Skip to content

How WeTransfer upgraded existing VPN to a cloud-native solution for enhanced security application and experience

In the bustling canals of Amsterdam, a vibrant Dutch company, WeTransfer, emerged in 2009, becoming a haven for creatives worldwide. Known for its ingenious solutions to share large files easily and collaborate with teams, the WeTransfer platform not only caters to creative minds seeking a hassle-free way to distribute their work but also integrates an advertising model that transforms time spent on the site into a visual feast.

Profile of WeTransfer

WeTransfer takes a unique approach in having a viral product complemented by a full-screen advertising space used by hundreds of major brands around the world. The platform supports creative professionals, as well as creative communities facing the world’s most pressing issues.

As a platform serving tens of millions of people around the world, cybersecurity and operational efficiency are top priorities.

In this interview, Director Enterprise IT Adam O’Toole shares why and how WeTransfer embarked on using NordLayer.

The challenge 

Legacy VPN and the need for reliability

Key pain points

VPN is used at WeTransfer not only for the engineering team to connect to several development APIs. It’s also necessary to validate global ad displays in over 130 countries. Ensuring continuity demanded a more flexible and robust solution.

“Moving to a new HQ, we were faced with a fresh challenge: our VPN was physically hosted on-site so our engineering teams could connect to systems that were inside our network. We needed a cloud alternative for changing places”

Click to tweet

The impending office move only accelerated the search for a cloud-based VPN that could offer uninterrupted service and global reach.

The solution

Strategic transition to a hassle-free tool

Main criteria choosing the solution

At WeTransfer, the team used two VPNs in total. One was dedicated to product development in the engineering department. The other was established due to a hybrid work model for remote employees to connect to the network and ad team for localization.

NordLayer stood out for several reasons. First, it’s a fully cloud-native solution. Also, it provides an extensive network of global gateways and static IP addresses, which is excellent for a global company like WeTransfer, present in different countries.

“Our ISO certification demands rigorous checks and balances, a standard that NordLayer meets with its comprehensive access policies, ensuring every connection is secure and aligned with our high standards.”

Click to tweet

What is more, it seamlessly integrates with the company’s security framework. And finally, it ensures compliance, a requirement for WeTransfer to follow ISO 27001 standards.

“We are a small team supporting a company of 340+. We need our tools to work for us, not against us. With automation, we’ve been able to spend less time on manual tasks and more on what matters, proving that a lean team can go a long way.”

Click to tweet

The transition marked a pivotal shift towards a cloud-based model, offering a seamless, maintenance-free experience that contrasted with the upkeep of the previous system.

Why choose NordLayer

The journey to NordLayer began with a collaborative effort to understand the specific needs across departments.

  1. We gathered a list of different departments to see how they use a VPN.

  2. The survey format helped us understand the needs and the demand for a VPN tool.

  3. We crystalized the use cases and how many gateways we needed.

  4. Some of the criteria were simple integration into the infrastructure, hassle-free usage, and static IP setup.

  5. Simplicity in using and maintaining the tool was equally important to security.

The integration with the existing security framework simplified access control, ensuring a smooth onboarding and offboarding process that resonated with the company’s lean IT team ethos.

“Okta integration was a big push from a security perspective for us to have better access control and automation when people come and leave.”

Click to tweet

With the Okta integration supported by NordLayer, the company can leverage stronger authentication mechanisms. Biometric authentication via Okta FastPass provides an additional level of security, allowing it to better protect against common attacks.

The intuitive dashboard and the provision for fixed IP addresses further streamlined operations, making NordLayer an obvious choice.

Rethinking the VPN strategy when transitioning to a cloud-based tool from a physical VPN

Legacy VPN vs Cloud VPN

NordLayer’s appeal lies in its ability to meet the company’s unique demands. Its vast network of gateways enabled the advertising team to accurately preview campaigns across different regions, a critical feature for a global player in the advertising space.

The outcome

Seamless operations and enhanced productivity

The benefits of implementing NordLayer

The switch to NordLayer translated into tangible benefits. The IT team was liberated from the monthly maintenance rituals that had previously hindered productivity and could focus on strategic initiatives.

“With NordLayer, it’s simple: if you’re in, you get access; if you’re out, you lose it. The dashboard is clear, making setup quick and getting results easy.”

Click to tweet

Thanks to NordLayer’s dedicated gateways, WeTransfer improved developer experience for engineers located outside of the Netherlands, with quicker feedback loops during development cycles.

Pro cybersecurity tips

Cybersecurity hygiene is very personal yet important to follow, just as taking care of yourself. It can be achieved differently but for the same result—secure digital environments. This interview was no exception to asking how IT professionals prioritize cybersecurity in their daily lives. Thus,  Adam O’Toole, Director Enterprise IT at WeTransfer, shares his favorite and most important tips on what matters first.

Adam O'Toole, Director Enterprise IT, WeTransfer, about cybersecurity

WeTransfer adoption of NordLayer showcases how cybersecurity posture was improved by underscoring the importance of adaptability, collaboration, and strategic tool selection in the digital age.

The journey from a physical VPN system to a streamlined, cloud-based solution not only enhanced operational efficiency but also fortified the company’s cybersecurity defenses. As a result, the company can continue its mission of supporting the global creative community with trust and confidence.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Third-party reviews: Perimeter 81 competitors and alternatives

We know how important it is to make the right decision when it comes to selecting cybersecurity tools and solutions. This blog article will have hands-on information about how secure network access solutions and VPNs compare to the most commonly chosen alternatives in the market.

