Skip to content

[Penta News] Penta Security Revamps Brand Identity to Strengthen Global Market Presence

Penta Security Revamps Brand Identity to Strengthen Global Market Presence

 

Penta Security has undertaken a comprehensive reorganization of its product brand identity (BI) to enhance its competitiveness in the global market.

The company offers a wide range of cybersecurity products and services, including the optimized encryption framework D.AMO, the intelligent WAAP solution WAPPLES, and the cloud security SaaS platform Cloudbric. These products have established Penta Security as a leading player in the Asia-Pacific cybersecurity market across multiple sectors.

 

 

Celebrating its 20th anniversary this year, D.AMO is an optimized encryption framework that provides comprehensive security for all layers of IT systems across diverse environments. It offers integrated data security features such as key management, access control, auditing, and monitoring, ensuring end-to-end data protection.

WAPPLES is an intelligent WAAP (Web Application and API Protection) solution that goes beyond traditional web application firewalls. It provides API security, bot mitigation, and DoS defense capabilities. Powered by its proprietary intelligent detection engine COCEP, WAPPLES achieves a false-positive rate of under 4%, ensuring high precision in detecting web attacks.

Cloudbric is the first SaaS-type security platform in Korea and is a leading brand in the SaaS-type security platform industry. From IoT & End Point security to enterprise web security, we provide services safeguarding all entities requiring an Internet connection. As a SaaS-based solution, Cloudbric provides top-tier security services online without the need for hardware installation, offering unparalleled convenience and scalability.

 

Through this brand identity revamp, Penta Security has unified its product logos and branding, which previously lacked a consistent look due to the staggered release of products since the company’s start in 1997. The new, streamlined designs reflect a modern style, presenting a brand image of “youth and professionalism”. This refreshed identity reflects the company’s core philosophy: all solutions align under a single vision and goal. The unified brand identity is expected to enhance Penta Security’s competitiveness, foster innovation, and support its expansion into global markets.

 

Looking ahead, Penta Security is committed to creating an open world where information can be freely shared and communicated. Stay tuned as Penta Security continues its journey to becoming a global leader in cybersecurity. Thank you for your continued interest and support.

 

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Portnox Awarded 2024 IT Cybersecurity Excellence Award

Portnox Cloud closes 2024 with another award win for innovation in zero trust and access control.

 

Austin, TX – Dec. 19, 2024—Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced that TMC has named Portnox Cloud a recipient of the 2024 IT Cyber Security Excellence Award.

TMC announced the 2024 winners in a press release on its website last week. According to TMC, this award highlights not only the technologies used but also best practices for successfully deploying cybersecurity solutions.

Network access control solutions often face criticism for being difficult to deploy, complex to manage, and expensive to maintain. Portnox Cloud addresses these issues as a cost-effective unified access control (UAC) solution that delivers passwordless authentication, access control, risk mitigation, and compliance enforcement for enterprise networks, applications and infrastructure. Additionally, as a fully cloud-native platform, Portnox Cloud eliminates the need for costly on-site appliances and on-going systems maintenance.

“Receiving the 2024 IT Cybersecurity Excellence Award from TMC is a proud moment for the entire Portnox team,” said Denny LeCompte, CEO of Portnox. “Portnox Cloud exemplifies our commitment to pioneering innovations that address the evolving access control and cybersecurity challenges across today’s dynamic IT environments while ensuring a seamless user experience for our customers.”

“Congratulations to Portnox for being honored with an INTERNET TELEPHONY Cybersecurity Excellence Award for innovation in IP communications,” stated Rich Tehrani, CEO, TMC. “The Portnox Cloud has demonstrated outstanding quality and has delivered exceptional, measurable, tangible results for its users. Not only do I look forward to seeing their future successes, I thank them for protecting their clients from crippling attacks.”

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Year in review: take a look back at 2024 with NordPass

Accolades and recognitions

We’re not ones to rest on our laurels, but there’s no harm in being proud of our wins from time to time. This year, our success was powered by industry recognition and our very own knowledge sharing that spread across the globe. So, let’s start this year in review by taking a minute to recognize what we’ve achieved in 2024.

asset badges

PCMag Editor’s Choice and Globee Awards

This year, we had the honor of being selected as PCMag’s Editors’ Choice and taking the top spot as the Best Premium Password Manager for 2024. NordPass’ ease of use, slick design, and additional cybersecurity features like Password Health and Data Breach Scanner were highlighted as some of the standouts of our product.

