Skip to content

Portnox Secures $37.5 Million Series B Funding to Revolutionize Zero Trust Security with Unified Access Control

With cybersecurity threats proliferating, Portnox is empowering companies worldwide to go passwordless, with cloud-native security solutions that adapt to complexity at scale.

AUSTIN, TX – April 8, 2025 – Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced it has closed a $37.5 million Series B funding round. This investment, led by Updata Partners, will be used to accelerate product innovation, expand market reach, and further empower resource-constrained security teams with accessible, enterprise-grade zero trust security. Portnox delivers the critical visibility and control enterprises need to secure access for every device and user across their IT eco-system, ensuring airtight access control in an increasingly perimeterless, high-risk world.

“Companies are replacing on-premises Network Access Control (NAC) with cloud-native zero trust solutions, which we estimate to be a multi-billion-dollar market. I’m proud that Portnox is leading the charge with a best-of-breed Unified Access Control (UAC) platform,” said Denny LeCompte, CEO of Portnox.

Jon Seeber, General Partner and co-manager of Updata Partners, has joined the Portnox Board of Directors. Updata focuses its investments on B2B software and technology-driven businesses and has invested in over 75 software businesses and completed over 55 exits. Seeber has been a member of Updata’s investment team since 2006. Before joining Updata, Seeber worked on the Business Development team inside IBM Global Services, managing acquisitions, divestitures, investments, and partnerships for IBM’s largest business unit.

“We see a massive opportunity in the shift to cloud-native security, and Portnox stands out with a uniquely unified approach to access control that’s both powerful and easy to adopt. The company’s leadership team has a deep understanding of the market and a clear track record of execution,” said Seeber.

Portnox delivers a unified access control platform – the Portnox Cloud – that brings together passwordless authentication, authorization, risk mitigation, and compliance enforcement for enterprise networks, applications, and infrastructure. Purpose-built for distributed organizations with complex IT environments, Portnox Cloud is 100% cloud-native and offers unparalleled ease of use coupled with the robust security capabilities needed to protect against increasingly sophisticated attacks.

Portnox’s focus on simplifying security and delivering best-of-breed access control solutions has resonated strongly with the market, as evidenced by its nearly 1,000 global customers, 95% customer retention rate, and 4.6-star rating on Gartner Peer Insights. Over the past year, Portnox has received numerous industry accolades, including recognition from SC Media, Cyber Defense Magazine, Cybersecurity Breakthrough Awards, and SC Awards Europe.

The investment by Updata Partners builds upon Portnox’s $22 million Series A round of funding led by Elsewhere Partners in 2022, bringing the total investment in the company to $59.5 million.

About Updata Partners

Updata Partners is a leading technology-focused growth equity firm in Washington D.C. with over $1.5 billion in committed capital. Led by an investment team averaging more than 25 years of technology experience, Updata invests in high-growth B2B software and software-driven businesses where the combination of capital and operating experience will help accelerate success. To learn more, visit https://www.updata.com.

About Elsewhere Partners

Elsewhere Partners, a tech-focused private equity firm, invests in growth-ready lower middle market software companies around the globe. Elsewhere’s team of experienced investors and software operators tailor growth plans for each unique portfolio company and offer complementary support across go-to-market, product, talent, finance, and strategy functions. Based in Austin, TX, Elsewhere has invested in 18 companies throughout North America, Europe and Israel since its inception in 2016. To learn more, visit https://elsewhere.partners.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Secure Remote Desktop in 2025: 5 Strategic Priorities for Zero Trust and Hybrid VDI Success

 

Executive Summary

Enterprises are rethinking how remote desktop access is delivered. With hybrid work, increasing endpoint diversity, and regulatory complexity, legacy VPN and rigid VDI architectures are no longer viable. The strategic shift is toward platforms that unify access, reduce infrastructure burden, and enforce Zero Trust principles.
Thinfinity® Workspace offers a modern answer—a ZTNA-native, hybrid-ready remote desktop solution that gives enterprises full control across cloud and on-prem environments without compromising security or flexibility.