In this article, we will overview Perimeter 81 competitors and alternatives. 

Disclaimer: This article is based entirely on third-party reviews and open-source online information accessed between April 15 and 22, 2024. NordLayer is not responsible for data accuracy, as competitor information is subject to change. The competitor information was gathered through a combination of manual research and data extraction. Data points include feature comparisons and product analysis.

Overview of Perimeter 81

Perimeter 81’s mission is to simplify secure network, cloud, and application access for the modern and mobile workforce. It achieves this by transforming traditional network security technology into one unified Zero Trust Network as a Service derived from a SASE framework.

Perimeter 81 capabilities

  • Smooth integration and deployment

  • Good customer service

  • Satisfactory speed and performance

  • Offers completely audited access

Perimeter 81 benefits

According to the Perimeter 81 website, the flexible and straightforward solution is their strength.

  • Easy building and management without lengthy setups and manual configurations.

  • Fast and flexible solution deployment with a centralized dashboard for resource management.

Perimeter 81 limitations

Perimeter’s weaknesses, according to the mentioned review platforms, are:

  • Premium plans are required to access advanced features

  • Customer support has access to substantial information

  • A relatively small number of countries to select from

  • Pricing is on the higher end

Let’s overview the competition of Perimeter 81 available in the market.

Disclaimer: Product review is based on information provided on VPN review sites such as Gartner, Capterra, and Cybernews and assessed customer feedback shared on these platforms, accessed on April 22, 2024.

NordLayer

NordLayer is a multi-layered business cybersecurity tool enabling all ways of working. It is a secure remote access solution from the Nord Security powerhouse and consumer product NordVPN.

The baseline of NordLayer’s development focus is defined by Secure Access Service Edge (SASE) and Zero Trust frameworks. The solution introduces SaaS security features for the internet, resource, and network access control.

NordLayer capabilities

  • Seamless integration with existing infrastructure and intuitive deployment of a cloud-based platform

  • Scalable with an unlimited number of users and adaptable to various business needs

  • High-performance service and 24/7 tech-savvy support for all plans

  • Strong product capabilities and comprehensive cloud-native feature set

  • In-house developed NordLynx VPN protocol based on Wireguard® for unprecedented performance and speed.

NordLayer benefits

According to the NordLayer website, the solution’s strengths are in its simplicity, security capabilities, and performance.

  • Easy to start, scale, and combine, as the solution requires no hardware and is simple to deploy, set up, and maintain within minutes. It integrates seamlessly with existing infrastructures and has a user-friendly Control Panel.

  • Custom and unique security solutions like NordLayer, the fastest unique VPN protocol, or Browser Extension, a lightweight solution for traffic encryption on a browser level only.

  • Compatibility with popular security providers facilitates the smooth integration of existing Identity & Access Management (IAM) and authentication systems and tools for a quick setup.

  • NordLayer offers a 14-day money-back guarantee.

NordLayer use cases

NordLayer offers a hassle-free cybersecurity solution tailored for businesses. It enables organizations to create secure remote connections to the internet, their company network, and cloud-based resources, facilitating compliance for any way of working.

  • Secure internet access: Protect traveling employees by securing remote access through public Wi-Fi. This prevents threats while browsing the internet, allows access to geo-specific content, and ensures the masking of IP addresses for enhanced privacy and security.

  • Network & resource access management: Establish segmented access to company resources, control access by selecting specific content categories and applications, create connections between remote devices, and enable remote access to hybrid resources. This enhances overall operational flexibility and security.

  • Achieving compliance: Continuously monitor VPN activity within your organization, maintain an overview of devices present in the network, manage identity and remote access for both users and applications, and ensure the encryption of data transmissions originating from untrusted networks to bolster overall cybersecurity.

NordLayer limitations

  • No API access is available

  • Does not integrate with SIEM solutions

  • Minimum member license quota

NordLayer reviews

To provide an objective evaluation of the product, we will refer to major VPN review sites (Gartner, Capterra, Cybernews) and will look into client feedback shared on these websites:

Customer feedback and insights:

NordLayer offers Security Service Edge (SSE) capabilities like Cloud Firewall (FWaaS), Zero Trust Network Access (ZTNA), and Secure Web Gateway (SWG) for creating robust security policies. To learn more about NordLayer’s secure network access solution features and plans, see our pricing information.

Twingate

Twingate is a security service that provides controlled remote access to company cloud resources through Zero Trust verification, detailed secure access policies, and multi-factor authentication. It’s deployable on multiple cloud-native services and designed for easy integration with existing tech stacks.

Twingate capabilities

  • Integrations with major IdPs, MDM/EDRs, SIEMs, and DOH providers

  • Security model based on Zero Trust Architecture

  • Centralized management

  • Free introductory plan and free trial

Twingate benefits

According to the Twingate website, the solution’s strengths are its access controls and connectivity.

  • Implementation of least privileged access to protect SaaS applications and cloud-based or on-premise resources

  • Automated Zero Trust integration with API-first design for easy integration with infrastructure as code (IaC)

Twingate limitations

  • It doesn’t provide access control at the port level

  • Requires third-party access to company infrastructure

  • Customer support is limited (i.e., forum support for mid-tier plan)

  • Twingate connector deployment for remote resource access is done via Linux systems or an OCI (docker), which requires technical knowledge

Disclaimer: This review draws on details from prominent VPN evaluation websites like TechRadar, TrustRadius, Comparitech, and customer opinions shared through these channels as of April 22, 2024.