We also received two silver awards at the prestigious 20th Annual 2024 Globee Awards for Cybersecurity back in March. NordPass was recognized in the Password Management and Passwordless categories for its innovations in the password security field.

CNBC’s best password manager pick

We’re always happy to be recognized for our efforts to put security first, and we hope to raise the bar even higher next year. This year, CNBC Select created a list of the top 8 password managers on the market, with yours truly coming out on top. NordPass was noted for its strong XChaCha20 encryption, ability to store unlimited passwords and other sensitive data, and its multi-factor authentication support.

top 200 passwords

Top 200 Passwords

Over the years, the NordPass Top 200 Most Common Passwords list has become a tradition. For the sixth year in a row, NordPass has analyzed password usage trends across the globe to determine which login credentials are most commonly used—making them an easy grab for cybercriminals to test.

The top combinations included the likes of “123456” and “secret”. News about these password practices spread far and wide—our study was shared by over 2,000 media outlets across the globe, including The Late Show With Stephen Colbert, The Guardian, and The Wall Street Journal. This time next year, we hope to see this year’s leading password combos far less frequently.

Industry expertise

We’re passionate about knowledge sharing and learning from the very best, whether it concerns compliance policies, technological developments, or future threats. Here are a few of our favorite knowledge-sharing moments from 2024.

The NIS2 Directive—legislation aimed at raising cybersecurity standards across all member states and improving their preparedness to deal with cyber incidents—officially took effect on October 17, 2024. NordPass has put together a practical handbook to help ensure your organization’s policies meet NIS2 compliance requirements with ease.

 

Andew Shikiar and Adrianus Warmenhoven

Another big topic on our minds was passwordless technology. NordPass CEO Jonas Karklys had the opportunity to sit down with Andrew Shikiar, Executive Director and CEO of the FIDO Alliance, to learn more about how passkey adoption has been progressing and how this technology can adhere to global compliance standards.

Finally, if there’s one tech trend we couldn’t escape this year, it’s AI. Whether it’s generated content, chatbots, or even scams, AI seems to be playing a key role in the process. We were lucky enough to ask Adrianus Warmenhoven, NordVPN’s cybersecurity advisor and spokesperson, how AI may help out hackers in the near future during his visit to our offices in Vilnius.

Feature updates

The cybersecurity landscape is far from a smooth ride, and we’re making sure we stay on track by continuously bringing you new and improved features. Here are just a few of the major changes, reintroductions, and debut features from NordPass’ 2024 timeline.

lime limited sharing

All things sharing

Sharing credentials in the workplace is often impossible to avoid. Whether you’re onboarding new team members, saying goodbye to those leaving, or simply need to share access with colleagues before your vacation, your credentials must remain secure. That’s why one of our goals this year was to bring you a safer and more convenient way to share credentials.

Welcome to the new Sharing Hub, a new feature within the Admin Panel that allows Owners to view all shared items within and outside the organization. Sharing Hub lets you see which employees have access to which credentials, who shared what, and which access level is set. You can learn more about Sharing Hub in our dedicated blog post.

Speaking of sharing access, we’ve made some big improvements here as well, allowing you more flexibility and control over what you share and how. We’ve introduced new access permission levels, so you can choose whether you want to let other users autofill, view, share, or edit shared credentials. You can also now restrict access with Time-Limited Sharing. You can toggle this setting to limit access to the shared password or other data from 1 hour to 1 month.

exposed passwords

Find your exposed passwords quickly

We recommend routine password status checks to everyone. The Password Health feature on NordPass has always let you see which of your passwords are weak or reused. This year, we’ve brought another category to the list: Exposed Passwords.

This category shows if any of your passwords have been involved in a data breach. Unlike our Data Breach Scanner, which checks your email address against leaked data on the dark web, Exposed Passwords looks for your passwords specifically. Learn how to use Exposed Passwords in the dedicated FAQ.

autofill autosave

Autofill and autosave improvements

Autofill and autosave are so essential to a password manager that you’d think their potential has been fully explored. But that’s far from the truth—there are still many tweaks and improvements to be explored and implemented. We’ve worked hard this year to deliver an improved autofill and autosave experience for our users.

