Skip to content

Chapter 2: End-to-End Security & Zero Trust

Unlocking the Full Potential of Zero Trust with Thinfinity Workspace

In Part 1, we examined why traditional security models are no longer sufficient for today’s hybrid and multi-cloud enterprises. We explored the critical shortcomings of legacy VPNs and firewalls, highlighted the rise of Zero Trust Architecture, and demonstrated how Thinfinity Workspace provides a secure, streamlined alternative for remote access and application delivery. The key message is clear: end-to-end security, built on continuous verification and granular control, is now an operational imperative.

But understanding the need for Zero Trust is only the beginning. In this section, we shift from principles to practice—unpacking the advanced features and concrete outcomes that make Thinfinity Workspace a standout solution for security-conscious organizations.

In Part 2, we’ll dive deeper into:

  • Next-generation authentication, including MFA and passwordless access
  • Seamless integration with enterprise identity platforms
  • Just-in-time privileged access and granular session controls
  • Automated user management and powerful auditing capabilities
  • Real business value: from compliance to operational efficiency

Whether you’re a CIO, CISO, IT manager, sysadmin, or business owner, Part 2 will show you exactly how Thinfinity Workspace turns Zero Trust theory into secure, practical results for your organization.

 

Thinfinity Workspace: A Zero Trust Platform for Secure Remote Access

Strong Authentication: MFA and Passwordless Login

Even the best network architecture fails if an attacker can easily steal or guess a user’s password. That’s why multi-factor authentication (MFA) and passwordless login options are critical components of Thinfinity Workspace’s end-to-end security. Right out of the box, Thinfinity supports a range of MFA methods to ensure that only legitimate users gain access. Administrators can integrate Time-based One-Time Password (TOTP) apps like Google Authenticator, Microsoft Authenticator, Duo Mobile, or Okta Verify, adding a second verification step that changes every login. This means even if a password is compromised, an attacker cannot login without the one-time code from the user’s device.

Thinfinity Workspace also integrates with enterprise Identity Providers (IdPs) via SAML 2.0 or OAuth2, including popular services like Microsoft Entra ID (Azure AD), Okta, Ping Identity, and Google Workspace. This allows companies to leverage single sign-on (SSO) and centralized identity management. Users can log in with their existing corporate credentials, and Thinfinity will honor group memberships or attributes from the IdP to determine access rights. This integration not only improves security (through centralized policy and maybe conditional access rules in the IdP), but also enhances user convenience – fewer passwords to remember and a seamless login experience.

In line with modern authentication trends, Thinfinity Workspace 8 introduced passwordless authentication via Passkeys. This feature supports FIDO2 security keys and biometrics (e.g. fingerprint or facial recognition) as login methods. Users can authenticate with a hardware key like YubiKey or with their device’s built-in biometric (Windows Hello) instead of a password, drastically reducing phishing risks. Under the hood, these methods use public-key cryptography and store credentials in secure hardware (such as the device’s TPM for Windows Hello). For organizations with high security requirements, Thinfinity even supports smart card authentication and PKI certificates for login – ensuring compliance with regulations that mandate certificate-based auth.

Another innovative capability is One-Time URL Authentication, which Thinfinity offers to streamline certain workflows. An admin or helpdesk agent can generate a time-limited, unique access link that a user can click to be automatically logged into a specific remote app or desktop. Each One-Time URL is valid for only one session and expires after use, preventing reuse or sharing. This is particularly useful for scenarios like support sessions or third-party vendor access: you can embed these one-click links in a portal or ticket, and the user gets in without needing a permanent username/password at all. It’s a controlled, ephemeral access method that enhances security by eliminating shared credentials and tightly limiting the access scope and duration.

By combining MFA, SSO integration, passwordless tech, and one-time links, Thinfinity Workspace addresses the identity side of security thoroughly. These measures significantly lower the risk of account compromise. According to industry studies, implementing MFA can block over 99% of automated attacks on accounts, and passwordless methods further neutralize phishing. Thinfinity’s approach ensures that identity is the new perimeter – only verified users can even begin to access the system.

Advanced Identity Security features: Multi-Factor Authentication, Passwordless Login, SSO, and One-Time URL Authentication.

Role-Based Access Control (RBAC) and Least-Privilege Governance

Once a user’s identity is verified, the next question is: what resources should they have access to? Thinfinity Workspace tackles this with robust Role-Based Access Control (RBAC) and granular permission management. Administrators can define roles (such as Regular Employee, Contractor, IT Administrator, etc.) and assign permissions to those roles regarding which desktops, applications, or data the role can access. Every user session is governed by these assigned roles, enforcing a least-privilege model. For example, a finance department user might only see accounting applications and not be allowed to launch engineering or HR systems. This containment dramatically limits the damage that can be done if an account is compromised – the attacker would only see a narrow slice of the environment.

Thinfinity makes RBAC easier to manage by integrating with external directory and identity systems. It supports mapping users and groups from Active Directory or SAML/OAuth2 IdPs (like Azure AD, Okta, etc.) to internal Thinfinity roles. This means you can tie Thinfinity’s access control to your existing organizational structure. If a user is part of the “Contractors” group in Okta, for instance, Thinfinity can automatically map them to a Contractor role which has restricted access. The platform even provides flexible rule-based mappings, where you can automatically assign roles based on user attributes (department, group membership, email domain, and so on).