GoodAccess

GoodAccess is a cloud-based VPN that offers secure, encrypted access to local networks with Zero Trust security, static IPs, and threat protection for remote workforce across various devices and locations.

GoodAccess capabilities

  • Static IP for business teams, enabling access to geo-blocked resources

  • High-level encryption for secure internet access and data protection

  • The global public infrastructure of 35+ locations

  • Security features include features like basic and premium threat blockers

GoodAccess benefits

According to the GoodAccess website, the solution’s strengths are its access controls and connectivity.

  • Inexpensive with a free trial and a starting capabilities plan

  • Fast setup and simplified management with an easy-to-use web management platform

GoodAccess limitations

  • Few private server locations

  • Better suits small- and medium-sized organizations

  • 24/7 live support is available for the enterprise plan only

Disclaimer: This analysis is informed by details from leading VPN comparison websites (Capterra, TechRadar, G2) and reviews shared by users on those platforms as of April 22, 2024.

Zscaler

Zscaler is a cloud-based security company providing solutions that improve the safety of users and data across various internet and private networks. It is designed to securely connect users to their applications and manage device policies without traditional hardware-based boundaries.

Zscaler capabilities

  • Offers SASE framework components: SWG, CASB, ZTNA, FWaaS

  • Access control that is detailed and customizable

  • Enhanced visibility into user activities and assets

Zscaler benefits

  • Enhanced security through a multi-layered approach

  • Suits businesses of all sizes

  • User-friendly interface

Zscaler limitations

  • Configuration complexity, which can be challenging for businesses without dedicated IT teams

  • Demands high-speed internet for optimal performance

  • Pricing details are only available through consultation

Disclaimer: Product review is based on information provided on Zscaler’s website, Gartner and TechRadar’s reviews of Zscaler, and customer feedback shared on review platforms (G2), accessed on April 22, 2024.

Cisco

Cisco is a global technology leader known for its networking and security solutions. These solutions are integrated across Cisco’s entire product portfolio and aim to protect enterprise networks, data, and applications.

Cisco capabilities

  • Provides services like malware protection, intrusion prevention, and secure internet gateways.

  • Offers an SSE-based unified defense strategy across networks, clouds, endpoints, and applications.

  • Delivers comprehensive network and cloud security analytics, ideal for large enterprises due to its scalable and detailed features.

Cisco benefits

  • Scalable, advanced threat protection, and comprehensive integration capabilities.

  • Centralized management features across its products enable simplified administration of security policies and procedures.

  • Extensive global reach.

Cisco limitations

  • Some users find the setup and management of certain Cisco security products to be complex and resource-intensive.

  • The cost can be a barrier for smaller businesses or those with limited IT budgets.

Disclaimer: This review draws from details on Cisco’s corporate site, analyses from industry analysts like Gartner and Forrester, as well as end-user reviews found on TrustRadius and G2 as of April 22, 2024.

Make an informed decision

The review of Perimeter 81 and its competitors aims to support decision-makers in securing access to the organization’s local networks and protecting their teams. However, they are struggling to find a starting point.

Explore Decision Maker’s Kit, a free tool prepared by the NordLayer team, which helps build a strategy for selecting the most suitable solution for your organization and guides you throughout the process from A to Z.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

NordLayer feature release: IP-based split tunneling

At NordLayer, we understand the need for network flexibility, and we’re excited to introduce our latest innovation: IP-based split tunneling. This new release is a major advancement, building upon our URL-based split tunneling feature and opening new doors for our customers’ network security and performance.

With IP-based split tunneling, we’re introducing a more tailored approach to network traffic management. This sophisticated method allows organizations to selectively encrypt network traffic by specifying IP addresses or subnets, ensuring sensitive data transmitted to and from those addresses remains secure and private. By separating encrypted and unencrypted traffic, we help organizations strike a delicate balance between robust security measures and uninterrupted internet performance.

What problem does IP-based split tunneling solve?

IT administrators often face the challenge of balancing network security with optimal performance. NordLayer’s IP-based split tunneling solves this dilemma by enabling selective encryption of traffic for specific IP addresses or subnets.

Click to tweet

Additionally, IP-based split tunneling addresses the issue of managing organization-based network requirements. With the ability to exclusively encrypt traffic, admins can tailor network security to meet changing needs—such as a growing organization or industry-specific compliance requirements—ensuring that critical resources are protected while adapting to dynamic organizational demands.

Pair IP-based split tunneling with granular access control rules enforced through NordLayer Cloud Firewall and you have yourself an unprecedented private resource access solution that meets everchanging business needs.

Feature characteristics: what to expect

IP-based split tunneling brings benefits to IT admins and end-users alike. Admins gain centralized control and improved network management capabilities, while employees experience seamless internet performance.

The key advantages of IP-based split tunneling revolve around enhanced productivity and performance:

  • Optimized internet performance: By selectively routing only specific subnets through the VPN tunnel, organizations can alleviate bandwidth limitations and bottlenecks. Regular internet traffic doesn’t need to be tunneled through the NordLayer gateway, resulting in improved overall network performance.

  • Enhanced VPN performance: With split tunneling enabled, employees can effortlessly access company resources and regular internet services, printers, and other local network devices alike, remaining unaware of the underlying security configurations.

  • Flexibility & control: By excluding non-essential traffic from the VPN tunnel, organizations can achieve better performance for applications and services that don’t require encryption, such as SaaS or VoIP services from globally trusted providers.

  • Security & risk mitigation: IP-based split tunneling enables organizations to balance security and functionality by directing critical internal systems through a VPN and allowing less sensitive web browsing traffic to bypass encryption while keeping the protective layer on through the use of NordLayer’s Secure Internet Access features.