This year, we focused on refining some of autofill’s core features. To start, NordPass can now recognize the subdomains of web addresses and match them to those linked to your saved credentials. This saves users the hassle of manually looking for the right login details when the password manager couldn’t detect them automatically.

Next, we expanded the website storage capabilities. You can now add an additional website to the credentials in your vault, eliminating the problem of duplicate credentials. We’ve also introduced a new feature that adds more granularity to the autofill and autosave settings. It allows users to decide which specific credential types NordPass’ autofill and autosave should ignore on either all websites or selected ones. Learn how to configure autofill and autosave in our dedicated guide.

Finally, we aimed to make your login experiences quick and seamless by introducing Instant Login. Whenever you visit a website, NordPass will prompt you to use your stored credentials and proceed with the login with just one click.

authenticator autofill

Making MFA convenient with the NordPass Authenticator

You know the drill—if you want your accounts secure, a password alone won’t cut it. We’ve long since crossed the border between multi-factor authentication being a nice-to-have, and a must-have. The problem is that for many users, setting up and using multi-factor authentication is a hassle.

We’re all about keeping it simple, though. That’s why we’ve launched NordPass Authenticator on the browser extension for our Business users, following last year’s mobile launch. Our patented Authenticator allows you to store and generate time-based one-time passwords directly in NordPass, without relying on third-party apps. Don’t worry about your one-time codes being easily perceived—NordPass uses biometric authentication to amp up access security.

Better yet, NordPass autofills these one-time codes for you, saving you time and eliminating the struggle of a code expiring before you submit it. Learn more about NordPass Authenticator in our blog post.

email masking

Build your own secret identity with Email Masking

Has your inbox ever been suddenly swarmed with suspicious offers from unknown senders after signing up for a service or completing a purchase? The culprits are websites that sell your information or are breached, exposing your email address to more unauthorized eyes than you’d like and making it a target for social engineering campaigns.

To tackle this problem, we launched Email Masking—a service that allows you to create a decoy email address and synchronize it with your real one. You can use your email mask to sign up for online shopping, subscribe to newsletters, or, if you need it for work, test rival services without showing your hand. Learn more about Email Masking and how to set it up.

data breach scanner

Data Breach Scanner: better than ever

The year 2024 started with a bang when the largest data breach ever, known as the Mother of All Breaches (MOAB), involving over 12 terabytes of data, was discovered. Its scale had many users wondering: has my data been breached?

Data Breach Scanner gives you the answer in no time—and this year, we made sure it could check your financial details, too. Just add your email addresses and credit card details to the Data Breach Scanner, and it’ll alert you whenever it finds a data match on the dark web. We’ve also improved the overall user experience, ensuring businesses and individuals alike can keep an eye on their data. Read on about the updated Data Breach Scanner in our blog.

vanta integration

APIs and integrations

There’s no all-in-one cybersecurity tool that can fix all your business problems, but an integration or two can always help. That’s why, this year, NordPass added more integrations with data management and ID provisioning services to grant your organization a more well-rounded and convenient security toolkit.

  • Entra ID and Okta user provisioning – organizations can provision employees using Entra ID and Okta access management solutions.

  • Splunk® – NordPass customers who use Splunk® can receive automated activity analysis and generate reports for simpler data visualization.

  • VantaVanta’s API integration with NordPass helps organizations automate compliance workflows by synchronizing active members’ data.

Additionally, NordPass has launched the Activity Logs API. Using the API, organizations’ Admins can extract the full activity log information to monitor employees’ actions and investigate company-wide activities for potential risks. Learn more about the Activity Logs API in our guide.

MSP zone

Let’s take a minute to talk about our managed service providers (MSPs). While their customers get to enjoy all the updates and enhancements we’ve just covered, we dedicated time to making NordPass management simpler for our MSP partners, too.

ConnectWise PSA™ integration and open API

This year, we launched a new integration with ConnectWise PSA™. This integration allows MSPs to optimize workflow and generate usage reports. It provides daily and monthly usage information of all MSP-managed organizations. Read our blog post to learn more about the ConnectWise PSA™ integration.

Organizations that don’t use ConnectWise PSA™ can still access NordPass’ open API to have license usage data sent directly to their systems. Our dedicated guide provides more details about setting up the Provider API.

Automatic billings are finally here

We understand that manual monthly payment management can be a headache for MSPs. To alleviate this pain, we’re happy to finally introduce automatic billings for our direct partners. They can now add their billing details directly in the MSP Admin Panel to set up seamless automatic payments based on the monthly usage data.