A particularly powerful feature is Just-In-Time account provisioning and auto-deprovisioning. When Thinfinity is linked to an IdP, it can be configured such that if an authenticated user logs in and no local Thinfinity account exists yet, the system will auto-create an account on the fly and assign the appropriate role. This auto-provisioning means new employees or partners get access immediately based on their directory status, with no manual admin setup required. It also implies that if someone is removed from the corporate directory (e.g. upon leaving the company), they lose Thinfinity access too, maintaining a single source of truth. Thinfinity’s documentation highlights that this seamless onboarding/offboarding aligns with dynamic workforce needs and Zero Trust, by ensuring users only have access when they should, and get the right permissions at first login.

All these mappings and automatic role assignments feed into centralized policy management. Administrators can adjust a role’s permissions or the mapping rules in one place, and it instantly affects all users in that role. This makes it much simpler to enforce organizational changes (like a reorg or merger) without touching individual accounts.

The net effect is strong governance: every action through Thinfinity is tied back to an identity and a role, and no user can step outside their permitted boundaries. This greatly aids in implementing the principle of least privilege and separation of duties. If auditors ask “who can access Server X or sensitive App Y?”, Thinfinity’s RBAC makes it easy to answer and shows that only the appropriate role can, with all actions logged.

Understand Our RBAC Implementation →

Defining user roles with Role-Based Access Control (RBAC), Just-in-time Account Provisioning, and Least-Privilege Access.

Session Recording and Auditing for Accountability

For sensitive operations and compliance requirements, being able to monitor and review what happens during a remote session is essential. Thinfinity Workspace includes a secure session recording capability for remote desktop sessions. Administrators can enable full video recording of user sessions on published desktops or applications. Every mouse movement, screen update, and keystroke can be captured in the recording, creating a comprehensive audit trail of user activity. This is invaluable for forensic analysis in case of an incident, or simply for routine compliance auditing in industries like finance and healthcare.

Thinfinity allows granular control over which sessions get recorded. You might not need to record every user’s activity (and indeed, privacy considerations mean you should only record what’s necessary). With Thinfinity, you could choose to record sessions for specific high-privilege roles or groups – for example, record all sessions of contractors, or IT administrators, or any user accessing a particularly sensitive system. This role-based activation ensures you capture the most critical interactions without overwhelming storage or invading privacy for regular tasks. The recordings themselves can be stored securely and accessed by authorized personnel for review.

From a business standpoint, session recording serves multiple purposes. It helps with compliance – many standards (PCI DSS, ISO 27001, SOC 2, etc.) require monitoring of administrative access or critical transactions, and having video logs meets those controls. It also acts as a deterrent against misuse: users aware that their session is being recorded are less likely to attempt malicious or unauthorized actions. In the event something does go wrong, the recorded footage provides an exact replay of events, which can speed up incident response and root cause analysis.

Thinfinity’s session recording is part of its broader auditing and logging framework. In addition to video, the system logs user logins, resource launches, file transfers, etc. This ties into the concept of end-to-end security by ensuring visibility and accountability at the final stage of the chain – after a user has been authenticated and authorized, their actions are not invisible. Everything is trackable if needed. Such capabilities usually require separate tools in a traditional RDP or VPN setup, but Thinfinity builds it into the platform for a one-stop solution.

Discover Security & Monitoring Features →

Thinfinity Session Recording Cycle: Enable, Capture, Store, Review, and Analyze incidents for security and compliance.

Time-Based Access Controls and Privileged Access Management (RPAM)

A dynamic aspect of security that Thinfinity Workspace handles adeptly is time-based access control and Remote Privileged Access Management (RPAM). Not all users should have 24×7 access to resources, especially highly sensitive ones. Thinfinity lets administrators put very fine-grained schedules on when and for how long access is allowed. For example, you can define allowed access windows (say, weekdays 9am–6pm) for specific users, groups, or resources. If someone tries to connect outside their allowed hours, Thinfinity will block it. This is a simple but powerful mitigator of risk – even if an attacker obtained credentials, they cannot use them at an odd hour if policy disallows it. Thinfinity can even auto-terminate active sessions that run past the approved time window, preventing after-hours persistence.

For third-party vendors or support engineers, Thinfinity supports temporary access provisioning. You might only want to let an outside contractor onto a server during a scheduled maintenance window. With time-based rules, you can set that vendor’s account to be valid only during a specified period (e.g., access opens at 10:00 and closes at 14:00 on a certain day). After that, the access is automatically disabled. This significantly reduces the risk of forgetting to turn off a vendor account – a common oversight that can lead to unintended backdoors.

Thinfinity’s approach to Remote Privileged Access Management (RPAM) extends this concept specifically to privileged users (like admins). It enables Just-In-Time (JIT) privileged access, meaning administrators or high-privilege accounts do not have standing access by default; instead, they are granted elevated access only for the specific duration and task needed. For example, an IT admin might “check out” access to a production server for a 2-hour window to perform updates, after which that access automatically expires. This ties into a broader security best practice of eliminating permanent privileged accounts – you have zero standing privilege until it’s approved for a short time. Thinfinity facilitates this by allowing users to “book” access to sensitive resources for a pre-approved timeframe. Outside of that reservation, the system will not allow the connection, and once the window ends, access is deprovisioned immediately.

Crucially, Thinfinity includes approval workflows for such privileged access requests. An administrator’s request to access a critical server could be made to require a manager’s or security officer’s approval through the platform before it activates. This ensures oversight and that at least two people are aware of any highly privileged activity (a key component in mitigating insider threats).