How does IP-based split tunneling work?

IP-based split tunneling is a strategic feature that selectively secures parts of your network traffic. IT administrators can configure specific IP addresses or subnets for encryption, ensuring that only those specified addresses are routed through secure VPN servers.

Click to tweet

This targeted encryption approach strikes the perfect balance between security and performance—your sensitive data remains protected without any impact on the speed of web browsing.

Each dedicated server can be configured with up to 16 CIDRs at a time and there is no limit to how many servers can be used in a single Virtual Private Gateway.

Configuring split tunneling is straightforward and accessible with our Core and Premium subscription plans. This feature is particularly useful for Premium subscribers who can use the Site-to-Site capability to access private network subnets through the NordLayer gateway.

To enable this feature, follow these simple steps:

  1. Navigate to the Network section in the NordLayer’s Control Panel

  2. Select Servers and then choose Configure from the options presented

  3. From the dropdown menu, select Split Tunneling

  4. Input the desired IP addresses and subnets you wish to tunnel through NordLayer

By specifying these addresses, you ensure that only the designated traffic uses the NordLayer tunnel, while other traffic utilizes the direct internet route.

Productivity by design

Our first release, URL-based split tunneling for Browser Extension, offered flexibility by leaving certain domains unencrypted while encrypting the rest of the traffic. Now, with IP-based split tunneling for desktop and mobile apps, we’re taking it a step further, allowing organizations to pinpoint exactly which IP addresses require encryption.

The beauty of our twofold approach lies in the different strategies employed. URL-based split tunneling creates exceptions by excluding specific domains, while IP-based split tunneling includes only specified IP addresses for a more targeted encryption process. Together, they form the foundation of our VPN split tunneling feature, enhancing network efficiency, reducing congestion, and optimizing bandwidth usage.

We understand that network security can be complex, and our goal is to provide organizations with the tools they need to navigate it with confidence. Our innovative duo of URL-based and IP-based split tunneling increases flexibility, allowing our customers to customize their network security according to their needs.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Best remote work books for business in 2024

Remote work is here to stay. However, companies need to ensure remote workers can connect safely and efficiently. Balancing convenience, employee freedom, and data security takes skill and judgment. And it also requires a little creativity to support remote workers while meeting business goals.

If you are grappling with remote work challenges, this blog is for you. We will explore some of the most accessible and informative remote work books. There are plenty of entertaining experts around (and a few imposters). But the books below are all essential additions to your management bookshelf.

Benefits and challenges with remote working employees

Working from home is a fundamental part of modern life. As of 2024, around 33 million Americans work remotely. Virtually all workers would like the option of working remotely sometimes. And almost 30% of workers have adopted a “hybrid work” routine, mixing office time and work from home.

Employees are embracing remote work because they want to. Working from home allows staff to find the right work-life balance. Workers can balance childcare, leisure, and work. And they can forget about stressful commutes.

For companies, remote work boosts employee happiness and reduces the cost of on-premises systems. Home workers are often more productive (although not always), and companies can leverage national or international talent pools.

On the other hand, managing remote teams brings challenges. Managers need to communicate effectively and keep workers motivated. Building teams is tricky without face-to-face contact. And then there are security worries.

Remote work often requires exchanging sensitive data between central or cloud data centers and homes or public networks. Employees need third-party remote access to apps and databases. This access creates new and potentially harmful data risks.

None of these challenges are insurmountable. If they were, millions of employees would permanently return to the office, but that is not happening. Creative companies are finding ways to benefit from working from home without risking their reputations.

Successful firms also leverage expert advice and constantly expand their remote work knowledge. Head straight to the list below for our recommended reading, or check out these related articles to explore remote work further:

Related articles

 

Remote Work

Creating a successful remote work policy: examples and best practices

29 Aug 20236 min read

Creating a successful remote work policy web 1400x800

 

In Depth, Remote Work

Simplify remote employee onboarding with a complete checklist

8 Aug 20237 min read

Remote employee onboarding checklist web

 

Best books to read about remote work

Titles for remote work managers to dive into:

  • “The Ultimate Guide to Remote Work”

  • “Remote: Office Not Required”

  • “Remote Work: Redesign Processes, Practices and Strategies to Engage a Remote Workforce”

  • “Running Remote: Master the Lessons from the World’s Most Successful Remote-Work Pioneers”

  • “Remote Not Distant: Design a Company Culture That Will Help You Thrive in a Hybrid Workplace”

  • “Office Optional: How to Build a Connected Culture with Virtual Teams”

  • “Leading From Anywhere: The Essential Guide to Managing Remote Teams”

  • “Work Together Anywhere: A Handbook on Working Remotely Successfully”

  • “The Nowhere Office: Reinventing Work and the Workplace of the Future”

  • “Remote Leadership: How to Accelerate Achievement and Create a Community in a Work-from-Home World”

  • “How the Future Works: Leading Flexible Teams to Do The Best Work of Their Lives”

  • “Remote Work Revolution: Succeeding from Anywhere”

  • “HBR Guide to Remote Work”

  • “Virtual Culture: The Way We Work Doesn’t Work Anymore, a Manifesto”

  • “Deep Work”

  • “The Nowhere Office: Reinventing Work and the Workplace of the Future”

That list should occupy even the most voracious readers. So, let’s turn the page and introduce 2024’s best remote work books.

