Skip to content

Storware Backup and Recovery 7.1 新版本 將於 2025 年 1 月 1 日 正式推出

Storware Backup and Recovery 7.1 全新登場,帶來跨虛擬平台的強化還原功能、更豐富的儲存選項,及支援更多的操作系統。這一版本為公司企業提供更高的靈活性與效率,助力在多元化虛擬環境中實現數據還原與遷移。

Storware 7.1 重點新功能:

  • 跨虛擬化平台還原與遷移功能:Storware 7.1 引入了先進的跨虛擬化平台還原能力,允許在不同虛擬化平台之間進行虛擬機(VM)還原,例如 VMware vCenter / ESXi 與 OpenStack / Virtuozzo。此外,新增的 VM 對 VM(V2V)遷移功能,支援將 vSphere 虛擬機無縫遷移至 OpenStack 環境,為整合與改善多雲端基礎設施提供了便捷的解決方案。

  • 擴展的儲存支援:為滿足日益增長的數據保留與災難還原需求,Storware Backup and Recovery 7.1 現在支援 Ceph RBD 和 Nutanix Volume Groups 作為次級備份目標。此功能確保關鍵數據在多種儲存系統中安全可靠,並為儲存管理提供更高靈活性。

  • 操作系統支援更全面:Storware 7.1 將操作系統代理(OSA)功能擴展至 macOS,幫助企業在更廣泛的操作系統中實現數據保護策略的統一。此外,新版本完全支援 Canonical Ubuntu 24,進一步鞏固了其在多元化 IT 生態系統中的應用能力。

  • 更智能的備份策略配置:根據用戶意見反饋,7.1 版本新增常用路徑清單功能,幫助 IT 管理員更快速地設置備份策略。新功能還包括 Windows 和 Linux 系統的預設排除條目,大幅降低配置的複雜性。除此之外,此版本還支援 Proxmox VE 虛擬機磁碟級別設置,用戶可以更靈活地進行還原操作。

  • 支援新備份來源:Storware 7.1 現在支援 VergeOS 作為備份來源,為該 VMware 替代方案的超融合基礎設施提供全面保護。

  • 全新 Storware 備份設備:Storware 首次推出實體與虛擬兩種形式的備份設備(Backup Appliance)。這款設備集成了多功能特性,並採用基於 ZFS 的重複數據刪除技術,是全球最具靈活性的備份解決方案之一。

Storware Backup and Recovery 擁有強大的數據管理與保護能力,幫助公司企業在當前數據驅動的環境中保持穩定與安全,避免勒索軟件與其他威脅的侵襲,並促進業務的持續發展。立即免費試用,或享受 60 天免費試用期!

關於 Storware

Storware 是一家專注於備份軟件的企業,擁有超過十年的行業經驗。Storware 的備份與還原解決方案適用於各種數據環境,無論是虛擬機、容器、儲存提供商、Microsoft 365 還是運行在本地或雲端的應用程式,均能提供支援。其小巧的設計使其能夠無縫整合進現有的 IT 基礎設施或企業級備份方案中,提供極為便捷的備份保護。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Parallels® RAS 榮獲 TrustRadius 「Buyer’s Choice」獎項






Parallels 非常榮幸宣布,Parallels® RAS(遙距應用伺服器)榮獲備受推崇的 TrustRadius「Buyer’s Choice」獎項!這項殊榮不僅肯定了 Parallels 致力於提供卓越解決方案的努力,也突顯了 Parallels® RAS 對全球各行各業的深遠影響。

從強大的功能到卓越的性價比,這個獎項展現了 Parallels® RAS 如何在業界脫穎而出。同時,它更具意義的地方在於,這是基於用戶的真實反饋,也就是每天使用並信賴 Parallels 產品的客戶心聲。TrustRadius 是全球備受尊敬的 B2B 技術評價平台,以透明和真實為宗旨,僅發布經過驗證的客戶評價。能夠獲得這項認可,充分說明用戶對 Parallels® RAS 的價值與效能充滿信心,這種信心正是 Parallels 持續創新與提升的動力來源。

卓越功能:可靠且靈活的解決方案

Parallels® RAS 一直因其卓越功能而備受讚譽,這也是 Parallels 贏得 TrustRadius「Buyer’s Choice」獎項的關鍵因素之一。