Strategic Drivers: Why Secure Remote Access Needs to Change

The shift to hybrid work has made secure access a critical layer of business continuity and digital infrastructure. Yet, many organizations still rely on VPNs and legacy VDI tools that were never designed for dynamic, identity-based access.
Key strategic trends driving change:

  • Growing pressure to support BYOD and external contractors
  • Increased adoption of multi-cloud and hybrid IT environments
  • A need for ZTNA enforcement to replace VPN tunnels
  • The desire for operational simplicity and faster provisioning

Thinfinity Workspace supports this evolution through its integrated gateway architecture, enabling secure remote access without relying on external VPNs or third-party ZTNA tools.

DaaS vs. Traditional VDI: A Fragmented Landscape

As enterprises modernize their access strategies, many find themselves caught between two suboptimal options: traditional VDI infrastructure, which is often rigid and resource-intensive, and cloud-based DaaS platforms that may lack architectural flexibility and integration depth.

Traditional VDI stacks—like those built on Citrix or Horizon—typically involve tightly coupled components, complex licensing models, and a high operational burden for IT teams. Meanwhile, many DaaS offerings constrain enterprises to vendor-managed environments or single-cloud lock-in, limiting the ability to customize or extend deployments.

Thinfinity Workspace Offers a Smarter Path Forward

Thinfinity Workspace delivers a more adaptable model by combining the strengths of both approaches, while eliminating their constraints:

  • Supports both cloud and on-prem virtualization—allowing seamless orchestration across hypervisors and cloud providers
  • Scales effortlessly across hybrid infrastructures—supporting dynamic resource provisioning and multi-broker deployments
  • Centralizes session control with built-in Zero Trust Network Access (ZTNA)—no need for VPNs or third-party access gateways
  • Offers a full range of access options—including browser-based sessions, RemoteApp mode, and native desktop clients for optimal user experience

This hybrid flexibility enables organizations to evolve at their own pace—without compromising security, compliance, or performance.

 
Infographic comparing VDI, DaaS, and Thinfinity Workspace: highlights flexibility, ZTNA, hybrid support, and access options.
Capability / Use CaseThinfinity WorkspaceCitrixVMware HorizonMicrosoft AVDAwingu
Built-in ZTNA Gateway✅ Yes⚠️ Partial✅ Partial
Browser + Native Access✅ Full Support⚠️ Add-on✅ Native✅ Yes✅ Browser Only
Hybrid On-Prem + Cloud Delivery✅ Seamless⚠️ Complex✅ Partial❌ Azure Only❌ On-Prem Only
Session Control & Compliance✅ RBAC, MFA, Audit✅ Yes✅ Yes✅ Yes✅ Yes
Automation / API Access✅ REST, PowerShell❌ Complex⚠️ Limited⚠️ Limited❌ No API
High-Performance / GPU Workloads✅ 16 Monitor Support✅ Yes✅ Yes✅ Azure NV⚠️ Limited

Strategic Use Cases Across Modern Enterprise Workflows

Thinfinity Workspace is purpose-built to address the evolving access needs of enterprise environments—supporting multiple roles, devices, and security postures across industries. Here are four key use cases where Thinfinity delivers strategic value:

Remote Workforce Enablement

Thinfinity enables secure, policy-driven access to desktops and applications from any browser or device—ideal for hybrid teams, contractors, and BYOD scenarios. With native support for identity federation (SAML, OAuth), MFA, and device-agnostic access, IT teams can confidently extend access to distributed users.

Thinfinity enables secure, policy-driven remote desktop access from any browser or device, supporting BYOD, MFA, and identity federation.

High-Compliance & Regulated Sectors

Organizations in healthcare, finance, legal, and government must enforce strict access controls and maintain audit-ready environments. Thinfinity delivers compliance-aligned access with granular RBAC, session recording, full session logs, and support for HIPAA, GDPR, ISO 27001, and SOC 2 requirements.

Thinfinity supports compliance with HIPAA, GDPR, and ISO 27001 by enabling secure access controls, RBAC, and full session auditing.