Additionally, you can enforce per-resource access schedules. For instance, a particularly sensitive database server might only be made available via Thinfinity during business hours, regardless of who’s trying to access it. Thinfinity will enforce those resource-specific schedules automatically. It also supports a degree of self-service for users, where a user can request or schedule their own access within policy bounds, possibly getting automated approval if criteria are met. This reduces the administrative burden while still keeping tight control.

By implementing time-based restrictions and just-in-time access, Thinfinity Workspace ensures that even if credentials are stolen or misused, the window of opportunity for attackers is drastically narrowed. It also addresses compliance requirements found in standards like ISO 27001 or NIST guidelines, which recommend limiting the time frame of privileged access. Overall, these features add a temporal dimension to Zero Trust – not only do you verify who and what is accessing, but also when, making sure the timing aligns with expected patterns.

Learn more about the Resource Reservation module →

Time-based access control and Remote Privileged Access Management (RPAM) in Thinfinity Workspace for secure access.

Browser-Based Session Security and Device Redirection Controls

Thinfinity Workspace is a browser-based solution, which means users interact with their remote desktops or applications through an HTML5 web interface. This approach has security benefits on its own (no heavy client to keep patched, no direct network connectivity from the endpoint to the server), but Thinfinity goes further by giving administrators detailed controls over the in-session behavior and device integration. Essentially, it allows companies to fine-tune the balance between security and user convenience within the remote session.

Granular Session Policies: Admins can enable or disable various features like clipboard, file transfer, printing, audio, and USB device redirection on a per-user or per-resource basis. For example, you might disable clipboard copy-paste and file transfers for a highly sensitive finance application, preventing users from easily exfiltrating data. Alternatively, you could allow file transfers but then restrict specific file types (e.g., block .exe or .bat files to prevent moving executables). Thinfinity even offers an Intermediate Virtual Disk (“ThinDisk”) that can be toggled on, which serves as a controlled buffer for file exchange between the remote session and the local device. Policies can dictate whether files placed in this virtual disk auto-download to the user’s machine or not. By adjusting these knobs, organizations can enforce data loss prevention policies—like “no downloads from system X”—while still allowing legitimate use (e.g., maybe allow download of only PDF reports but not raw data files).

Device Redirection: In many remote desktop scenarios, users want to print documents or play audio from the remote system on their local device. Thinfinity supports these needs with control. Printer redirection can be enabled, which allows the remote application to print to the user’s local printer seamlessly. If allowed, Thinfinity’s virtual printer ensures an easy print experience without actually transferring raw print spool files insecurely. Similarly, audio redirection can be enabled or disabled depending on the use case. For instance, in a call center application you might enable two-way audio, while in a sensitive environment you might mute all remote audio to avoid someone using the channel to send out data via text-to-speech or audio cues. Even USB device or peripheral redirection can be managed – Thinfinity can block or permit certain device types if needed (for example, you might block USB storage devices but allow smart card readers).

These browser-based session controls are crucial for compliance and productivity. They ensure that even once a user is connected to an application, the organization still has guardrails on what the user can do with the data. If regulations demand that no data leaves a secure enclave, Thinfinity can enforce that by disabling downloads or clipboard copying from that session. On the other hand, for day-to-day work, you might allow most features to give users a near-local experience. Thinfinity essentially provides the same kinds of controls that traditional enterprise virtual desktop solutions (like Citrix) offer, but through an easier web-based interface.

From a security standpoint, this means browser-based access does not equate to unrestrained access. Every channel (clipboard, disk, print, audio) is a potential data egress or ingress path that Thinfinity lets you manage. And because these policies can be set per user/group or per application, they can be aligned with Zero Trust principles (for example, stricter controls for higher risk scenarios). The end result is a remote session environment that is tailored to your security needs without completely hampering user productivity. In summary, Thinfinity Workspace’s device redirection and session controls give organizations confidence that remote users can’t easily violate data handling policies, whether inadvertently or maliciously.

Learn more about Device and Peripheral Integration →

Enhancing security through session controls like authentication, policy enforcement, and device redirection control.

Business Benefits: Compliance, Operational Efficiency, and Risk Reduction

Deploying a secure end-to-end solution like Thinfinity Workspace isn’t just about checking technical boxes – it also brings tangible business benefits. One major advantage is simplified compliance. Many regulations (GDPR, HIPAA, PCI DSS, etc.) require strict control of data access, strong authentication, audit logs, and data protection in transit. Thinfinity’s integrated security features help fulfill these requirements out of the box. For instance, enforcing MFA and passwordless login helps meet compliance for secure authentication, session recording provides audit trails for regulators, and TLS encryption with no legacy protocols helps satisfy standards like PCI DSS which forbid outdated encryption. As noted in Thinfinity’s guidance, organizations across industries – from finance to healthcare – can use the platform to ensure regulatory compliance while still enabling secure remote access. Having these capabilities built into a single solution means less reliance on multiple point products and easier evidence gathering during audits.

Another key benefit is operational efficiency and cost savings. Traditional VPNs and remote desktop setups come with significant overhead: maintaining VPN hardware/appliances, managing client software on every endpoint, dealing with support tickets for VPN issues, and manually provisioning user accounts or access rules across systems. Thinfinity’s ZTNA model removes the need for VPN appliances and uses cloud-native gateways, often reducing infrastructure costs and complexity. In fact, a comparison of ZTNA vs legacy VPN showed that Thinfinity’s approach lowers infrastructure costs, minimizes maintenance, and reduces the burden on IT. Because it’s clientless, IT staff don’t have to troubleshoot installation on every user’s device – access is through the browser. Features like automatic account provisioning and user self-service for access requests further save administrative time. One could onboard a new remote employee in minutes instead of days, as the Zero Trust access policies and SSO integration handle the heavy lifting. A real-world outcome observed is up to 50% reduction in onboarding time when moving to a modern ZTNA model for remote access.

