Skip to content

How to lock apps on an iPhone

What’s the difference between locking and hiding an app?

The difference between locking and hiding an app is that locking leaves the icon in view but guards its contents behind Face ID, Touch ID, or a passcode, whereas hiding removes the icon altogether and places the app itself into a hidden folder protected by Face ID.

You can think of locking as putting a digital padlock on an icon that’s still visible on your home screen. Tap the icon, look at the phone, and Face ID authorizes you. Anyone who picks up your phone can see the app is installed — they just can’t access its content without your face, your fingerprint, or your device passcode.

Hiding goes one step farther — the icon disappears from the home screen, from Spotlight search, and even from the app library. The app moves to a new, Face ID-protected “Hidden” folder. In other words, locking keeps data private, while hiding keeps the entire app out of sight unless you know exactly where to look.

How to lock an app on your iPhone

  1. Touch and hold the app icon until the quick-actions menu appears.

  2. Tap “Require Face ID.” (On older hardware, the wording might differ: “Require Touch ID” or “Require passcode.”)

  3. Authenticate once. From now on, every tap brings up Face ID.

Opening a locked app

Tap the icon and look at the screen. If Stolen Device Protection is turned on and you are away from a familiar location, Face ID is mandatory — your passcode will not unlock the app.

Removing the lock

Touch and hold the icon again, choose “Don’t require Face ID,” authenticate, and the padlock disappears.

How to hide an app on your iPhone

  1. Long-press the icon, choose “Require Face ID,” and authenticate.

  2. Long-press once more, select “Hide app,” and authenticate again. The icon vanishes immediately, and the app moves to the “Hidden” folder at the bottom of the App Library.

Opening a hidden app

Swipe down on the “Home screen,” type the app’s name, select the result labelled “Hidden,” then pass the biometric prompt. The app opens but remains invisible to everyone else.

Unhiding an app

Open the “Hidden” folder, touch and hold the app, pick “Unhide,” authenticate, and the icon returns to its previous home screen spot.

 

How can you lock apps on earlier iOS versions?

If your iPhone is still on iOS 17 or below, you cannot apply the new “Lock” or “Hide” commands, but you can mimic the same protection with three built-in tools. The steps below are detailed so you can follow them without guessing.

Screen time

  1. Open “Settings” and select “Screen time.”

  2. Tap “Turn on screen time” if it is off.

  3. Choose “Use screen time passcode,” set a four-digit code, and (if offered) link it to Face ID for easier entry.

  4. Tap “App limits” and select “Add limit.”

  5. Expand a category to reveal individual apps, select the one you want to lock, and tap “Next.”

  6. Set the timer to 1 minute, then enable “Block at end of limit.”

  7. Exit “Settings.”

Guided access

  1. Navigate to “Settings” and select “Accessibility.”

  2. Tap “Guided access” and switch it on.

  3. Tap “Passcode settings” and choose “Set guided access passcode.” Select a six-digit code, and enable Face ID or Touch ID if you prefer biometrics.

  4. Open the app you plan to lock, then triple-click the side (or home) button.

  5. If the overlay appears, simply tap “Start.”

  6. To leave the pinned session, triple-click again, enter the passcode or use Face ID, and tap “End.”

Shortcuts automation

  1. Open “Shortcuts,” and go to the “Automation” tab.

  2. Tap “+,” then “Create personal automation.”

  3. Scroll down, choose “App,” and tap “Choose.”

  4. Select the target app, confirm “Is opened,” and choose “Next.”

  5. Tap “Add action,” search for “Ask for input,” and set the prompt text to “Enter passphrase.” For “Input type”, pick “Number” or “Text.”

Tips to keep apps and data secure

Relying solely on a new lock icon is insufficient. Activate Face ID or Touch ID inside every banking, health, or mail app that supports internal biometric gates. In “Notification settings,” set “Show previews” to “Never” so message content is not exposed on the lock screen. Replace six numeric digits with a longer alphanumeric device passcode. Finally, relocate every password, passkey, or credit card detail to an encrypted vault such as NordPass password manager.