“The Ultimate Guide to Remote Work” by Wade Foster, Alison Groves, and Danny Schreiber

The Ultimate Guide to Remote Work

Billing itself as the “ultimate guide” sets expectations high for this Zapier App publication, but the authors deliver. Based on the real-world experiences of Zapier CEO Wade Foster and his team, the book discusses practical struggles and solutions. Always avoiding jargon, it explains how to build remote teams and make them run smoothly.

Check for the latest Kindle version of the eBook, as the authors update the text frequently. Regular updates mean that few books are as fresh and relevant.

“Remote: Office Not Required”  by Jason Fried and David Heinemeier Hansson

Remote: Office Not Required

First published in 2013, “Office Not Required” set the trend for remote working manuals. Ten years later, it remains relevant and inspirational.

Fried and Hansson used their experiences as founders of project management start-up Basecamp. What makes their argument persuasive is the process Basecamp followed, moving from assumptions about on-premises work to embracing remote alternatives.

Although written from a CEO perspective, the book is equally valid for workers, so anyone can benefit from it.

“Remote Work: Redesign Processes, Practices and Strategies to Engage a Remote Workforce” by Chris Dyer and Kim Shepherd

Remote Work Redesign Processes, Practices and Strategies

Moving to remote work is a business process requiring systematic planning and skill. Dyer and Shepherd know the task inside-out, having shifted their teams to home working during the Covid pandemic.

This book is ideal for managers seeking to structure remote work transitions. For instance, Dyer and Shepherd discuss writing remote work policies and using digital tools to secure workstations. They also discuss HR and management strategies to support employees and delve into measurement techniques to verify remote work productivity. Managers will find it an invaluable companion.

“Running Remote: Master the Lessons from the World’s Most Successful Remote-Work Pioneers”  by Liam Martin and Rob Rawson

Running Remote

Rawson and Martin founded Time Doctor to help workers with time management. However, Time Doctor encountered problems when transitioning to a remote model. “Running Remote” chronicles the experience, adding advice about how to leverage remote workforce technologies. Honest and very readable, it makes a convincing case for going remote. But it also adds context about dangers and challenges.

One of the best aspects of this book is what the authors call the “async mindset.” Stripping away the jargon, this is a valuable framework for managing remote staff and ditching old-style meetings or management techniques.

“Remote Not Distant: Design a Company Culture That Will Help You Thrive in a Hybrid Workplace” by Gustavo Razzetti

Remote Not Distant

As Razzetti observes, one of the best things about remote work is that it separates employees from static offices, allowing them to work wherever they want. However, one of the drawbacks of remote work is the distance between workers and managers. Solving this problem is tricky – at least without the advice contained in this fascinating book.

Easy to read but well-informed, Razzetti’s book explains how to mold remote work mindsets and manage distributed teams. He explores ways to build a remote corporate culture and collaborate seamlessly across continents. In other words, there’s plenty of gold here for managers to discover.

“Office Optional: How to Build a Connected Culture with Virtual Teams” by  Larry English

Office Optional

Larry English blazed a trail in remote work, helping to build one of the first remote-first consultancy firms. He also timed this book perfectly to coincide with the Covid pandemic. More importantly, he filled this primer with invaluable stats and management wisdom.

Readers can glean a lot of insights from “Office Optional”. Some of the most memorable sections deal with building trust across the oceans and maintaining close professional relationships with colleagues you barely ever meet. As English stresses, relationships are everything in remote work. But with the right mindset and skills, a remote leader can unify and inspire even the most dispersed team.

Leading From Anywhere: The Essential Guide to Managing Remote Teams

Leading From Anywhere

Burkus has written the how-to manual for remote managers. “Leading from Anywhere” sets out critical tasks for smooth remote work. It covers employee onboarding, performance reviews, communication, preventing burnout, and building a healthy remote culture.

Burkus tackles each subject with a mixture of best practices and real-life testimonies. By the end of his book, you should be ready for whatever remote work transitions come your way.

“Work Together Anywhere: A Handbook on Working Remotely Successfully” by Lisette Sutherland and Kirsten Janene-Nelson

Work Together Anywhere

Sutherland is one of the most in-demand virtual team consultants, helping companies worldwide craft functional remote work setups. This book presents advice from the front line about what makes good remote teams and what causes teams to fail.

One of the best aspects of “Work Together Anywhere” is how it breaks down tasks and ideas by role. There are chapters for managers leading remote teams, employees, and even executives. Every stakeholder plays a part in remote work. Sutherland and Janene-Nelson explain what they need to do.

“The Nowhere Office: Reinventing Work and the Workplace of the Future” by Julia Hobsbawm

The Nowhere Office Reinventing Work and the Workplace

Hobsbawm is an experienced communications expert (and a popular podcaster on remote work topics). Her book, “The Nowhere Office,” distills her experiences advising companies about how to embrace hybrid work. Hobsbawm offers a positive vision of employee flexibility that complements corporate goals, provided companies know what they are doing.

Another strong point of “The Nowhere Office” is that it takes on critics of home working. For instance, Hobsbawm accepts that working from home can isolate workers or cause leadership headaches. She has plenty of convincing answers to those problems, along with almost every common argument against hybrid work.

We liked the book so much that we actually spoke to the author in late 2023. Check out the interview before ordering the eBook or paperback, as Hobsbawm delivers some insights that you won’t find in the text.

“Remote Leadership: How to Accelerate Achievement and Create a Community in a Work-from-Home World” by David Pachter

Remote Leadership

When the pandemic hit, marketing agency JumpCrew was still getting started. An intense face-to-face strategy and a close-knit office team had powered rapid growth. However, that had to change as the firm adopted remote working. As the CEO of JumpCrew, Pachter oversaw the transition. And with more than 200 employees at last count, he did pretty well.