Risk reduction is, of course, the ultimate goal of these security enhancements, and it carries business value by preventing costly breaches and downtime. By eliminating open ports and reducing the exposed network surface, Thinfinity dramatically lowers the risk of common attacks like RDP brute-force intrusion or malware spread through VPN. Granular RBAC and time-based access mean that even if an account is compromised, the blast radius is limited – attackers cannot roam freely. All these factors contribute to reducing the likelihood and impact of security incidents, which protects the company’s finances and reputation. As an added bonus, a well-implemented Zero Trust remote access solution can actually improve user productivity and satisfaction (fast, seamless access from anywhere) while keeping security tight. This alignment of security and usability is a strategic win for the business: IT isn’t perceived as a roadblock, and users have the freedom to work remotely on any device without endangering the company.

In summary, Thinfinity Workspace’s end-to-end security doesn’t just guard IT assets – it also helps the organization be more agile, cost-effective, and compliant. It reduces the need for multiple disjointed tools (VPN, separate MFA tool, separate session recorder, etc.) by combining functions, which in turn streamlines operations. Enterprises can securely enable remote work while actually lowering IT complexity and overhead. This synergy of security and efficiency is a key reason many organizations are now looking beyond traditional solutions and embracing Zero Trust platforms like Thinfinity.

Thinfinity vs. Traditional VPN/RDP Solutions

It’s useful to compare how Thinfinity Workspace stacks up against the older paradigms of remote access – namely traditional VPN combined with RDP (Remote Desktop Protocol) or other remote desktop tools. The differences are significant:

DimensionThinfinity Workspace (ZTNA, App Virtualization)Traditional VPN + RDP SolutionsKey Takeaway
Access ModelGranular, Application-Level Access: Users are granted access only to specific apps or desktops for which they are authorized—nothing else.Network Tunnel, Broad Access: Once connected, the device joins the entire corporate network, exposing all resources the user has network rights to.VPNs expose the entire network to a single compromised device. Thinfinity grants access only to verified apps and users.
Zero Trust PostureContinuous Zero Trust: Every session and action is authenticated and evaluated (user, device, time, role). No implicit trust is granted.Implicit Trust on Connection: Access is granted simply by being “on the network,” and all traffic is assumed legitimate.Thinfinity enforces “never trust, always verify.” VPNs assume trust after login.
Client Software RequirementNo Client Needed: 100% clientless browser access from any device. No installs, updates, or VPN key distribution.Client Software Required: VPN and RDP clients must be installed and patched on every endpoint, increasing friction and IT workload.Thinfinity lowers support costs and eliminates software distribution headaches.
Attack SurfaceReduced Surface: No inbound ports, RDP, or VPN appliances exposed; all connectivity is outbound. Uses HTTPS/WebSockets, obfuscates internal protocols.High Surface: VPN gateways and RDP servers are frequent attack targets; open ports are exposed to the internet and susceptible to automated attacks.Thinfinity removes obvious attack vectors. VPN/RDP are routinely exploited.
Integrated Security FeaturesUnified Security Stack: Built-in MFA, SSO, RBAC, session recording, device control, IP restrictions—all managed centrally for consistent policy enforcement.Fragmented Security: Requires combining separate tools for MFA, PAM, monitoring, etc.; policies are siloed and hard to coordinate.Thinfinity simplifies compliance and ensures all controls work together.
Performance & ScalabilityOptimized for Cloud and Hybrid: Scales across cloud regions, supports load balancing, and uses modern protocols (WebSocket, compression) for efficient access.Legacy Bottlenecks: VPNs can choke under load, force all traffic through a central point, and struggle to support distributed workforces.Thinfinity ensures low-latency, high-performance access—reducing user frustration and shadow IT.
Monitoring & VisibilityComprehensive Visibility: Centralized audit logs, real-time monitoring, session recording; see who accessed what and when.Limited Monitoring: Requires additional tools for audit trails; once inside the network, activity may be invisible without extra agents.Thinfinity accelerates detection and response; VPN/RDP visibility is often incomplete.
User ExperienceFrictionless Access: Single sign-on, consistent experience via browser, supports BYOD securely.Cumbersome Process: Multiple logins, inconsistent experiences across devices, risk of version mismatches.Thinfinity provides modern, seamless access—no more juggling VPN/RDP clients.

In essence, Thinfinity Workspace can replace traditional VPNs for remote access, providing a more secure and more controlled solution. Legacy VPN/RDP was suitable for an earlier era of IT, but today’s environment demands the kind of fine-grained, identity-centric security that Thinfinity offers. Organizations adopting Thinfinity have found they can decommission legacy remote access infrastructure, reducing costs and closing security gaps. Perhaps most importantly, by limiting access and removing implicit trust, Thinfinity significantly lowers the risk of a catastrophic breach originating from a single compromised remote user – which is a key advantage over the old way of doing things.

Conclusion

The shift to hybrid work and multi-cloud IT has made end-to-end security a top priority. Thinfinity Workspace exemplifies how a modern platform can address this need by weaving together Zero Trust principles, strong authentication, fine-grained access control, and session security into one solution. We’ve seen how Thinfinity’s features – from ZTNA architecture (no open ports, outbound-only connections) to MFA and passwordless logins, from RBAC and just-in-time privileged access to session recording and device control – collectively provide a 360-degree security blanket over remote access operations. This not only protects against external threats and insider misuse, but also helps businesses meet compliance requirements and operate more efficiently.