Why NordPass is the essential add-on

A locked or hidden app keeps strangers from launching it, but the credentials inside can still leak in a data breach. NordPass solves that problem by encrypting every password locally before syncing. After a single Face ID check, NordPass autofills your login with a 30-character password — no need to reuse or remember anything. Passkeys created on a Mac land on your iPhone in seconds. Secure Notes protect passport numbers or alarm PINs, and the built-in Breach Scanner alerts you if any saved email address appears in a public leak. Explore the full feature list and discover what NordPass brings to the table.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cybersecurity for startups: Key ways to stay protected

Cybersecurity for startups blog cover

Summary: All startups face threats like breaches and phishing, but the right mix of cybersecurity tools and strategies can keep them protected.

Sorry to break it to you, but if you’re running a startup—even just a small one—you’re up against the same cyber threats as large enterprises. In fact, you might be at more risk than any of those big corporations. Why’s that? Because bad actors know most startups don’t have advanced security measures in place. And that makes them more attractive targets.

Studies show that 43% of cyberattacks focus on small businesses. And yes, most startups fall into that category—so you need to defend yourself. How do you do that? First, let’s discuss what cybersecurity challenges you’re up against, then help you find the right tools and strategies to protect your startup.

Key takeaways

  • All startups face serious cybersecurity challenges like data breaches, ransomware, and phishing.
  • Startups can improve cybersecurity by using tools like VPNs or ZTNA solutions, firewalls, and threat protection platforms.
  • A small startup can boost its cybersecurity for around $2,000, using just the basic tools and strategies.
  • NordLayer offers many top cybersecurity solutions in one product, letting startups focus on growth safely.

Why do cybercriminals target startups so much?

It’s pretty simple—cybercriminals assume startups don’t have the time, budget, or resources to build strong cybersecurity defenses. More often than not, they’re right. That’s why startups tend to be much more vulnerable than large enterprises, which usually invest heavily in the latest cybersecurity solutions like endpoint protection, threat detection, and intrusion prevention systems.

And then there’s the payoff. For bad actors, breaking into a startup’s systems can be like discovering a goldmine. Once they get inside, they might:

  • Steal your ideas and try to sell them to your competitors
  • Put your customer data for sale on the dark web
  • Lock up your systems and demand a ransom to unlock them

All of this can earn them a lot of money while putting your funding at risk and slowing down your growth before you even get started.

To sum up, attackers see startups as easy targets with weak security, and they know there’s big money to be made when they successfully attack them.

Cyber threats all startups must face

Like we said in the beginning, it doesn’t matter whether you’re a small startup or a big corporation. In the end, you’re facing the same cybersecurity challenges. And unfortunately, there are many you need to watch out for. Let’s go over the biggest cyber threats you should be aware of.

Ransomware attacks

Okay, picture this: you go to work, open your laptop, and try to pick up where you left off, but… your files won’t open. You try a few times, but nothing works. Next, you get an email saying that if you want your files back, you’ll have to pay—and it won’t be cheap. That’s basically what a ransomware attack looks like: bad actors break into your system, encrypt your files, and demand a big payment to decrypt them.

Even if you decide to pay the ransom, there’s no guarantee that attackers will actually restore your access. And while you wait for them to do so, your startup could be dealing with production downtime, potential loss of intellectual property, exposure of sensitive customer data, or legal issues due to a lack of regulatory compliance. It’s really hard to find a silver lining in this scenario.

Data breaches

Probably one of the biggest nightmares for any business is finding out that its sensitive information has been compromised. Unfortunately, this happens more and more often, with the average cost of a data breach now being almost $5 million.

Therefore, your startup should be prepared for cybercriminals targeting your customer data, intellectual property, or any other sensitive information that could land you in trouble if leaked. Because if they pull it off, the results can be devastating. We’re talking stolen employee identities, costly legal fines for failing to comply with regulations, your operations coming to a grinding halt, and more.

Phishing attacks

Phishing attacks are scams designed to trick people into giving away sensitive information, either personal or related to the company they work for. These attacks often come as fake emails, suspicious text messages, or websites that look like they come from a legitimate source.

Attackers often create a sense of urgency to pressure people into clicking a harmful link, downloading infected files, or entering their login details. If someone falls for it, threat actors can access company systems, steal valuable data, and use it to make money illegally.

Human error

Everyone makes mistakes. But when one mistake hurts the whole company, things get serious fast. Studies show that human error is behind a huge number of cyber-attacks. Some research even suggests that up to 95% of data breaches start with an employee’s mistake.

Sometimes, all it takes is one person clicking on a malicious link in an email they thought was legitimate—and suddenly, it’s a domino effect as system after system gets compromised.