Design, Engineering & GPU Workloads

Engineering, architecture, and creative teams rely on resource-intensive applications. Thinfinity supports GPU acceleration, multi-monitor setups, and RemoteApp mode—delivering seamless access to CAD, 3D rendering, and media production tools through a browser or native client, even in hybrid cloud setups.

Thinfinity enables GPU-accelerated, multi-monitor remote access for CAD, 3D, and design apps via browser or native client in hybrid setups.

Modern Developer Workflows

From legacy Windows applications to internal web platforms and remote shell environments, today’s development teams need flexible, secure access to a diverse range of resources. Thinfinity Workspace empowers developers to securely publish VirtualUI-enabled desktop applications, connect to Linux environments via SSH, and access internal portals—all without relying on VPNs or endpoint installations. It also supports virtual machine and cloud infrastructure administration, enabling DevOps teams to manage on-prem or cloud-based dev environments through a centralized, policy-controlled interface. This makes Thinfinity an ideal fit for secure, modular, and scalable DevOps workflows.

Thinfinity enables secure, VPN-free access to dev tools, SSH, internal portals, and VM or cloud admin for modern DevOps workflows.

Endpoint Control and Experience Management: The Next Battleground

As hybrid workforces grow, endpoint variability becomes a top concern for IT and security leaders. Managing a mix of personal, unmanaged, and kiosk devices—without sacrificing control or compliance—requires a new approach to remote access.
Thinfinity Workspace eliminates endpoint complexity by design. It transforms access into a secure, identity-driven process, regardless of the user’s device or location:

  • Clientless access via browser, with no local software installation
  • Secure sessions from unmanaged, personal, or shared devices, fully isolated and policy-enforced
  • Integration with modern identity platforms (SAML, OAuth) for seamless SSO and centralized authentication
  • Support for PKI certificates, FIDO2 Passkeys, and passwordless login workflows, ensuring secure authentication without friction
  • Fine-grained session restrictions, including clipboard, printing, and file transfer controls
Thinfinity enables secure, clientless remote access with SAML, OAuth, PKI certificates, Passkeys, and device-agnostic session controls.

With Thinfinity, remote desktop access becomes truly endpoint-agnostic—reducing IT overhead, increasing agility, and enhancing the user experience without compromising security posture.

Strategic Action Points for CIOs and I&O Leaders

Eliminate VPN reliance by adopting access platforms with native ZTNA controls.

Support hybrid infrastructure by selecting a vendor that works across hypervisors, clouds, and physical networks.

Automate access management via API integrations and policy orchestration.

Prioritize visibility and governance with auditing, analytics, and fine-grained session control.

Plan for scalability by choosing a solution that supports both browser-based and native workflows.

Thinfinity Workspace meets all these priorities in a single, manageable platform.

 
Strategic priorities for CIOs: eliminate VPNs, support hybrid infrastructure, automate access, enhance visibility, and ensure scalability.

Final Word: Secure Remote Desktop Is a Strategic Pillar—Not a Stopgap

Secure access to digital workspaces is no longer a tactical necessity—it’s a foundational component of enterprise resilience, security posture, and operational scalability.

Thinfinity Workspace offers a modular, secure, and future-ready platform to:

  • Unify remote desktop and application delivery
  • Secure workforce access with built-in Zero Trust principles
  • Scale across hybrid and multi-cloud environments
  • Reduce operational burden while improving user experience

To understand how Thinfinity Workspace fits into your secure access roadmap, visit cybelesoft.com/thinfinity/workspace.

 

About Cybele Software Inc.
We help organizations extend the life and value of their software. Whether they are looking to improve and empower remote work or turn their business-critical legacy apps into modern SaaS, our software enables customers to focus on what’s most important: expanding and evolving their business.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Granular policy controls: a flexible way to manage company-wide settings

When you’re ensuring thorough organizational security, company-wide settings can be a tricky business. You need them to be strict enough that all employees must comply with the rules, but you also need just enough flexibility to ensure everyone accesses sensitive information on a need-to-know basis.