In comparison to traditional VPN and RDP setups, Thinfinity Workspace offers a clear strategic upgrade: more security, more control, and often less complexity in the long run. It enables companies to embrace cloud VDI and remote work with confidence that security won’t be sacrificed. By implementing an end-to-end security approach using Thinfinity Workspace, organizations in the US, Europe, and beyond can support their modern workforce and cloud-first initiatives while significantly reducing risk and maintaining an upper hand against cyber threats. In today’s threat landscape, that comprehensive, Zero Trust-driven defense is not just an IT improvement – it’s a business imperative for success and resilience.

About Cybele Software Inc.
We help organizations extend the life and value of their software. Whether they are looking to improve and empower remote work or turn their business-critical legacy apps into modern SaaS, our software enables customers to focus on what’s most important: expanding and evolving their business.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

runZero Named to Rising in Cyber 2025 List of Top Cybersecurity Startups

Selected by CISOs and leading investors, the list recognizes the 30 startups shaping the future of security.

Austin, Texas — June 4, 2025 — runZero, the leader in total attack surface management, today announced its inclusion in Rising in Cyber 2025, an independent list launched by Notable Capital to spotlight the 30 most promising cybersecurity startups shaping the future of security.

Unlike traditional rankings, Rising in Cyber 2025 honorees were selected through a multi-stage process grounded in real-world validation. Leading cybersecurity venture firms submitted nominations, and nearly 150 Chief Information Security Officers (CISOs) and senior security executives voted on the final list, highlighting the companies solving the most urgent challenges facing today’s security teams.

runZero was selected for its innovative approach to exposure management and attack surface discovery, helping security teams navigate today’s complex threat landscape. Unlike traditional vulnerability management solutions, runZero delivers complete and accurate visibility into every asset and exposure across internal, external, IT, OT, IoT, mobile, and cloud environments, including uncovering unknown and unmanageable devices and broad classes of exposures that evade other tools.

The company joins a cohort that has collectively raised over $7.8 billion, according to Pitchbook as of May 2025, and is defining the next era of cybersecurity across key areas like identity, application security, agentic AI, and security operations.

“The demand for cybersecurity innovation has never been greater. As the underlying technologies evolve and agentic AI reshapes everything from threat detection to team workflows, we’re witnessing a shift from reactive defense to proactive, intelligence-driven operations,” said Oren Yunger, Managing Partner at Notable Capital. “What makes this list special is that it reflects real-world validation — honorees were chosen by CISOs who face these challenges every day. Congratulations to this year’s Rising in Cyber companies for building the solutions that modern security leaders truly want and need.”

In celebration, honorees will be recognized today at the New York Stock Exchange (NYSE) alongside top security leaders and investors.

“We’re honored to be recognized as a Rising in Cyber 2025 company. runZero is challenging the status quo with a novel approach to exposure management that can finally provide defenders with the attack surface visibility and comprehensive risk detection required to protect complex, dynamic environments,” said Julie Albright, Chief Operating Officer for runZero. “As a disruptor in our space, it’s great to be acknowledged by CISOs who are in the trenches every day and who have struggled with outdated approaches to vulnerability management that are fundamentally broken. This recognition is a testament to the innovative approach we’ve taken and the meaningful impact we are making for teams responsible for securing their organizations against an increasingly challenging threat landscape.”

A new approach to exposure management

Leveraging innovative technology and proprietary discovery techniques, runZero provides organizations with the most complete and accurate visibility across their total attack surface, including unknown and unmanageable assets. On average, runZero enterprise customers report finding 25% more assets than they were previously aware of, with some environments yielding 10x more assets than security teams expected, radically expanding their view of their attack surfaces and the exposures within. These previously unknown assets are often those at the most risk.

Starting with a foundation of comprehensive visibility enables runZero to provide full-spectrum exposure detection across internal and external attack surfaces. Advanced fingerprinting methodologies build detailed, accurate profiles of each asset in the environment using a library of almost 1,000 attributes. This unmatched depth of data enables the platform to identify much broader classes of exposures going well beyond CVEs to identify risks that evade traditional vulnerability and external attack surface management solutions. runZero recently released new risk findings and dashboards, providing a novel paradigm for organizing, addressing, and tracking exposures over time.

To learn more about Rising in Cyber 2025, visit https://www.risingincyber.com/.

 

About Rising in Cyber

Rising in Cyber is an annual list recognizing the most innovative startups in cybersecurity as determined by nearly 150 leading CISOs and cybersecurity executives. Nomination criteria included private, venture-backed companies with a primary product focus on cybersecurity and the U.S. as a primary market. For more information about the honorees, participating investors, and methodology, visit www.risingincyber.com.

About Notable Capital

Notable Capital is a global venture capital firm based in the U.S. focused on early-to-growth-stage companies in cloud infrastructure and business and consumer applications. The firm invests primarily in the U.S., Israel, Europe, and Latin America. Notable Capital portfolio companies include Affirm, Airbnb, Anthropic, Brightwheel, Drata, Fal.ai, Handshake, HashiCorp, Ibotta, Monte Carlo, Neon, Orca Security, Quince, Slack, Stori, Vercel, and more.