Insider threats

Of course, security incidents caused by employees aren’t always accidental. There are situations where a person on the inside deliberately opens the door to cybercriminals—that’s what’s known as an insider threat.

Why would anyone do something like that? It could be for money, out of spite, or just to cause chaos. It’s like that quote from The Dark Knight: “Some people just want to watch the world burn.” The important part is that insiders can abuse their access rights to steal or leak sensitive data—or even sabotage your startup’s operations.

Weak passwords and credential stuffing

Studies show that people’s password habits are far from being great, with many using weak passwords like “123456” for both personal and work accounts. This suggests that your employees’ passwords might not be as strong as you think.

And it doesn’t stop there. A lot of people reuse passwords across different accounts. Why’s that a problem? Well, if one of their other accounts gets hacked and their credentials are compromised, cybercriminals might try using the same credentials to break into your startup’s systems (it’s called credential stuffing).

As you might guess, many people both use weak passwords and reuse them across accounts. And when that happens, it’s easy to see how your company could be walking a fine line between staying secure and facing a serious cybersecurity threat.

Cyber risks every startup should be ready for

Best practices for improving cybersecurity for startups

Considering all the cyber threats, it can be tough to figure out reliable cybersecurity for startups. The good news? There are plenty of tools and strategies that even small businesses can use to protect themselves effectively. Here are a few things worth adding to your startup’s security game plan.

Adopt a Zero Trust strategy

“Never trust, always verify.” That’s the core idea behind the Zero Trust model. In simple terms, it means you shouldn’t assume anyone or anything trying to access your network is trustworthy—not even people who are part of your company.

Instead, every person and device must be thoroughly verified each time using strict user authentication and real-time network monitoring. Only then can you be sure no outsider sneaks into your digital environment.

Limit access to your applications

The technologies that help bring the Zero Trust model to life are called Zero Trust Network Access (ZTNA) solutions. They help you control access to specific applications and services, isolating users from resources they don’t actually need.

Someone should only get access to specific apps after their identity, context, and compliance with policies have been carefully checked. This way, you lower the chances of unauthorized access and ensure the right employees can get to the right resources.

Implement a strong password policy

This one’s really simple—if you know that people use weak passwords at work, then you need to prevent that at your startup. There are security measures available today—like NordPass, for example—that allow you to create password policies that you can roll out across the entire company.

Once that’s set up, anyone trying to get away with a weak password will be automatically stopped. That simple step can make a big difference in keeping your startup’s passwords strong.

And if your team starts complaining about having to deal with long, complex passwords, you can get them to use a password manager to generate strong passwords and manage them with ease.

Set up multi-factor authentication (MFA)

Strong passwords are a great start, but they’re not enough to keep your startup safe today. You need extra layers of protection on your business accounts. That way, even if your credentials leak, cybercriminals can’t access your digital systems.

One way to do this is by setting up MFA. This will require anyone trying to log in to provide additional proof of identity beyond just a password. It could be a code sent to their email, a time-based one-time password from an authenticator app, or even a biometric scan, like a fingerprint or face recognition.

Some methods are more secure than others, of course, but the point is simple: with MFA, entering a password is not enough for somebody to get in.

Use firewalls to protect your network

For those who don’t know what firewalls are, they’re cybersecurity solutions that monitor incoming and outgoing internet traffic in real time. Then, based on a preestablished set of rules, they decide what’s safe and what’s not. So, if something suspicious—or downright dangerous—shows up, they block it before it can infiltrate your network.

Additionally, you can use firewalls for network segmentation. That is breaking your company network into smaller blocks called “segments” and controlling how traffic flows between them.

So, for example, you can give certain employees access to just one part of the network, without exposing the rest of it. That way, if a threat slips through, it’s more likely to stay contained in that one area instead of spreading to other parts.

Create an incident response plan

What would you do if someone attacked your company? How would you stop the damage from spreading? Where would you even start fixing what’s already broken? These are the questions you need to answer before anything happens. That’s exactly what an incident response plan is for.

The key is having clear, step-by-step instructions so everyone in your company knows what to do during a cyber-attack. With an incident response plan in place, you can act quickly, minimize damage, and keep your team calm. After all, you don’t want them to panic and add to your troubles.

Update software regularly

Most of the tools and services your startup relies on receive regular updates and patches. These are often rolled out to fix security vulnerabilities and keep up with ever-evolving cyber threats.