Resource hub for MSPs

We hope to make the NordPass onboarding process smoother and more accessible for our MSP partners. For this, we’ve launched a new Resources page on the MSP Admin Panel containing all the key information, useful materials, and support contact details to assist with getting started with NordPass.

New launches

2024 in Nord Security has been the year of launches. By now, you’ve probably heard the likes of Saily and NordStellar. Likewise, things were brewing in the NordPass kitchen, cooking up new everyday essentials to simplify passkey use and track company data breaches. Let’s place the final cherry on our end-of-year cake and see what Authopia and Dark Web Monitor are all about.

authopia

Authopia

Authopia is one of the biggest projects the NordPass team has launched this year. This tool lets you easily add a passkey widget to a login form on any website or service, creating an effortless and accessible passwordless login experience.

Authopia is a simpler way to implement passkeys in organizations, as it has very minimal coding requirements. It’s also completely free, meaning that you can easily adopt it whether you’re a small business, a nonprofit, or a global enterprise. Learn more about Authopia’s vision and mission from Sorin Manole, Head of Product, R&D at NordPass.

dark web monitoring

Dark Web Monitor

With tens of terabytes of stolen data out there on the dark web, protecting businesses is as important as ever. And what better way for organizations to fend off threats in the dark than by shining a light directly on them?

Dark Web Monitor, powered by NordStellar, is a free tool that scans the dark web for your organization’s domains. Simply enter your company email address, and Dark Web Monitor will detect whether it has appeared in a data breach and, if so, which data has been affected and how serious the breach is.

So, what’s next?

As you can see, this year has kept us pretty busy, but we’re not slowing down our pace—on the contrary, we’re only getting started. Although we’re leaving this exciting chapter behind, we’re already eagerly looking forward to what 2025 has to offer.

We’ve got some big news to share with you in the near future—in fact, you might already notice some sneak peeks if you look closely. Make sure to stay tuned and go beyond the limits of password security with NordPass.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

They’re In: The G2 Winter ‘25 Reports

IT organizations and managed service providers (MSPs) today have to navigate a complex landscape of challenges, ranging from the routine to the existential. Heightened security concerns demand stricter control over user access, and the ever-growing number and array of devices adds layers of complexity to an already complex environment.

On top of all of that, organizations of all sizes are expanding their distributed workforces, spanning global time zones and diverse languages, or mandating their workforce return to the office for some or all of the week… or both!

And if that wasn’t hard enough, breaks in service create friction in employees’ experiences. This further complicates how you handle device, identity, and user access management. If you are spread out among too many point solutions, tool sprawl may add extra time, effort, and complexity to your day rather than helping you accomplish your goals. 

So who is leading the charge to ensure your organization is humming along smoothly while it grows and changes? That’s right – getting this right falls to you.

If you’re starting to ask yourself, “how do I even start?,” this is where organizations like G2 become such an important tool.

G2 provides a platform for peers and colleagues to shine a spotlight on the companies that excel in overcoming these hurdles. Their reviews and shared experiences help others in search of a viable solution to their own individual challenges.

The Winter 2025 Grid® Reports by G2
The Winter 2025 Grid® Reports are a comprehensive evaluation of cloud security solutions, based on real-world user feedback and experiences. The reports cover a wide range of security categories, including device management and protection, network security, compliance and governance, and identity and access management.

What I like best about JumpCloud is its seamless integration with a wide range of systems and applications, making user management a breeze for our business. The flexibility and security it offers are truly impressive, and the exceptional support ensures we have peace of mind while using the platform.

Juan D. on G2
With almost 3,000 reviews and ratings, verified G2 users found JumpCloud to be a leader across several categories, including mobile device management (MDM), single sign-on (SSO), user provisioning and governance tools, identity and access management (IAM), privileged access management (PAM), password policy enforcement, cloud directory services, remote support, and unified endpoint management (UEM).