根據調查,Parallels 的客戶中有 75% 評價 Parallels®RAS 提供了業界頂尖的功能。

Parallels 的解決方案支援用戶安全、無縫地遙距存取應用程式、桌面及數據,確保企業能在任何設備上隨時隨地高效運作。隨著遙距與混合辦公模式成為主流,Parallels®RAS 幫助 IT 團隊以最低的管理成本支援分布式辦公室,提升企業生產力。幾項令 Parallels®RAS 脫穎而出的核心功能包括集中化 IT 管理、簡化部署流程以及高水準的安全性。此外,Parallels 的解決方案還能無縫整合 Microsoft Azure、Azure Virtual Desktop 和 Amazon EC2 等雲端服務,特別適合擁有混合雲或多雲端架構的企業。

憑藉這些功能,Parallels®RAS 成為虛擬應用與桌面交付技術的領導者,能夠滿足各類企業的需求。

卓越性價比:為客戶創造最大價值

Parallels®RAS 獲得「Buyer’s Choice」獎項的重要原因之一是 Parallels 提供了無與倫比的性價比。

客戶一致認為,Parallels®RAS 不僅功能強大,價格也非常具競爭力,避免了傳統解決方案中常見的高昂授權與維護成本。Parallels 的定價結構讓無論是中小型企業還是大型企業,都能以合理的預算受益於先進的遙距存取技術。同時,Parallels 還提供高度可擴展的解決方案,滿足不同行業的特定需求。

West Derby School 的 IT 經理 Chris Little 在 TrustRadius 平台分享道:「我們用 Parallels®RAS 替代了過時的 Microsoft 遙距桌面方案,這讓我們能以最安全的方式向教師提供遙距桌面服務,無論他們使用何種設備。」

Parallels®RAS 的成功歸功於其簡單明確的並行授權模式,結合高品質的產品,幫助眾多企業在遙距工作浪潮中保持競爭力。

用卓越服務與客戶建立信任

TrustRadius 的「最佳關係」獎項特別關注客戶對產品整體體驗的反饋,包括再次購買的意願、產品性能是否符合預期,以及銷售與支援團隊的互動質量。

這些反饋表明,Parallels®RAS 不僅是一個解決方案,更是一個全面的支援系統 —— 從最初的產品選擇到部署及後續使用,Parallels 都全程伴隨客戶。Parallels 始終將與客戶的緊密合作放在首位,致力於了解並超越客戶的期望。同時,Parallels 的專業團隊提供快速、有效的支援,幫助客戶輕鬆解決各種挑戰。

此次獲得 TrustRadius 「Buyer’s Choice」獎項,進一步肯定了 Parallels 在客戶關係與產品創新方面的持續努力。

未來,Parallels 團隊將繼續秉持創新、實惠和以客戶為中心的理念,提供更卓越的解決方案,幫助全球企業在不斷變化的工作環境中實現突破性發展。

關於 Parallels

Parallels 是全球領先的跨平台解決方案品牌,為公司企業和個人用戶提供簡單的方式,讓他們在任何設備或操作系統上使用和存取所需的應用程式和檔案。無論是 Windows、Mac、ChromeOS、iOS、Android 還是雲端服務,Parallels 都能幫助客戶充分利用最佳技術。Parallels 解決了複雜的工程與使用者體驗問題,讓企業和個人用戶能夠隨時隨地簡單且具成本效益地使用應用程式。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Enhance Windows Device Security with Scalefusion’s GeoFencing for Windows

Organizations have become heavily dependent on Windows-based laptops and desktops. According to Statcounter, Windows holds the largest market share at 73.41% as of October 2024[1]. This makes managing and securing Windows devices and the data they contain, a critical aspect of security.

To enhance these management and security efforts, Scalefusion UEM offers GeoFencing for Windows devices, a feature that automatically secures Windows devices and data based on their physical location. By defining specific geographic boundaries, businesses can proactively enforce security measures, ensuring that devices entering or leaving these zones are automatically protected.

GeoFencing for Windows 

To provide you with a better understanding, this blog explains how Scalefusion’s GeoFencing for Windows can enhance the security of your Windows-based devices and servers, keeping your data safe and secure.

Understanding GeoFencing for Windows 10 and above Devices

Geofencing is a virtual perimeter that allows organizations to create predefined virtual boundaries around real geographic areas. For Windows devices, geofencing enables IT administrators to restrict user’s actions on the device based on its location.

By defining these virtual boundaries through a Unified Endpoint Management solution, organizations ensure that devices comply with their security protocols when entering or leaving designated zones. This includes restricting access to sensitive data, enabling specific apps, and sending alerts to administrators.

Geofencing works by using location-based services such as GPS, Wi-Fi, or cellular networks. When a Windows device crosses the defined boundary, it triggers pre-configured actions automatically. For instance, if a device exits an organization’s premises, it may block access to its networks or resources.