“Remote Leadership” tells the story of adaptation under pressure. Pachter explains how a three-part model based on reflective leadership, collaborative learning, and peer coaching helped JumpCrew survive. He also argues persuasively that similar ideas can help remote teams thrive.

“How the Future Works: Leading Flexible Teams to Do The Best Work of Their Lives” by Brian Elliott and Sheela Subramanian

How the Future Works

Approved by the CEO of Slack, “How the Future Works” will inspire anyone who is half-convinced about the virtues of remote working. Elliott and Subramanian explore the benefits of flexibility for workers and companies.

Along the way, they make radical suggestions about the value of letting go – enabling teams to express their creativity without interfering. However, they ground this sense of freedom in hard-headed practical advice about managing remote teams. The result is a fusion of optimism and realism and a great explainer for remote work managers.

“Remote Work Revolution: Succeeding from Anywhere” by Tsedal Neeley

Remote Work Revolution

Written by a professor at Harvard Business School, this Financial Times & McKinsey Business Book Of The Year nominee is a must-read for remote work managers.

Unlike many remote work think pieces, Neeley’s work focuses on data security and technical challenges. Expect step-by-step guides to creating functional teams and plenty of case studies to bring the theory to life. The tone is academic (naturally) but not inaccessible at any stage.

“The HBR Guide to Remote Work” by Harvard Business Review staff

The HBR Guide to Remote Work

It may be a little dry in places, but HBR’s remote work guide is a must-have nonetheless. The reason is that this guide covers a lot of ground concisely but intelligently. Readers learn about setting up home offices, managing teams, ways to run virtual meetings, and choosing remote work technologies. There’s no better nuts and bolts guide to working remotely for bosses and employees alike.

“Virtual Culture: The Way We Work Doesn’t Work Anymore, a Manifesto” by Bryan Miles

Virtual Culture

Based on years of coaching teams, this short but engaging book urges managers to look beyond routines and old-style performance targets.

For Miles, remote working requires a complete change in company attitude. Effective teams are free and autonomous. And managers need to find ways to engage with colleagues without micro-managing their activities. That’s not easy, but “Virtual Culture” offers some handy pointers.

“Deep Work” by Cal Newport

Deep Work

Cal Newport’s modern classic dates back to 2016, but it anticipated the world of remote work in uncanny detail. And Newport’s expert insights are just as relevant as ever.

“Deep Work” argues that elite workers will dedicate their mind power and attention to critical tasks in the future. Trivial meetings won’t steal their time and attention. Instead, they might spend half a day meditating to prepare their minds for a few hours of productive work.

This kind of attitude fits perfectly with remote work. If you have not already done so, be sure to schedule a few hours with Newport soon.

Books for remote employees 

The transition to working from home or any remote location demands a new set of skills and adaptations—from creating an efficient workspace and maintaining ergonomics to mastering virtual communication and ensuring personal well-being. Whether you’re a seasoned remote worker or just starting, understanding the nuances of this evolving work culture is crucial for success. 

We’ve chosen a few books that can guide you to make the shift to remote work manageable and truly rewarding. Here is our list:

  • “The Year Without Pants: WordPress.com and the Future of Work”

  • “Remote, Inc.: How to Thrive at Work . . . Wherever You Are”

  • “Working From Home: Making the New Normal Work for You”

  • “Ready, Set, Remote!: The Fast Guide to Creating a Professional Home Office”

  • “Work from Home Ergonomics 101: Tips to Improve Your Comfort, Productivity, and Safety While Working Remotely”

“The Year Without Pants: WordPress.com and the Future of Work” by Scott Berkun

The Year Without Pants

Back in 2012, ex-Microsoft manager Berkun started working at Automattic (the parent company of hosting giant WordPress). And what he found was a revelation. Automattic pioneered flexible working. The firm has never fixed itself to a central office. Its employees famously barely send emails, let alone attend morning staff meetings.

“The Year Without Pants” is a highly entertaining document from the early years of remote work. It’s an essential read for employees who are toying with home working. But the book is also full of management nuggets (as well as being flat-out entertaining).

“Remote, Inc.: How to Thrive at Work . . . Wherever You Are” by Robert Pozen and Alexandra Samuel

Remote, Inc.

If you are intimidated by asking for more flexible work, this is the book to read. Pozen and Samuel highlight the many benefits of leaving the office behind and explore some common challenges individuals face when they work alone.

Chapters look at managing your time, communicating with managers, and making the most of online meetings. These skills don’t come naturally to everyone. But the techniques and tricks supplied by this book can make the adjustment easier.

“Working From Home: Making the New Normal Work for You” by Karen Mangia

Working From Home

Mangia writes from the standpoint of someone who has tried to work from home but struggled. Most of us can sympathize with her tales about claustrophobic home offices, uncomfortable chairs, and endless distractions. The darker side of remote working can often make life very tricky.

However, Mangia also devises remote work solutions. She discusses striking a healthy work-life balance, staying motivated, and remaining connected with colleagues—everyday tasks that all remote employees face.

“Ready, Set, Remote!: The Fast Guide to Creating a Professional Home Office” by Dave Allen

Ready, Set, Remote

Most remote employees are not interior designers, and not all home spaces transform smoothly into offices. Dave Allen’s practical guide will be gold dust for anyone converting a corner of your home into a productivity center. He keeps things down-to-earth and concise, and his cybersecurity reminders are particularly valuable.