Notable Capital is a longtime investor in the global cybersecurity sector. Its investments include Bitsight, Descope, Drata, Gem Security (Acquired by Wiz), HashiCorp ($HCP, Acquired by IBM), Nozomi Networks, Orca Security, Torq, Tonic.io, and Vdoo (Acq by JFrog), and more. More information can be found at www.notablecap.com and @notablecap.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox and CrowdStrike Integration Fortifies Customer Cybersecurity Posture with Enhanced Risk-Based Access Control

AUSTIN, TX – June 4, 2025 — Portnox, a leading provider of cloud-native, zero trust access control solutions, announced a new integration with CrowdStrike, a leader in endpoint protection and zero trust security. This strategic partnership enhances Portnox’s cloud-native Network Access Control (NAC) solution by incorporating CrowdStrike’s trusted device telemetry and Zero Trust Assessment (ZTA) scores, enabling organizations to enforce access policies based on real-time risk intelligence.

In today’s complex threat landscape, endpoint visibility and risk-based access control are cornerstones of effective cybersecurity. The integration between Portnox and CrowdStrike addresses this critical need by bridging the gap between endpoint intelligence and network enforcement.

“In an era where cybersecurity threats are constantly evolving, dynamic, real-time access control is paramount,” said Denny LeCompte, CEO of Portnox. “Our integration with CrowdStrike delivers on this need by empowering organizations to make informed, automated access decisions based on the most current device posture. This partnership significantly fortifies our customers’ security posture, enabling them to confidently embrace Zero Trust principles and adapt to an ever-changing risk landscape.”

CrowdStrike’s industry-leading Falcon® platform, an AI-powered, cloud-delivered solution, provides comprehensive protection for endpoints, workloads, and identities. Its real-time detection and response capabilities, threat intelligence, and behavior-based protection are instrumental in preventing breaches.

A key component of CrowdStrike’s offering is the Zero Trust Assessment (ZTA) score, an intelligent metric that dynamically evaluates a device’s risk posture based on telemetry inputs such as device health, vulnerabilities, threat detections, user behavior, and CrowdStrike agent status. These scores, ranging from 0 to 100, allow security teams to make informed decisions about access privileges and device remediation.

The Portnox cloud-native NAC platform empowers organizations to implement granular, risk-aware access controls without relying on on-prem hardware or complex configurations. With this new integration, Portnox can now:

  • Validate CrowdStrike Management: Automatically verify whether a device is managed by the CrowdStrike Falcon agent before granting network access.
  • Leverage ZTA Scores: Incorporate ZTA scores into policy decisions, allowing full access only to low-risk devices or enforcing guest VLANs or limited access for high-risk endpoints.
  • Strengthen Zero Trust Architectures: Utilize contextual, real-time risk signals from CrowdStrike to reinforce least-privilege access models across corporate and BYOD environments.
  • Automate Response: Define automated NAC policies that adapt to changes in device posture as reported by CrowdStrike, helping to contain threats before they escalate.

This integration is particularly impactful for hybrid workforces, BYOD programs, and any organization committed to implementing Zero Trust principles. It ensures that only trusted, compliant, and secure devices can connect to corporate networks, providing a continuous, adaptive security solution in the face of increasingly sophisticated attacks.

 

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What is Data Loss Prevention (DLP)? An introduction to DLP security

Summary: DLP solutions protect sensitive data from leaks, loss, and misuse. With the right DLP strategy, you can prevent breaches and boost compliance.

Today, data is every organization’s most prized resource, and keeping it secure is more important than ever. Data Loss Prevention (DLP) security helps businesses prevent sensitive data from falling into the wrong hands. It detects and stops data breaches, leaks, or unauthorized transfers before they happen.

Whether it’s a misdirected email, an insider threat, or a ransomware attack, data loss can cripple operations and damage trust. Data Loss Prevention solutions help protect sensitive data and support compliance with HIPAA, GDPR, and other data protection regulations.

This article explores why DLP matters for your organization’s long-term resilience and compliance.

Key takeaways

  • DLP prevents sensitive data from falling into the wrong hands. Whether an accidental email or a targeted cyber-attack, DLP detects and blocks unauthorized data access or transfers before damage is done.
  • It helps you comply with data privacy laws. DLP supports GDPR, HIPAA, PCI DSS, and other regulations by enforcing consistent data handling policies and maintaining detailed activity logs.
  • Data loss is a major cause of common threats, such as phishing, ransomware, and human error. DLP solutions reduce these risks.
  • DLP protects key types of data your business relies on. From financial records and intellectual property to personally identifiable information (PII) and health data, DLP helps classify and secure what matters most.

What is data loss prevention (DLP)?

Data Loss Prevention (DLP) is a set of tools and strategies that help businesses keep critical information safe. It stops sensitive data from being shared, sent, or accessed by the wrong users, whether by accident or on purpose. It also helps organizations avoid serious consequences like financial loss, reputational damage, and legal trouble.

DLP helps keep data private and available while supporting compliance with strict data regulations, like HIPAA or GDPR. For example, if a team member attempted to copy confidential client data to a USB drive or share it through a personal messaging app, DLP tools can block the action automatically to prevent unauthorized data transfers.

Key Data Loss Prevention measures include encryption, which secures data for approved users only, and access controls, which define who can view or edit sensitive files. Backups and recovery tools help restore data if something goes wrong, while data masking hides confidential information when full access isn’t needed.

Difference between data loss and data leakage

Data loss and data leakage may sound similar, but they pose different threats. Data loss happens when information is accidentally deleted, corrupted, or made inaccessible, for example, in a ransomware attack, hardware malfunctions, or a system crash. The key thing here is that the data is permanently gone.