This capability enhances security by preventing unauthorized access risks and improves operational efficiency by automating policy enforcement, making geofencing a critical feature for modern IT management.

The need for Windows GeoFencing in modern enterprises

In the early stages of geofencing, it was primarily used by retailers to send SMS notifications to potential customers, driving engagement and foot traffic. However, with the advancements in tech and a sudden rise in the use of mobiles and desktops in enterprise settings, geofencing capabilities also evolved.

Today, modern enterprises use geofencing to monitor and manage fleets of endpoints, including mobile devices, desktops, and laptops based on their location. While geofencing initially gained traction for tracking Android and iOS devices, its application expanded with the increasing reliance on Windows-based desktops and laptops.

Organizations today are heavily reliant on Windows devices for daily operations. The significance of geo-fencing in modern businesses lies in its ability to provide real-time device location. Geofencing addresses the growing need for location-based security, ensuring sensitive organizational data remains protected based on device location.

Irrespective of the type of workforce – on-premise, remote, or globally distributed, organizations face common challenges like managing a large inventory of Windows devices, securing sensitive data, and adhering to compliance standards. Geofencing addresses them by enabling IT admins and businesses to define rules and policies based on the device location for maintaining device and data security.

For CIOs and IT admins of modern-day enterprises, adopting Windows geofencing is not just about enhancing security – it’s about staying ahead of modern IT challenges. Geofencing aligns context-based device management with current business needs, allowing enterprises to operate smarter and more efficiently.

With vs. Without GeoFencing: A comparison

The table below highlights the key differences between operating with and without geofencing, demonstrating how it enhances security, compliance, and device management.

AspectWithout GeofencingWith Geofencing
Data SecurityIncreased risk of unauthorized data access.Restrict access to sensitive data or applications outside designated zones.
Device Usage ControlLack of control over device usage in sensitive locations.Monitor company devices or assets across multiple locations.
Compliance ManagementChallenges in ensuring compliance with local policies.Ensure adherence to data protection laws by enabling location-based policies.
Device LocationUnable to track the location of lost or stolen devicesTrack the exact location of the lost, unattended, or stolen devices

Industry-Specific Use Cases of Windows GeoFencing

Windows devices are widely adopted across industries due to their versatility, scalability, and extensive software compatibility. Below are use cases of industries that benefit from Windows geofencing:

1. Corporate Sector

Corporate organizations rely on Windows devices for tasks such as document creation, collaboration, and accessing business applications. Geofencing helps enforce location-based policies to secure data access by ensuring knowledge workers can access devices and company resources only within designated office premises or authorized locations.

For instance, a consulting firm like Deloitte may use geofencing to restrict access to confidential project files and applications on Windows devices to office premises or approved locations, ensuring data security and compliance.

2. Healthcare

Healthcare organizations maintain private patient records on their devices. Geofencing ensures that sensitive patient data can only be accessed within designated hospital or clinic premises, reducing the risk of data breaches.

For example, a hospital using Windows laptops and tablets ensures compliance with HIPAA by geofencing access to devices with medical records on hospital premises.

3. Education

Modern educational institutions have IFPDs installed for teaching purposes. Moreover, students use Windows devices in computer labs. Geofencing ensures that when these devices are within campus boundaries students and teachers access only appropriate websites and applications maintaining a controlled environment.

For instance, a university deploys Windows laptops for exams and geofences them to specific classrooms, ensuring students cannot access external networks or resources during the test.

4. BFSI

Windows devices in banks and financial institutions are used for maintaining customer transactions and data. Geofencing restricts access to sensitive customer databases to office locations, ensuring compliance with financial regulations such as PCI DSS.

For example, a bank like JPMorgan Chase must use geofencing to ensure financial data on their Windows devices is accessible only within branch locations or secure office environments.

Key features of Windows GeoFencing with Scalefusion UEM

Windows Geofencing

Scalefusion’s Windows Geofencing allows you to track the movement of Windows-based devices and servers across predefined geographical boundaries. This feature creates a virtual perimeter around a specific region, enabling seamless tracking of Scalefusion-managed devices as they enter or exit the designated area. Here are some features you get to leverage:

1. Customizable Geofences

Scalefusion enables you to remotely create and manage multiple geofences at once. You can create two types of geofences for your Windows devices:

a. Circular GeoFence

A circular geofence creates a defined area based on a central point and a specified radius. This type of geofence is ideal for straightforward work locations. For example, users can access applications or log in to their devices only within the boundaries of an office or a school building. Circular geofences are quick to configure and particularly effective for smaller or regularly shaped areas.

b. Polygonal GeoFence

A polygonal geofence offers more granular customization allowing users to draw irregular boundaries on the map. This feature is useful for complex or non-standard locations, such as large industrial zones or university campuses. By marking precise points on the map, IT administrators can establish more accurate boundaries, ensuring that devices are managed in line with the specific location needs.