“Work from Home Ergonomics 101: Tips to Improve Your Comfort, Productivity, and Safety While Working Remotely” by Morgan Sutherland

Work from Home Ergonomics 101

Back or joint pain can ruin your remote work experience. Poorly designed workspaces can cause a host of physical problems. Morgan Sutherland’s book explains how to apply ergonomic principles to a remote work environment. He draws on extensive physio experience to clarify posture, seating, screen alignment, and destressing techniques. Everyone should read it before ditching the office.

Beyond books: Smart thinking for securing remote workers

Remote work brings many challenges. Home workers often face issues with communication, team building, work-life balance, and staying motivated.

Cultural and organizational questions are critically important. However, remote workers also need to contend with technical matters like cybersecurity and ensuring confidentiality. Books can assist, but solving those problems requires specialist help.

Employees need additional training about handling data at home and connecting safely to central networks. Companies should also extend security tools to remote workers, supplying authentication systems, VPN clients, and malware prevention tools.

Securing remote workers internally can succeed. However, using security partners with remote work experience is often preferable.

NordLayer’s solutions are a case in point. Companies can create flexible network perimeters. Remote Access VPN and access management tools cover remote devices, ensuring only authorized users can access network resources. Flexible tools allow BYOD for office days, while cloud integrations enable remote workers to access assets they need.

Brush up on your knowledge with 2024’s best remote work books. If you need assistance, feel free to get in touch. NordLayer will help you find the perfect remote work solution.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How to analyze network traffic: a step-by-step guide

Network traffic is the data that passes through on-premises, cloud, and hybrid cloud networks. Traffic consists of larger files divided into data packets. Packet data flows between network nodes before being put back together at destination devices.

Network traffic is crucial because it enables users and applications to communicate. Traffic carries data files and queries, extracting data from cloud resources for employees to use. It connects users with devices like cameras and printers, facilitates video streaming, and links local workstations to internet resources.

Understanding and managing network traffic includes learning how to analyze network traffic effectively. This analysis helps monitor and interpret these data flows to optimize performance, ensure security, and manage resources effectively. One method to model and understand network traffic relates to network topography, which illustrates how data moves through the network.

  • North-south data passes from data centers to connected devices on a hub and spoke model. This data class includes web browser traffic originating outside the network.

  • East-west traffic travels inside a data center, such as communications between on-premises workstations.

Another method models network traffic based on priority.

  • Real-time network traffic includes high-priority packet data requiring instant transmission and high levels of accuracy. For instance, voice-over-IP can’t work well without high fidelity, instant transfers.

  • Non-real-time traffic includes routine email transfers and FTP downloads that are not operationally crucial.

Network traffic types also relate to how we inspect data.

  • Flow data aggregates simple information about network traffic. Examples include packet origins and data quantities.

  • Packet data involves granular analysis of individual packets through techniques like deep packet inspection. This level of analysis assists security investigations and micro-level performance optimization.

Engineers must consider how these network traffic types interact. Monitoring systems must take account of network topography and implement solutions to capture relevant, high-value data about network traffic.

What is network traffic analysis (NTA)?

Network traffic analysis applies continuous monitoring of network traffic. This has two main functions: ensuring network availability and securing network assets.

NTA determines the availability of network assets. Tools detect anomalies and performance issues, alerting IT teams to enable prompt responses. For instance, monitoring may identify and suppress high-volume data transfers or bursts of inbound traffic.

Network monitoring tools also have a critical security role. Tracking tools enforce security policies by detecting and blocking threats. They scan for suspicious activity and flag potential issues before data breaches or system outages result.

Monitoring systems check for vulnerable protocols or encryption ciphers, informing administrators if data becomes insecure. Tools also identify blind spots in network architecture. Technicians can plug gaps in the attack surface created by new devices or user activity.

Good reasons to adopt network traffic analysis

Analyzing network traffic is a wise move for all companies. Modern business depends on constant data flows and reliable network performance. Measuring how data travels empowers IT managers to make improvements and optimize network performance

Understanding and implementing strategies on how to improve network performance can significantly enhance the efficiency and reliability of data flow. It will also ensure that business operations remain smooth and uninterrupted.

6-reasons-to-adopt-network-traffic-analysis

Beyond that general benefit, network traffic analysis has the following advantages:

#1 Better network visibility

Network visibility tools create inventories of devices connected to the network. Companies can add new devices securely and secure network traffic to existing devices.

#2 Compliance

Businesses that monitor network traffic are well-placed to detect threats and safeguard customer data in line with GDPR and HIPAA regulations.

#3 Robust performance

Continuous monitoring identifies technical problems with the availability of applications and data centers. IT teams can troubleshoot issues before downtime occurs.

#4 Capacity planning

Engineers can model future network traffic loads and plan for smooth change management.

#5 Network analysis

Engineers can leverage monitoring logs to analyze performance and find fixes to improve speed or reliability. Monitoring provides network context to investigate security incidents.

#6 Cost reductions

Monitoring network traffic identifies redundant components and suggests efficient ways to route data, cutting networking costs.

Related articles

 

In Depth, Remote Work

Best practices for achieving cybersecurity visibility in hybrid work environments

18 Apr 20246 min read

Cybersecurity visibility

 

In Depth

Data speaks volumes: how analytics improves network visibility

21 Nov 20237 min read

Data speaks volumes web cover 1400x800

 

How to get started with network traffic analysis

The benefits of network traffic analysis are clear. However, analyzing network traffic is harder to grasp. Businesses need monitoring systems that cover relevant data sources. Monitoring must be accurate and deliver usable outputs, but analyzing network traffic must not affect speeds or general performance.