For that reason alone, it’s essential that you keep all your systems and devices up to date. Skipping a single update might seem harmless, but it can easily open the door to attackers, so make sure you don’t let it slip by.

Educate your team

And then there’s the human side of things—you need to help your team understand why certain security measures matter, why they should use one app over another, and how a single phishing email can trigger a devastating chain of events.

By investing in cybersecurity training, you can clear up confusion, get everyone aligned, and underscore how one serious incident could put the entire business—and everyone’s jobs—at risk.

 

How much does it cost to improve a startup’s cybersecurity?

The answer to questions like this is almost always: it depends. The cost of improving your cybersecurity can range from as little as $500 to well over $100,000 per month. “That’s quite a stretch,” you might say—so let’s unpack this a little bit.

Your startup’s size, industry, goals, and business needs all play a role in determining the necessary cybersecurity for startups. Startups running global operations usually invest those large sums of money. They do so to meet multiple compliance frameworks, manage vast amounts of business and customer data, and integrate a wide range of third-party platforms and services. At that level, cybersecurity typically requires a significant investment—at least $30,000 per month, but usually more.

That’s because it often involves a wide array of cybersecurity solutions—from advanced network access controls and threat detection tools, to cyber insurance and endpoint protection services, all the way to penetration testing and custom security audits (which can cost from $15,000 to $25,000).

What would be the cost for a small startup?

If you’re just starting out, you can probably get by with a more basic cybersecurity setup. That would typically consist of antivirus software, a firewall, basic access controls, a password manager, and multi-factor authentication tools.

With all this, and a limited number of licenses, you can likely keep costs under $2,000 a month—or even less, depending on your tools and team size. However, the rule of thumb is that startups should allocate around 5.6% to 20% of their IT budget to cybersecurity programs.

What can NordLayer do to help protect your startup?

NordLayer simplifies cybersecurity for startups by combining several network protection tools into one accessible platform.

With just NordLayer in your setup, your startup can easily follow many of the best practices we’ve discussed in this article, like enforcing Zero Trust, using MFA, segmenting your network, and setting up firewall protection.

From ZTNA-based access controls and a business-grade VPN to threat protection and threat intelligence, NordLayer delivers enterprise-level security to startups at an affordable price—all without the unnecessary complexity, steep learning curve, or heavy IT overhead.

So, if you want your startup to have security measures that can help protect it from many cyber threats, you can get NordLayer and have more time and energy for what we all know you’d rather focus on—your company’s growth.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Threat Report: ClickFix fake error surges, spreads ransomware and other malware

 
  • A deceptive fake error attack vector, ClickFix, surged by over 500%, becoming the second most common attack method after phishing, and responsible for nearly 8% of all blocked attacks.
  • SnakeStealer overtook Agent Tesla as the most detected infostealer, while ESET helped disrupt two major malware-as-a-service operations – Lumma Stealer and Danabot.
  • Rivalries among ransomware gangs, including RansomHub, caused internal chaos. Despite more attacks, ransom payments dropped due to takedowns and trust issues.
  • Android adware detections jumped 160% due to the Kaleidoscope malware, while NFC-based fraud spiked by more than thirty-five-fold ,with tools like GhostTap and SuperCard X enabling more digital wallet theft.

BRATISLAVAJune 26, 2025 — ESET has released its latest Threat Report, which summarizes threat landscape trends seen in ESET telemetry and from the perspective of both ESET threat detection and research experts, from December 2024 through May 2025. One of the most striking developments this period was the emergence of ClickFix, a new, deceptive attack vector that skyrocketed by over 500% compared to H2 2024 in ESET telemetry.  This makes it one of the most rapidly rising threats, accounting for nearly 8% of all blocked attacks in H1 2025 and is now the second most common attack vector after phishing.

ClickFix attacks display a fake error that manipulates the victim into copying, pasting, and executing malicious commands on their devices. The attack vector affects all major operating systems including Windows, Linux, and macOS.  “The list of threats that ClickFix attacks lead to is growing by the day, including infostealers, ransomware, remote access trojans, cryptominers, post-exploitation tools, and even custom malware from nation-state-aligned threat actors,” says Jiří Kropáč, Director of Threat Prevention Labs at ESET.

