterprise apps, along with improved mechanisms for app updates, minimizes downtime for employees. This ensures that teams are always equipped with the latest tools and applications, enhancing overall productivity.

Get started with Android 15 and manage with Scalefusion

With Scalefusion and Android 15, unlock powerful new features and enhancements for enterprise device management, seamlessly. From stronger security protocols, including advanced encryption and zero trust compatibility, to improved work profiles that ensure better separation of personal and corporate data, Scalefusion provides robust tools to control and configure devices effortlessly. With enhanced APIs for efficient app management, faster deployments, and a smoother user experience with refreshed UI and multitasking capabilities, Scalefusion ensures your organization’s Android 15 rollout is secure, efficient, and future-ready. As Android 15 becomes the standard for devices worldwide, Scalefusion is committed to staying ahead, offering Day Zero support for fresh enrollments on this exciting new platform. We are eager to hear your feedback and are ready to assist with any questions or concerns as you transition to devices running on Android 15. Stay tuned for further updates as we optimize Scalefusion’s compatibility with the latest Android features.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Thinfinity Workspace 8.0 Clientless ZTNA 及 VDI 架構平台

Thinfinity Workspace 8.0 為企業提供了一個無需客戶端(Clientless)的零信任網絡存取 (ZTNA)和虛擬桌面基礎設施(VDI)平台,幫助企業實現高效管理和資源改善。該平台結合多 項先進技術,讓用戶可以隨時隨地安全架取、管理、配置及擴展虛擬資源,目前已受到全球超過 5000 家領先機構的信賴。

Thinfinity Workspace 提供 Universal ZTNA 支援,確保用戶無論是遙距還是現場,都能安全存取 企業資源。從設備到數據中心再到雲端,平台提供端點到端點的保護,實現無縫的使用體驗。對 於需要配置和擴展虛擬桌面和應用程式的企業,Thinfinity Workspace 提供自動化擴展和負載均 衡功能,並通過進階自動化技術簡化管理流程,降低營運成本,無論是在雲端還是本地環境中, 都能輕鬆應對業務需求的變化。

Thinfinity 的 Cloud Manager 是一個統一管理的入口,能夠在公共雲端與本地數據中心之間無縫 控制虛擬資源。企業可以靈活地選擇運行環境,實現高效運作與快速擴展,同時保持基礎設施的 完整控制。此外,Thinfinity 採用雲端中立的設計,允許用戶將資源遷移到雲端、保留本地部署, 或者採用混合環境模式,支援 AWS、Azure、Ionos、Google Cloud 等多種公共雲端,以及私家 數據中心,充分滿足企業多樣化的需求。

在業務應用方面,Thinfinity Workspace 支援從 ERP、CRM 到 SCADA、GIS 地圖及雲端原生應 用等多種類型的應用程式運行。其 Universal ZTNA 功能確保各類設備都能實現零信任安全存取 ,從而為遙距及本地用戶提供卓越的性能和無縫擴展性。身份驗證方面,Thinfinity 與 Google、Microsoft、Okta、Duo 等身份供應商和內部系統無縫整合,並通過基於角色的存取控制 (RBAC)技術加強安全性,為企業實現靈活的存取控制和精細的權限管理提供支援。

Thinfinity Workspace 還將安全性延伸至設備層面,讓員工及承包商無論使用個人設備還是公司 設備,都能通過零信任框架安全存取企業資源,完全不需要過時的 VPN 或繁瑣的設置。此外, 該平台不僅僅適用於資訊技術(IT)環境,也可無縫整合營運技術(OT)網絡,支援從企業核心 數據管理到工業操作的所有應用場景,確保不同設備和系統間的穩定性和性能。

Thinfinity Workspace 8.0 是企業 IT 基礎設施的最佳選擇,為實現數據主權、合規性以及資源改 善提供全方位支援。無論企業選擇運行於雲端、本地還是混合環境,都能依靠該平台實現高效運 作,真正做到靈活應變,超越期望。

關於 Thinfinity

在「隨處工作」的時代,有效的應用程式交付已成為現代企業成功的核心要素。Thinfinity 產品系 列專為簡化應用程式交付而設計,不僅操作簡便,價格合理,還能快速部署,讓您在任何設備上 都能輕鬆遙距存取所有應用程式、桌面和文件。自 2002 年起,我們始終致力於幫助各種規模的 企業及政府機構,在前沿技術與傳統客戶端 / 伺服器及大型主機系統之間架起橋樑。我們經驗豐 富的開發團隊專注於設計靈活的軟件解決方案,提升遙距桌面存取及傳統系統的效率與可移植性 ,為客戶帶來卓越的使用體驗。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×