Follow the step-by-step guide below to analyze network traffic in a way that meets those core conditions.

1. Assess your data sources

Before analyzing network traffic, you must understand what data flows through your network. Traffic monitoring can only track visible data flows. A thorough data assessment is essential.

On the device side, data sources include routers, servers, and switches that facilitate data transfers. Firewall appliances and proxy gateways may also be relevant if you use them. User workstations lie inside the scope of network traffic monitoring, as do remote work devices and IoT accessories.

Data sources also include the applications that process or store network data. Include applications stored on-site alongside cloud services that users rely on.

Automation helps you discover connected devices and apps and model device dependencies. Application and network discovery tools scan endpoints, and data flows to assess network topography.

Manually assessing network maps is also possible but time-consuming. Maps also become outdated without regular updates, while automation tools adapt as network traffic changes.

The outcome of this exercise should be a clear map of critical data flows, including a list of device and application dependencies.

2. Decide how to collect network traffic

Now, we need to create systems to extract information from data sources. There are two basic approaches: agent-based collection and agentless collection.

Agent-based systems deploy agents on devices. Agents are tiny apps that continually collect data about performance, availability, traffic volume, and inbound or outbound communications.

Agents are essential to monitor network traffic at the level of network packets. However, they can interfere with network speeds or lead to storage problems.

Agentless collection does not rely on agents to gather information. These solutions generally use protocols like the Simple Network Management Protocol (SNMP) or APIs supplied by data source vendors.

Agentless systems send monitoring queries to apps or devices. Targets respond, supplying data about their availability and security status. Agentless collection is a slightly less detailed way of analyzing network traffic. However, network traffic data is still sufficient for most monitoring purposes.

3. Configure context-based network visibility

Now, set the rules for network traffic analysis. Robust network visibility is not just about collecting masses of network traffic. IT teams must also consider network context to understand the reason for data spikes or speed issues.

Contextual information includes user authentication requests, app usage, or threat intelligence. This information may explain why traffic is spiking on particular devices. The absence of contextual data could indicate an imminent threat.

Combining raw network traffic data with situational knowledge empowers security teams and technicians. The more you know about your network environment, the easier it is to identify problems and avoid security incidents.

Choose a traffic analysis solution that integrates with threat detection and response systems. Even better, opt for a network visibility solution that blends threat detection and performance monitoring.

4. Check network restrictions

Before turning on network traffic monitoring, engineers must check local network restrictions and verify that monitoring will function properly.

For example, encrypted traffic may not be visible to tracking systems without key sharing. Bandwidth restrictions may apply, and some ports may be inaccessible to monitoring protocols. Monitoring cloud data can also be challenging. Providers operate their own data restrictions, potentially compromising network visibility.

Legacy systems often co-exist with cloud implementations. Engineers should ensure traffic monitoring covers all data sources and replace applications or devices you cannot monitor. Firewall appliances and network traffic segmentation can also influence data collection.

Compliance is another consideration. Privacy regulations prohibit the unauthorized collection of private data. Network traffic collection should not extend to user or customer identities without consent.

Finally, network traffic analysis must consider malicious threats. Can monitoring tools identify suspicious traffic and work around obfuscation techniques? If not, alternative solutions may be preferable.

5. Decide how to collect tracking data

Collecting network traffic is useless without a secure and accessible storage solution. This storage facility guards your collection tools and is a reliable destination for harvested traffic.

Separating tracking systems from general network traffic is advisable. Separation protects data from external attacks or outages. The best solution is using a secure cloud-based provider to store tracking data or building separate on-premises hardware.

Virtualized storage solutions suit multi-cloud or single-cloud networks with low on-premises involvement. Hardware is ideal for traditional office networks with few cloud components.

6. Put in place traffic analysis tools

IT teams need the ability to view, analyze, and use network traffic data. Beware: not all monitoring systems include visualization panels and ways to aggregate tracking logs.

Without visualization features, engineers face libraries of text files, and it takes hard labor to extract data from tracking logs. Unless you are comfortable with those processes, choose a tracking partner that makes analysis easy.

Effective solutions allow users to generate reports for audits and investigations. They enable application and user-level traffic analysis. Automating routine security tasks and network traffic map generation are also helpful features.

Don’t forget: Systems for analyzing network traffic also need alert functions to trigger user responses. Choose network traffic analysis solutions with customized alerts and robust measures to detect false positives.

7. Test network traffic analysis before going live

Deploy network traffic analysis gradually. Measured deployment gives you time to check components are functional and deliver the data you need. Rushed implementations waste resources and may lead to inadequate long-term coverage – giving you a false sense of security.

Begin by tracking a small group of data sources. Start with a single data server or cloud-based application. Only expand network traffic analysis when you know that everything works as designed.

How NordLayer can help you achieve network visibility

Network traffic analysis identifies performance and security problems before they impact business operations. In a world of constant data breaches and evolving cybersecurity threats, visibility is everything. Companies that remain in the dark will eventually suffer.

Fortunately, effective network visibility solutions are available for all business contexts. NordLayer’s network visibility tools track relevant traffic and simplify analysis – putting you back in control of network data flows.

Our tools let you dive deep into network activity. Device posture monitoring, server usage analysis, and user activity tracking deliver invaluable insights to guide security teams. Detect suspicious connections, only admit compliant devices, and keep track of network availability.

Network traffic analysis is the key to understanding performance and improving network security

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×