  1. Overall Regional Grid (Americas)
  2. Mid-Market Usability Index (Global)
  3. Enterprise Regional Grid (India)
  4. Mid-Market Results Index (Global)
  5. Small Business Regional Grid (United Kingdom)
  6. Overall Results Index (Global)
  7. Enterprise Regional Grid (Europe)
  8. Overall Momentum (Global)
  9. Overall Regional Grid (Latin America)
  10. Overall Regional Grid (Asia)
  1. Mid-Market Relationship Index (Global) 
  2. Mid-Market Regional Grid (United Kingdom)
  3. Mid-Market Grid (Global)
  4. Mid-Market Regional Grid (EMEA)
  5. Mid-Market Regional Grid (India)
  6. Small Business Usability Index (Global)
  7. Overall Regional Grid (United Kingdom)
  8. Overall Results Index (Global)
  9. Overall Momentum (Global)
  10. Overall Results Index (Global)
  11. Mid-Market Regional Grid (Asia)
  12. Mid-Market Results Index (Global)
  13. Small Business Regional Grid (Americas)
  14. Overall Regional Grid (Middle East & Africa)
  15. Enterprise Regional Grid (Asia)
  16. Overall Regional Grid (EMEA)
  17. Enterprise Grid (Global)
  1. Enterprise Results Index (Global) 
  2. Mid-Market Regional Grid (Asia)
  3. Mid-Market Regional Grid (Canada)
  4. Overall Regional Grid (Europe)
  5. Mid-Market Regional Grid (Canada)
  6. Mid-Market Regional Grid (Asia Pacific)
  7. Mid-Market Regional Grid (Asia)
  8. Enterprise Regional Grid (Asia)
  9. Small Business Regional Grid (EMEA)
  10. Mid-Market Implementation Index (Global)
  11. Overall Grid (Global)
  12. Enterprise Relationship Index (Global)
  13. Enterprise Relationship Index (Global)
  14. Mid-Market Relationship Index (Global)
  1. Overall Grid (Global)
  1. Overall Relationship Index (Global) 
  2. Enterprise Regional Grid (Asia Pacific)
  3. Enterprise Usability Index (Global)
  4. Mid-Market Grid (Global)
  5. Overall Regional Grid (ANZ)
  6. Overall Results Index (Global)
  7. Overall Usability Index (Global)
  8. Mid-Market Usability Index (Global)
  9. Small Business Regional Grid (Americas)
  10. Small Business Grid (Global)
  11. Mid-Market Usability Index (Global)
  12. Overall Grid (Global)
  13. Overall Regional Grid (Canada)
  14. Small Business Relationship Index (Global)
  15. Overall Relationship Index (Global)
  16. Small Business Regional Grid (Asia Pacific)
  17. Mid-Market Relationship Index (Global)
  18. Mid-Market Grid (Global)
  1. Overall Usability Index (Global)
  2. Mid-Market Regional Grid (India)
  1. Small Business Usability Index (Global)
  2. Overall Usability Index (Global)
  3. Small Business Regional Grid (Europe)
  4. Overall Regional Grid (Asia Pacific)
  1. Enterprise Relationship Index (Global)
  1. Overall Regional Grid (Asia) 
  2. Overall Regional Grid (United Kingdom)
  3. Mid-Market Grid (Global)
  4. Overall Relationship Index (Global)
  5. Overall Relationship Index (Global)
  6. Overall Momentum (Global)
  7. Overall Regional Grid (Asia Pacific)
  8. Enterprise Results Index (Global)
What Is G2? 
G2 is a community review site. The site aggregates product and service reports to simplify the evaluation process for business and technical shoppers. The organization compiles reports based on authentic user reviews, product comparisons, and deep-dive research.

G2 releases quarterly Grid Reports and ranks products based on authenticated reviews gathered directly from its community of users, as well as data aggregated from online sources and social networks.

Check out JumpCloud on G2 →

What is JumpCloud?
When in search of new solutions, you want them to help you streamline your efforts. On any given day you have to deploy, manage, secure, and support a wide variety of resources, often located around the globe. Consider the following:

Your environment is full of different device types supporting a variety of operating systems.
They all need differing levels of access to critical systems, applications, and resources.
Most are now more likely to be hosted in the cloud than on your network.
It’s no wonder comprehensive, cloud-based platforms like JumpCloud can provide value in so many distinct areas. JumpCloud focuses on developing an open and flexible directory platform. It serves to consolidate an organization’s tech stack, while also facilitating secure and easy access to the tools and resources employees require. Or it’s exactly the tool you need for the job of the day, able to easily fit into any existing management stack.