To help organizations manage their internal security with more flexibility, NordPass offers granular policy controls—an addition to company-wide settings that lets companies assign more precise access controls to employees based on their needs and responsibilities.

What are granular policy controls and why are they necessary?

Organizations often face the challenge of determining the appropriate security measures across teams and individual employees. While globally applied policies can seem like the optimal option, in reality, they may grant overextended access to employees who should otherwise be restricted from accessing certain rights or advanced tools. This lack of access restrictions on a privilege level can lead to mismanagement and open up the organization to security risks.

NordPass tackles this issue, allowing businesses to control their security practices and access management as they see fit. With this functionality, organizations can set specific security policies at the organizational, role, or individual user level. This ensures that all employees can work efficiently based on their duties, setting a higher security standard in the organization.

How do granular policy controls work?

Granular policy controls are available with the NordPass Business, Teams, and Enterprise plans. The granular adjustments are managed by organization Admins and Owners using the Admin Panel based on member scope and particular policies.

Granularity scope

Before the introduction of granularity, all policies in NordPass were set globally, meaning that all organization members received the same access privileges without exception. With granular controls, Admins and Owners can set more precise access rights for members based on three criteria: whole organization, roles, or individual users.

Policy scope

The scope also is flexible across different policies. For instance, if only your Legal and Sales teams need access to the Guest Sharing policy, you limit it so that only select employees or teams with the appropriate role can access it. You can also flexibly adjust the requirements individually; for instance, employees in more sensitive roles may be required to adhere to a stricter password policy than staff in other roles.

The NordPass granular policy controls apply to the following company-wide settings:

  • Password Policy: you can customize and enforce password rules for the organization or different roles.

  • Guest Sharing: you can allow or disallow the ability to share sensitive information with contacts outside the organization.

  • Exporting: you can allow or disallow members of the organization to export sensitive data.

  • Autolock: you can define different inactivity periods before NordPass is automatically locked for different roles and individuals.

  • Browser extension lock: you can control browser extension behavior and set whether it can remain unlocked based on the role or individual member needs.

  • Multi-factor authentication (MFA): you can enforce MFA to ensure a higher security level for the organization, specific roles, or selected employees.

  • Email Masking: you can allow or disallow the organization, select roles, or individual members to use decoy email domains to protect their work email accounts.

The benefits of granular policy controls

NordPass’ granular policy controls solve a massive issue for business security: companies are no longer forced to apply global policies. Each team can adapt to higher security standards as role-specific rules reduce the likelihood of miscommunication and accidental or malicious access to sensitive materials.

Organizations that handle sensitive information can impose stricter and more accurate data management practices. With granularity ranging from the individual to the full organization, it offers an easier way to delegate security-related roles and responsibilities, such as sharing data with external partners.

Establishing granular access controls can help companies embarking on compliance journeys to meet the necessary regulatory criteria. Administrators can easily decide which settings must have more restrictive access and which can be more lax. This can protect organizations from unnecessary internal risks or human error and ensure a smoother workflow across teams.

Granular policy controls can also take device security into account. For instance, customizing autolock time requirements allows the organization to provide safeguards for all accounts while simultaneously keeping the workflow uninterrupted for those employees who are not exposed to critical access and can have a longer autolock period. MFA helps provide safer access to sensitive data, especially for employees who may be working remotely or traveling to industry events.

Granular policy controls allow organizations to build a more comprehensive data security system and maintain a clear and flexible cybersecurity standard that takes employee productivity and designated roles into account.

Secure your business with NordPass

Granular policy controls join the long list of NordPass functions that help achieve a higher level of cybersecurity in your organization—here, by enhancing company-wide settings with more precise access controls. With NordPass, you can store sensitive company data in XChaCha20-encrypted storage and share it with colleagues without compromising it. NordPass helps you stay ahead of data breaches with features like the Data Breach Scanner and Password Health, alerting you if your domains or email addresses appear on the dark web and checking your saved credentials for compromised, outdated, reused, or weak passwords.

Put your organization’s cybersecurity first without putting your team’s productivity on the back burner. Find the right NordPass plan for your business and enhance your credential security today.

 

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×