2. GeoFence-based Switch Profile

Scalefusion’s Windows Workflows lets you schedule automatic switching to pre-configured device profiles based on the GeoFence event. For example, school laptops can automatically switch to a restricted profile when they enter a geofenced campus, limiting access to educational apps and websites. However, outside the campus, they may revert to a flexible device profile while still maintaining essential security controls.

3. GeoFence Compliance

GeoFence Compliance allows you to create compliance based on the ‘moved in’ and ‘moved out’ events. For example, a hospital can create a GeoFence around its premises, restricting the access of sensitive patient data to devices once they enter the fenced area. This helps healthcare organizations maintain compliance with regulations like HIPAA, ensuring that patient information is protected while blocking data access outside designated areas.

4. GeoFence Logs

Geofence logs record device activity whenever a device enters or exits the designated geofenced area. These logs include precise timestamps of each event for accurate tracking.

5. Real-Time Alerts

Scalefusion provides real-time notifications in case a device breaches a geofence. This allows you to take timely data security measures such as remote data wipe and device lock. Real-time alters enable you to make informed decisions to ensure data security by preventing device or data abuse.

Read More: How to Set Geofence for Windows Devices?

Take a step towards advanced Windows Geofencing with Scalefusion UEM

Scalefusion UEM Windows Geofencing offers a simple and effective way to enhance security and manage devices based on location. By setting up customizable geofences and automated workflows, you can ensure that devices stay secure and compliant, on-site or remote. Scalefusion UEM is a smarter step towards modern Windows device management for your IT teams.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET publishes 2023 Carbon Footprint Report: A commitment to sustainability and transparency

BRATISLAVADecember 4, 2024ESET, a global leader in cybersecurity solutions, is proud to announce the publication of its 2023 Carbon Footprint Report. This comprehensive report underscores ESET’s dedication to transparency, accountability, and environmental sustainability, reflecting the company’s ongoing efforts to mitigate its environmental impact and progress toward a net-zero future.

The report reveals that ESET Group’s total carbon footprint for 2023 is 8,146.34 tonnes CO2e using the location-based method and 7,835.06 tonnes CO2e using the market-based method. Greenhouse gas (GHG) emissions per employee amount to 3.38 tonnes CO2e. The majority of the total carbon footprint comes from indirect emissions within ESET Group’s value chain (Scope 3), representing 79% of all emissions.

Compared to 2022, ESET Group’s total GHG emissions increased by 25%, with GHG emissions per employee rising by 16%. The increase is attributed to the inclusion of additional offices previously excluded from data collection, increased business travel attributed to the significant and lasting changes in how businesses operate, driven by the adaptations made during the COVID-19 pandemic, an increase in the number of employees (by 7%), as well as a return to offices in most locations, and more accurate data collection overall year on year.

Despite these increases, ESET has made significant strides in reducing emissions from stationary combustion and fugitive emissions, thanks to implementing various measures to ensure efficient use of heating and cooling through timers, thermostats, and zoning in many offices. That has resulted in an 11% decrease in emissions from stationary combustion, which is due to the use of natural gas and CNG for heating, an 82% decrease in fugitive emissions for A/C unit leakages, and only a 1% increase in purchased heat emissions.

Palo Luka, ESET’s Global COO, said: “We remain committed to our Global Environmental Strategy and will continue to work tirelessly toward reducing our environmental impact. We plan to do this by increasing the use of renewable energy, enhancing energy efficiency, and promoting sustainable practices across all our operations, individually through employees, business partners, and throughout our supply chain. Our ultimate goal is to leave the planet in a better state for future generations.”

According to Luka, the use of renewable energy helps create demand for more sustainable technologies, and the company’s hope is that, where possible, they can contribute toward influencing more options and higher-quality renewable energy sources. In 2023, 36% of electricity consumed in our offices around the world is from renewable sources, with emissions from purchased electricity category contributing the most to the company’s Scope 2 emissions (87%). Furthermore, although energy consumption in our external data centers has increased by 17% between 2022 and 2023, the emissions from external data centers are almost zero as ESET is using responsible providers and 100% renewable energy. 

Read the full report here.