“JumpCloud is an all-in-one solution for modern IT infrastructure. JumpCloud has been an indispensable addition to our IT infrastructure, providing a comprehensive and robust solution for identity and access management. As an Information Security Manager at a Cybersecurity SAAS company, I have experienced firsthand the myriad of benefits that JumpCloud brings to the table. We use JumpCloud as an MDM tool and the device management features are top-notch. The ability to enforce security policies, monitor device health, and perform remote actions helps us maintain a secure and compliant IT environment effortlessly.”

Siddhi V. on G2

JumpCloud delivers a unified directory platform that makes it easy to securely manage identities, devices, and access across your organization. JumpCloud serves as an OS agnostic device management for your Windows, Apple, Linux, and Android devices and a comprehensive identity management solution, compatible with both M365 and Google Workspace, JumpCloud ensures users enjoy secure, frictionless access to their resources from any location and on any secure device.

The platform’s openness and flexibility empowers organizations to tailor it to their current environment, fostering confidence in their ability to implement changes freely in the future. By unifying user and device management seamlessly, JumpCloud delivers an end-to-end experience for users and simplifies the management process for IT administrators. Its adaptability makes it a suitable choice for diverse organizations with various setups and requirements.

JumpCloud is IT Simplified. Anyone can start a free trial or sign up for a demo of the JumpCloud Directory Platform to explore the breadth and depth of the platform on their own time.

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scale Computing Named a Leader in Server Virtualization, Recognized With 60 Badges in G2 Winter 2025 Report

INDIANAPOLIS – December 18, 2024 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced it has been awarded an impressive 60 badges in the G2 Winter 2025 Report, including a Leader badge in the Server Virtualization category. The company received a total of 24 badges in the Server Virtualization category and an additional 36 in the Hyperconverged Infrastructure (HCI) category, including accolades for Fastest Implementation, Best Support, and Easiest to Use, among many others.

“We are honored to again be named award-winners by G2—the world’s largest software marketplace—and thrilled to share that the Winter 2025 report has recognized Scale Computing with even more accolades than years past. With Scale Computing Platform (SC//Platform), businesses can effortlessly manage IT infrastructure, optimize costs, and achieve peak application uptime. And we back that technology with outstanding customer support. Recognition on G2 reports directly reflects the voice of real SC//Platform users, and the badges we’ve received validate our commitment to their success. We are grateful for the feedback and reviews that earned us the whopping 60 badges we received this quarter,” said Jeff Ready, CEO and co-founder of Scale Computing.

Scale Computing Platform replaces traditional IT infrastructure, ensuring high availability for running workloads in a single, easy-to-manage solution. With zero-touch provisioning (ZTP) capabilities, managing edge computing infrastructure becomes as simple as managing cloud resources. Administrators can pre-configure clusters prior to nodes arriving onsite, reducing deployment time of edge infrastructure by up to 90%. Migration to Scale Computing is also simple with a number of options available to streamline the transition, including the SC//Migrate Quickstart Service. The company is currently offering two promotions to make the transition from VMware to SC//Platform even easier, including a 25% software and services discount for new customers through its VMware Rip & Replace offer, and a full system exchange trade-up plus no-cost coverage for the remaining VMware term with the Seamless Switch: Trade-Up to Scale Computing promotion.

The Scale [Computing] Platform is easy to use and implement. It has a growing feature set, regular development cycles, stellar support and API integration. I manage our in-house clusters and customer clusters with little effort every day. Infrastructure costs and complexity are greatly reduced with this solution without compromising uptime and failover capability whether using it for an edge deployment or a large server farm.
David C., IT Engineer and Project Manager

The G2 platform includes over 150,000 software products and services, with more than 80 million users relying on its authentic peer reviews to make software decisions. Each quarter, the highest ranked products and services are recognized according to their category, company size, geography, and report type. G2 awards badges to those companies based on customer satisfaction and market reputation. The reports offer valuable, tailored lists for buyers conducting research in their IT purchasing journey.

“We typically see only around 10% of all vendors on G2 appear in our quarterly Market Reports, so it’s a major accomplishment that Scale Computing has been recognized this season,” said Sara Rossio, Chief Product Officer at G2. “We extend our congratulations to Scale Computing for receiving praise through authentic customer reviews, powering its rankings on the world’s largest and most trusted software marketplace.”

Read more about what real users have to say about Scale Computing on G2’s Scale Computing Platform Reviews webpage. The entire list of badges awarded to the company in G2’s Winter 2025 Report is available on Scale Computing’s website.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×