Data loss vs. data leakage

In contrast, data leakage occurs when sensitive data is exposed or stolen. It can happen when the data is sent outside the organization without authorization, often through misdirected emails or insider misuse. Data leakage means it’s still out there, but in the wrong hands.

Data loss and leakage require different prevention and response strategies. DLP solutions are designed to ensure data security in both cases.

Common causes of data loss incidents

Data loss can be caused by many things, from simple human mistakes to cyber-attacks. Some causes are more common than others, and each one requires a different approach to prevention. Data threats are here to stay, and knowing what can go wrong is the first step to keeping your critical information safe.

Insider threats

Insider threats come from people inside the organization, like employees or contractors, who have access to sensitive data. According to Verizon’s Data Breach Report, insider threats are responsible for nearly one in five data breaches.

Sometimes, insider threats are accidental, like sending an email to the wrong person. Other times, they’re intentional, like a disgruntled employee stealing or leaking information.

User error

User mistakes happen and are one of the top reasons companies lose data. Accidentally deleting files, sending information to unauthorized users, or mishandling sensitive records can quickly lead to serious issues. According to the World Economic Forum, over 80% of cyber incidents are linked to human error.

While double-checking work and limiting file access can help, these manual steps aren’t foolproof. To truly reduce the risk, businesses should turn to automated security tools that apply consistent rules across the board.

Cyber-attacks

The goal of most cyber-attackers is to steal, damage, or block access to sensitive data. Bad actors use phishing, malware, and ransomware to break into systems and compromise data security:

  • Ransomware: Locks or deletes data and demands payment. In 2024, ransomware made up 20% of cyber incidents.
  • Phishing: 2025 saw an 84% increase in phishing emails that try to steal personal or login information each week. These attacks can target anyone and often lead to data exposure.
  • Malware: Malware still remains one of the top methods threat actors use. Spyware, backdoors, and crypto miners also steal or corrupt data silently.

 

Misconfigured cloud storage

In 2024, over 80% of data breaches involved data stored in the cloud, with misconfigurations being a primary contributor. Additionally, IBM’s Cost of a Data Breach Report indicates that cloud misconfigurations account for 15% of initial attack vectors in security breaches, ranking as the third most common entry point for attackers.

When cloud settings are improperly configured, such as leaving storage buckets publicly accessible or failing to enforce encryption, sensitive data becomes vulnerable to unauthorized access. These missteps can result in significant financial and reputational damage for organizations.

Shadow IT

Using unauthorized apps, devices, or services increases the risk of data loss. When employees bypass IT oversight, sensitive data can end up in unsecured locations, making it harder to monitor and protect.

Recent studies highlight the impact of shadow IT. The average cost of a breach involving shadow data reached $5.27 million, 16.2% higher than breaches that didn’t involve it.

Types of sensitive data DLP protects

With many organizations experiencing data loss in the past year, investing in DLP is no longer optional. It’s a must for protecting sensitive information and staying compliant.

What types of sensitive data DLP protects

Here’s what DLP helps safeguard:

  • Personally Identifiable Information (PII): Names, Social Security numbers, credit card details, emails, and phone numbers. DLP helps meet regulations like GDPR and CCPA.
  • Intellectual Property (IP): Trade secrets, product designs, source code, and proprietary algorithms. DLP blocks unauthorized access and data theft.
  • Protected Health Information (PHI): Patient records, medical histories, lab results, and billing data. Essential for HIPAA compliance in healthcare.
  • Financial data: Account numbers, transactions, reports, and investment details. DLP protects this data and supports regulatory requirements.

By applying DLP across devices, networks, and cloud services, companies can detect, monitor, and prevent leaks before they cause damage.

Why is DLP security important for data security?

Data Loss Prevention plays a key role in keeping sensitive information safe. It helps protect intellectual property and critical data from being exposed, stolen, or misused and supports compliance with standard data protection regulations.

Protecting intellectual property and sensitive data

DLP helps protect your most valuable assets—such as product designs, source code, and customer records—from unauthorized access. Whether it’s accidental sharing or intentional theft, DLP tools prevent sensitive data from leaving your network. This protects your competitive edge and builds customer trust.

Reducing data breaches and insider threats

Many data breaches start from within, whether through human error or malicious intent. DLP reduces this risk by monitoring user actions, blocking risky behavior, and flagging unusual activity. It’s a key layer of defense against both internal and external threats.

DLP also supports a Zero Trust approach, where no user or device is automatically trusted. This ensures that access to data is constantly verified and monitored.

Supporting regulatory compliance and audit readiness

With strict data privacy laws like GDPR, HIPAA, and CCPA, businesses must prove they’re protecting sensitive data. DLP helps meet these requirements by enforcing consistent policies and keeping detailed logs. That means fewer compliance gaps and smoother audits.

 

How DLP works

DLP solutions help ensure data security and create a strong defense against data leaks, misuse, and accidental loss. The best practices for Data Loss Prevention include a three-step approach.

Step 1: Identify and classify data

The first step is identifying your most valuable and sensitive data that attackers could target. DLP tools help identify sensitive data across cloud apps, email, and devices. Once you know where your data is, you can classify it based on its type, source, or content.

For example, a finance team might classify spreadsheets with revenue forecasts as confidential, while HR would tag employee records containing names and contact details as personally identifiable information (PII). A product team could label source code or design files as internal use only. Classifying data helps track its use and apply the right protection measures.