Read about ESET’s commitment to environmental sustainability here.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Delta-first or traditional? Choosing a migration approach

Choosing the right migration approach for your project

A successful migration starts long before you move the first file, and the consequences of insufficient planning and preparation can be disastrous. Back in 2019, British bank TSB locked millions of customers out of their accounts, following a failed IT migration. In 2022, the bank was fined over £48 million for its failure to manage the migration effectively. 

Three migration approaches: pros and cons

1. Traditional migration (waterfall methodology)

The traditional approach involves migrating bulk mail and drive items, followed by regular, smaller (delta) migrations of new and modified files. 

By moving bulk data upfront and capturing recent files with delta migrations, traditional migrations minimise downtime. There are some drawbacks – you need robust processes to track, detect, and sync delta migrations accurately. And the initial bulk migration is resource-intensive. 

Traditional migrations are linear, making it harder to change tactics once the project is in motion. This type of migration is a solid fit for high-volume systems with active users but might be too rigid for simple migrations or time-limited projects. 

2. Delta-first migration

Delta-first migrations are like traditional migrations in reverse. 

New and recently updated (delta) data is migrated first. Then historical (bulk) data is migrated later. It’s a less conventional approach but gives users immediate functionality with minimal operational impact.

Teams can move into the destination platform faster, and incremental delta migrations mean the bulk migration is smaller (and faster). 

There are limitations, though. You need to maintain source and destination platforms throughout the migration. Separating delta and bulk data requires robust tracking mechanisms to manage transfers. Dependencies between delta and bulk data mean certain files may not function properly until the full migration is complete, and you need to sync both data types continuously.

3. Google migration mould (domain switch)

A Google migration mould lets users keep their domain name when moving from an existing Google workspace to a new one. A company could benefit from this approach if they’re moving to a new workspace but need to keep their existing domain name and email addresses. 

There’s a specific methodology which requires temporary domains to do the bulk migration, and a domain switch during the delta migration. Google’s tailored advanced migration settings such as selective data transfers and preserved permissions for shared drives, calendars, and files make the process easier. 

There are drawbacks though – Google API limits restrict the number of daily data transfers, and certain types of data (such as comments in a document) might not be migrated. Using a cloud migration service can get you past some of these limitations.

How to know which migration approach is right

To determine the right approach for your next migration, we recommend you work backwards. The most pressing outcome of the migration will most likely dictate the approach:

Goal: Limited downtime and business continuity

If limited downtime and business continuity are your main focus, a traditional approach ensures historical data is available for your go-live date. You can migrate users simultaneously with a big bang cutover, and avoid downtime by scheduling the migration over a weekend or planned closure. 

Goal: Speed

If you’re looking for speed, choosing not to migrate permissions on folders and files, selecting a specific date range (e.g. the last 12 months’ data), and getting users to delete unwanted data can speed things up. 

Goal: Vacating incumbent platform immediately

If your priority is vacating the platform immediately, a delta migration that moves recent data – say, 30 days’ worth – means you can go live fast. Then, you can backfill your target destination with historical data post-cutover. 

Other factors that influence how quickly you can complete a migration include:  

  • Amount and type of data
  • Data per user 
  • Folder, file, and email count
  • Media (MIME) types 
  • A lack of documentation for legacy systems 
  • Ability to coexist in two different environments

Can you combine migration approaches?

Combining migration approaches is possible and may in some cases be necessary to work around more complex migration scenarios and conflicting goals. Here’s an example:

A multinational company wants to prioritize its specific users and teams in their migration. The company completes a bulk migration for non-critical users and shared drives during planned downtime. Then, the company completes a delta-first migration for critical teams and executives’ recent data (e.g. the last 30 days) into the target system for immediate access. Historical data is backfilled post-cutover to limit delays.

CloudM can help you make the best choice

You can count on CloudM Migrate for a smooth migration. Choose from white glove migration services where we take care of the migration for you. Or get tailored training and advice through our consulting services that equip your team with the skills to deliver frictionless migrations.

About CloudM
CloudM is an award-winning SaaS company whose humble beginnings in Manchester have grown into a global business in just a few short years.

Our team of tech-driven innovators have designed a SaaS data management platform for you to get the most from your digital workspace. Whether it’s Microsoft 365, Google Workspace or other SaaS applications, CloudM drives your business through a simple, easy-to-use interface, helping you to work smarter, not harder.

By automating time-consuming tasks like IT admin, onboarding & offboarding, archiving and migrations, the CloudM platform takes care of the day-to-day, allowing you to focus on the big picture.

With over 35,000 customers including the likes of Spotify, Netflix and Uber, our all-in-one platform is putting office life on auto-pilot, saving you time, stress and money.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×