The infostealer landscape also saw significant shifts. With Agent Tesla fading into obsolescence, SnakeStealer (also known as Snake Keylogger) surged ahead, becoming the most detected infostealer in our telemetry. SnakeStealer’s capabilities include logging keystrokes, stealing saved credentials, capturing screenshots, and collecting clipboard data. Meanwhile, ESET contributed to major disruption operations targeting Lumma Stealer and Danabot, two prolific malware-as-a-service threats.  Before the disruption, Lumma Stealer activity in H1 2025 was higher than in H2 2024 (+21%) and Danabot was up even more, by +52%.  This shows that both were prolific threats, making their disruption that much more important.

The ransomware scene further descended into chaos, with fights between rival ransomware gangs impacting several players, including the top ransomware as a service – RansomHub. Yearly data from 2024 shows that while ransomware attacks and the number of active gangs have grown, ransom payments saw a significant drop. This discrepancy may be the result of takedowns and exit scams that reshuffled the ransomware scene in 2024, but may also be partially due to diminished confidence in the gangs’ ability to keep their side of the bargain.

On the Android front, adware detections soared by 160%, driven largely by a sophisticated new threat dubbed Kaleidoscope. This malware uses a deceptive “evil twin” strategy to distribute malicious apps that bombard users with intrusive ads, degrading device performance. At the same time, NFC-based fraud shot up more than thirty-five-fold, fueled by phishing campaigns and inventive relay techniques. While the overall numbers remain modest, this jump highlights the rapid evolution of the criminals’ methods and their continued focus on exploiting NFC technology.

Our research into GhostTap shows how it steals card details so attackers can load victims’ cards into their own digital wallets and tap phones for fraudulent contactless payments worldwide. Organized fraud farms use multiple phones to scale these scams. SuperCard X packages NFC theft as a simple, minimalistic malware-as-a-service tool. It presents itself as a harmless NFC-related app, once installed on a victim’s device, it quietly captures and relays card data in real time for quick payouts.

“From novel social engineering techniques to sophisticated mobile threats and major infostealer disruptions, the threat landscape in the first half of 2025 was anything but boring,” summarizes Kropáč about the contents of the latest ESET Threat Report.

For more information, check out the ESET Threat Report H1 2025 on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Validating Internal Network Policies with Mendel

Defining your internal network policies takes time, coordination, and effort. But once those policies are in place, the critical question still remains: are they actually being followed?

For many IT teams, verifying policy adherence and enforcing internal rules on a daily basis is a persistent challenge. Even small violations, such as unauthorized access, outdated encryption, or misused services, can lead to data exposure or non-compliance with frameworks like NIS2.

This is the first part of a two-part blog focused on the practical side of network security policy enforcement and explains how GREYCORTEX Mendel helps you detect violations of any size quickly and effectively. Part two will cover encryption, application use, and identity-based access control.

Network Segmentation & Perimeter Control

Segmentation and perimeter access policies are fundamental to limiting exposure and maintaining control over your critical systems.  Without a clear policy enforcement process, a single compromised device can lead to lateral movement across your network.

🔗 Watch our webinar to see how Mendel helps you detect and investigate lateral movement.

Policy violation: Unallowed east–west traffic between segments

Relevant for NIS2

East–west traffic refers to communication between devices within the internal network, such as between user devices and servers. When segmentation is not properly enforced, attackers can move laterally across segments and compromise your entire company network. Limiting this traffic is essential for helping you prevent access to critical systems.

Validation with Mendel

Mendel’s peer graph, as seen below, offers you a clear view of internal communication. Your analysts can then filter internal traffic and define specific subnets to quickly verify whether unauthorized flows occur between isolated segments.

Policy violation: Unauthorized Internet access from restricted segments

Relevant for NIS2

Devices in restricted segments, such as servers or backup networks, are often not intended to communicate with the public Internet directly. In many environments, internet access must go through a proxy or DMZ, with firewalls blocking all other outbound traffic. If these controls fail, systems may be exposed to malware, data leakage, or command-and-control activity.

Validation with Mendel

Mendel allows the filtering of your outbound traffic from specific hosts, making it easy to identify devices attempting to access the Internet.

If such traffic is detected, your analysts can verify whether it passed through an approved proxy by checking the flow records. They can also confirm whether direct connections (bypassing the proxy) were blocked at the firewall level by checking the TCP flags and destination status.

Mendel lets you set policies to monitor Internet traffic from specific segments or devices. When a violation occurs, it automatically sends an alert.