Step 2: Monitoring data movement and access

Understanding how data is used and spotting behaviors that put it at risk is essential. Data is often most vulnerable on endpoints, especially when shared via email attachments or copied to external drives.

DLP solutions track data in motion, at rest, and in use to uncover suspicious activity, like transferring valuable files to unauthorized users or locations. By monitoring access patterns and user behavior, organizations gain clear visibility into data security risks and can act before issues escalate.

Step 3: Blocking unauthorized data transfers

Once threats are detected, data loss prevention tools take action. If someone tries to email confidential data outside the company, upload it to personal cloud storage, or print sensitive documents, DLP solutions step in.

Types of DLP solutions

Different types of data loss prevention solutions are designed to address specific data security risks across networks, devices, and cloud environments. Choosing the right mix helps protect your sensitive data.

Key components of DLP

Network DLP

Network DLP tools monitor all traffic flowing in and out of your organization. They inspect data packets for sensitive content and block unauthorized transfers in real time.

To boost data security, features like Network Access Control (NAC) help ensure that unauthorized users and devices are kept off your business network. Also, Identity and Access Management (IAM) adds another layer of security by verifying that every user accessing the network is properly authorized.

Together, these solutions create a robust defense for your business network, reducing the risk of data loss.

Endpoint DLP

Endpoint DLP protects data where it’s most vulnerable—on user devices like laptops, phones, and desktops. It prevents risky actions like copying files to USB drives, printing, or uploading data to personal storage.

For even stronger protection, solutions like NordLayer’s upcoming new-gen Enterprise Browser help limit what can be viewed, downloaded, or shared between the browser and the device. As a result, it reduces the risk of data leaks from both internal and external threats.

Paired with Device Posture Security, which checks if a device meets your company’s security standards before granting access, you get a reliable line of defense at the endpoint level.

Cloud DLP

Cloud DLP protects data stored in and moving through cloud platforms. It monitors activity in cloud apps, collaboration tools, and storage services and applies security policies to ensure safe usage.

With NordLayer’s Cloud Firewall, you can enforce access rules, detect anomalies, and secure traffic between users and cloud resources.

By combining these three DLP types, you can create a layered approach that fits your business needs, protects critical data, and supports compliance with evolving regulations.

Key components of DLP solutions

The best DLP tools combine innovative technology and clear policies to protect critical data across every environment—cloud, endpoint, and network. Here are the essential features to look for:

  • Data discovery and classification. Identifies and tags sensitive data such as PII, financial records, and intellectual property. It helps prioritize protection efforts and supports compliance requirements.
  • Policy enforcement. A set of customizable rules that control who can access data and what actions they can take. When sensitive data is mishandled, the system can block it, encrypt it, or alert your team.
  • Real-time monitoring and alerts. Continuous tracking of data activity across your systems. Suspicious behavior—like unusual file transfers or unauthorized access attempts—triggers alerts for rapid response.
  • Data encryption. Encryption protects data at rest and in motion. DLP can enforce policies that automatically secure data based on its sensitivity and destination.
  • Securing data in motion. DLP scans network traffic to detect and stop sensitive data from leaving your organization in violation of policy.
  • Securing endpoints. DLP solutions on user devices control data transfers between people, teams, and external parties. They can block unauthorized actions in real time and give users immediate feedback.
  • Securing data at rest. Access controls, encryption, and retention policies protect stored data in file servers, databases, or archives from accidental or intentional leaks.
  • Securing data in use. DLP monitors how users interact with data—copying, editing, printing—and flags or blocks risky actions on the spot.

Data loss prevention policy essentials

One of the most important elements of any data loss prevention strategy is a clear, well-defined DLP policy. It acts as your organization’s rulebook for handling and protecting your data.

A DLP policy outlines what data needs protection, how to manage it safely, and who’s responsible for keeping it secure. It ensures everyone follows the same standards and understands their role in data protection.

Here are eight reasons why every modern organization should have one in place:

  1. Protect your data. Set clear rules to prevent unauthorized access, sharing, or loss.
  2. Stay compliant. Align with GDPR, HIPAA, and PCI DSS, and avoid costly penalties.
  3. Promote accountability. Make employees aware of their role in data protection.
  4. Boost incident response. Detect and contain threats quickly with clear response steps.
  5. Safeguard intellectual property. Keep trade secrets, code, and ideas secure.
  6. Manage third-party risks. Ensure vendors follow your data protection standards.
  7. Mitigate insider threats. Monitor and flag risky user behavior internally.
  8. Build customer trust. Show you’re serious about privacy and protecting user data.

A DLP policy isn’t just a formality—it’s a key step toward building a secure, compliant, and resilient business.

How NordLayer can help your business with data loss prevention

Your data is one of your most valuable assets, and it’s constantly at risk. A simple human mistake, a phishing email, or a misconfigured cloud setting can lead to massive data loss, reputational damage, and legal trouble.

That’s where Data Loss Prevention (DLP) comes in. It helps you keep sensitive information from the wrong hands and comply with strict data privacy laws like GDPR, HIPAA, and PCI DSS.

At NordLayer, we make DLP effective with features like:

We’re also building the next generation of endpoint protection. NordLayer’s Enterprise Browser (coming soon) will give IT admins centralized control over how employees use the web, something consumer browsers can’t do. It’s a game-changer for companies operating in BYOD environments. Want early access? Join the waiting list to stay in the loop.

Have questions or need a tailored solution? Contact our sales team to learn how NordLayer can support your specific data protection goals.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×