Policy violation: New & disappeared IPs or MACs in controlled network

Relevant for NIS2

Controlled network segments, such as server or infrastructure zones, are often designed with static IP and MAC configurations. When unrecognized devices appear, it may indicate unauthorized access, policy misconfiguration, or a potential threat. 

Validation with Mendel

Mendel allows you to assign policies to specific subnets or hosts to monitor new or missing IP and MAC addresses.  Policies can also include limits on traffic, packets, peers, ports, duration, and flows.

If a policy is violated, Mendel will trigger an alert immediately. For automated blocking, Mendel can be integrated with third-party systems like a NAC or Cisco ISE.

Policy violation: Improper traffic between management and user networks

Relevant for NIS2

Dedicated management segments are designed to limit who can interact with your infrastructure components like switches, routers, or servers. Unauthorized access from user networks increases the risk of misconfiguration, privilege abuse, or direct exploitation.

Validation with Mendel

Mendel’s peer graph provides you with a clear view of communication between your defined network segments. Your analysts can focus on management subnets to verify whether they are properly isolated from user networks, as required by internal policies.

For example, subnet 10.0.20.0/24 was assigned as a management zone, but Mendel revealed active connections to other internal networks.

After updating firewall rules, Mendel confirms isolation by showing no communication from 10.0.20.0/24.

Network Services Policy Enforcement

Core network services like DNS and DHCP are frequent targets for misuse or misconfiguration. Ensuring that only authorized services are active helps prevent spoofing, data leaks, and disruptions to your network stability.

Policy violation: Usage of unauthorized internal/​public DNS servers

Relevant for NIS2

This policy ensures that only approved DNS servers are used for resolving domain names inside the network. Unapproved or misconfigured servers can bypass security controls, hide malicious activity, or return forged responses.

Validation with Mendel

Internal DNS usage:  Mendel allows you to filter internal DNS servers using the host tag Role/​Server/​DNS. This provides you with a clear inventory of devices offering DNS or DNS-relay services. Your analysts can review this list and drill down into individual IPs to confirm whether each DNS server is expected and approved.

For example, a device at 192.168.178.1 was identified as providing DNS services. No other services were detected, indicating a possible relay or misconfigured gateway.

Public DNS usage: By filtering outbound DNS traffic, Mendel reveals which internal devices are using public DNS servers. This allows your analysts to identify whether DNS queries are leaving the network through unapproved resolvers.

In one case, two hosts were detected using Google DNS services: one being a default gateway, and another (192.168.40.215) a standard internal client. Such cases should be reviewed against DNS usage policies to ensure compliance.

Policy violation: Unauthorized DHCP Servers

Relevant for NIS2

This policy ensures that only approved DHCP servers operate in the network. Unauthorized DHCP servers can assign incorrect configurations, enable man-in-the-middle attacks, or disrupt connectivity.

Validation with Mendel

Mendel automatically detects new DHCP servers in your network and generates an event. In addition, it lists all DHCP servers by filtering hosts with the tag Role/​Server/​DHCP, helping your analysts verify whether each one is authorized or misconfigured. Drilling down on each IP reveals additional services and host behavior for deeper inspection.

For example, device 192.168.2.254 was found running multiple services, including DHCP, NTP, DNS, SSH, TELNET, and Mikrotik Winbox. This suggests it may be a router or a misconfigured network appliance.

From Visibility to Accountability

Enforcing internal rules only matters if those rules are visible and actionable. Without continuous policy monitoring, organizations like yours risk overlooking gaps that can lead to misconfigurations or downtime. Mendel helps you by aligning internal visibility with real-time behavior, enabling your teams to improve incident response, reduce alert fatigue, and maintain control over your environment.

In the next part, we’ll explore how Mendel validates encryption policies, user identity enforcement, and application-level restrictions, which are critical areas for maintaining compliance and reducing operational risk.

Want to evaluate your own network? Request a security audit with Mendel.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How Rebrandly strengthened security and SOC 2 compliance with NordLayer

Summary: See how Rebrandly secures remote access to internal resources, meets SOC 2 compliance, and saves time on IP management.

Results at a glance Rebrandly case study

Rebrandly is a global link management platform that helps businesses create and track branded short URLs. With over 1.3 million users and 3 billion clicks tracked monthly, the company helps businesses manage their links more efficiently, giving them better performance, control, and visibility online.

As the company handles large volumes of customer data, strict compliance and data protection are part of its foundation. They meet the highest security standards, including SOC 2 Type II (Service Organization Control 2), GDPR and HIPAA compliance, giving businesses peace of mind about data protection.

Rebrandly profile

Before NordLayer, Rebrandly managed access through manual IP allowlisting, which was a time-consuming process. They needed a security solution that offered automated access control, AWS cloud integration, and support for SOC 2 Type II compliance. NordLayer’s Site-to-Site, a dedicated IP, and custom DNS streamlined their security and eliminated manual overhead.

The challenge: manual IP allowlisting was a headache

We spoke with Antonio Romano, VP of Engineering at Rebrandly, about the company’s shift to a more scalable, secure access management approach.

Before NordLayer, Rebrandly relied on manual IP allowlisting to protect access to internal resources. However, with a globally distributed team and no dedicated IP, this process became frustrating, especially for a company handling confidential data across billions of links.

“With everyone remote, we were constantly updating the IP allowlist. It just wasn’t scalable.”

The manual process made it more challenging to manage SOC 2 Type II compliance, which requires strict access control and consistent security enforcement.

Rebrandly also needed a solution that integrated easily with their AWS cloud environment and simplified permission management.

How NordLayer helped Rebrandly

Rebrandly’s previous setup lacked the automation and centralized control to maintain secure, compliant operations. As Antonio Romano puts it:

“We needed something more consistent to meet SOC 2 compliance requirements. Manual IP management just wasn’t reliable enough.”

With NordLayer, Rebrandly transitioned from manual IP allowlisting to a dedicated IP setup, enabling secure, policy-based access control. The solution integrated seamlessly with their AWS cloud environment, helping protect internal tools and customer data while supporting SOC 2 Type II compliance.

Benefit 1: Secure access with a Dedicated IP

With NordLayer’s Site-to-Site feature, it was easy to configure a server with a dedicated IP in Rebrandly’s AWS cloud environment for secure access.

The Site-to-Site feature uses encryption to securely route each user’s traffic directly to the right company resource based on their needs without affecting connection speed.

“Now we can restrict access to our hardware resources. It’s helping us a lot.”

How Site-to-Site works

Benefit 2: Tools that help achieve SOC 2 Type II compliance

As a SOC 2 certified company, Rebrandly must meet strict security and audit requirements. NordLayer makes it easy by providing Site-to-Site connections and custom DNS settings that ensure consistent, secure access across their team.

“NordLayer helps us meet the security standards required for SOC 2 compliance.”

Benefit 3: Time saved through automation

Manual IP management was time-consuming and unscalable. NordLayer replaced it with a streamlined, automated solution, saving valuable engineering hours.

“Automating our IP setup saves a couple of hours every week. It’s no longer a constant headache to manage access manually.”

NordLayer control panel screenshot with Servers

Results: simplified SOC 2 compliance and streamlined IP management

By switching to NordLayer, Rebrandly strengthened its security posture while reducing the time and effort spent managing access.

  • Faster workflows
    Automated IP management saves several hours per week.

“The real benefit is not having to manage IP manually—it’s just not scalable when your team grows”

  • Increased network security
    Encrypted data transfers between Rebrandly’s employees using NordLayer’s Site-to-Site, whether in the office or remote, help protect the company’s data. This not only protects sensitive customer data but also allows Rebrandly to meet SOC 2 Type II requirements for secure access and data handling.

Why NordLayer works for Rebrandly

Rebrandly uses NordLayer’s Site-to-Site feature to securely connect its internal network to the AWS cloud infrastructure. The setup includes a Virtual Private Gateway and a Dedicated IP, allowing the team to protect sensitive data without compromising performance.

NordLayer also helped Rebrandly save time by eliminating manual IP management. It also supports the company’s SOC 2 Type II compliance efforts, helping them build client trust.

“From a security point of view, NordLayer’s helping us a lot. And we don’t have to deal with manual processes anymore.”

Cybersecurity tips from Rebrandly

Cybersecurity tips by Antonio Romano

Conclusion

Rebrandly’s experience with NordLayer proves you don’t need a large team to have strong, reliable security. By automating access control and making SOC 2 compliance easier, NordLayer helped Rebrandly maintain its strong security posture, save time, and keep things running smoothly.

If your business needs simple, scalable security that works, NordLayer is a good place to start. Contact our sales team to book a demo and find out more.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×