{"id":72485,"date":"2023-09-27T17:22:41","date_gmt":"2023-09-27T09:22:41","guid":{"rendered":"https:\/\/version-2.com\/?p=72485"},"modified":"2023-09-19T17:23:23","modified_gmt":"2023-09-19T09:23:23","slug":"optimizing-access-to-third-party-resources-in-cloud-environments","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/09\/optimizing-access-to-third-party-resources-in-cloud-environments\/","title":{"rendered":"Optimizing access to third-party resources in cloud environments"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"72485\" class=\"elementor elementor-72485\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f466523 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f466523\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[],&quot;animation&quot;:&quot;none&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-a2bda0a\" data-id=\"a2bda0a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6IWerCjPuDXqa2To8y7KQh\/e20ff9af8629ba651de4bcf7c43e5c0e\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"473\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In the world of cybersecurity, things move at lightning speed. And so do we at <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/about-us\/\">NordLayer<\/a>. We\u2019re committed to delivering cutting-edge, secure remote network access solutions for our clients. What\u2019s our secret to success? A robust strategy, clear product vision, and insights that help us develop high-quality products.\u00a0<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">At NordLayer, we never lose sight of our goals. We continually track our product\u2019s growth, ensuring we always head in the right direction. We aim to provide a remote network access solution that fulfills our promise to all our customers and fosters sustainable progress.<\/p><p data-testid=\"text\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3BBdElT78oIDgLTaLIyr7Y\/6b518a721c368adc628ff18d3b63edeb\/Donatas_quote_1_1400x635.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"376\" \/><\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3BBdElT78oIDgLTaLIyr7Y\/6b518a721c368adc628ff18d3b63edeb\/Donatas_quote_1_1400x635.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3BBdElT78oIDgLTaLIyr7Y\/6b518a721c368adc628ff18d3b63edeb\/Donatas_quote_1_1400x635.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3BBdElT78oIDgLTaLIyr7Y\/6b518a721c368adc628ff18d3b63edeb\/Donatas_quote_1_1400x635.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3BBdElT78oIDgLTaLIyr7Y\/6b518a721c368adc628ff18d3b63edeb\/Donatas_quote_1_1400x635.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3BBdElT78oIDgLTaLIyr7Y\/6b518a721c368adc628ff18d3b63edeb\/Donatas_quote_1_1400x635.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3BBdElT78oIDgLTaLIyr7Y\/6b518a721c368adc628ff18d3b63edeb\/Donatas_quote_1_1400x635.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3BBdElT78oIDgLTaLIyr7Y\/6b518a721c368adc628ff18d3b63edeb\/Donatas_quote_1_1400x635.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3BBdElT78oIDgLTaLIyr7Y\/6b518a721c368adc628ff18d3b63edeb\/Donatas_quote_1_1400x635.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Donatas quote 1 1400x635\" width=\"0\" height=\"0\" data-nimg=\"future\" \/>When we look back at the milestones we\u2019ve achieved and those on the horizon, we\u2019re confident about our product lifecycle. Even now, we can see that our developments gained rapid momentum, consistently improving and delivering the best experience for all ways of working.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This is our epic journey of shaping the cybersecurity landscape and enhancing business security.<\/p><h2 id=\"our-roadmap-for-a-remote-network-access-solution\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Our roadmap for a remote network access solution<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Our journey started with an ambitious goal: <b>to enable hybrid and remote work in a user-friendly way<\/b>. We believe a connected world where all work models are possible needs protected connections, and that&#8217;s precisely what we&#8217;re crafting.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2q2Y95xaXr4iW9TmjevArW\/96f3e959fa9e06dd25f34d4748510031\/Timeline_1400x880.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"520\" \/><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2q2Y95xaXr4iW9TmjevArW\/96f3e959fa9e06dd25f34d4748510031\/Timeline_1400x880.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2q2Y95xaXr4iW9TmjevArW\/96f3e959fa9e06dd25f34d4748510031\/Timeline_1400x880.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/2q2Y95xaXr4iW9TmjevArW\/96f3e959fa9e06dd25f34d4748510031\/Timeline_1400x880.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/2q2Y95xaXr4iW9TmjevArW\/96f3e959fa9e06dd25f34d4748510031\/Timeline_1400x880.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/2q2Y95xaXr4iW9TmjevArW\/96f3e959fa9e06dd25f34d4748510031\/Timeline_1400x880.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/2q2Y95xaXr4iW9TmjevArW\/96f3e959fa9e06dd25f34d4748510031\/Timeline_1400x880.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/2q2Y95xaXr4iW9TmjevArW\/96f3e959fa9e06dd25f34d4748510031\/Timeline_1400x880.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/2q2Y95xaXr4iW9TmjevArW\/96f3e959fa9e06dd25f34d4748510031\/Timeline_1400x880.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"nordlayer timeline 1400x880\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Every story has its humble beginnings, and so does NordLayer\u2019s product. Let\u2019s now take a look at our product&#8217;s gradual yet significant growth and where our remote network access solution stands now.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Foundation &amp; breakthrough<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Our original name was NordVPN Teams. We began as a B2B version of NordVPN (yes, the very VPN that consumers love worldwide). Naturally, it was referred to as a <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/business-vpn\/\">business VPN<\/a> tool to secure organization connections.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Launched back in 2019, NordLayer started its offering with almost thirty <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/shared-gateway\/\">Shared<\/a> and nearly twenty <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/private-gateway\/\">Private Gateway<\/a> locations around the globe. Running on three VPN protocols, the tool did a decent job protecting companies on the brink of the pandemic.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">It was a time when NordLayer emerged as a virtual private network tool for organizations that needed to protect their teams working remotely and in different settings. Soon, the product capabilities were challenged by the new normal, a.k.a. COVID-19.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Overnight, we faced the task of onboarding hundreds of employees, ensuring secure connections and business continuity. It was a baptism by fire. We embraced and overcame this challenge as a tryout and aspiration to offer protection for businesses around the world.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4tMZjq2hnFjl7fS3NvhJY\/9b15c09c72154989cd82f38217b048f1\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1_1400x700.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"414\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Elimination of a physical office required new solutions here and now. So, connecting different locations with <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/site-to-site-vpn\/\">Site-to-Site<\/a> functionality and Auto-connect feature were NordLayer\u2019s hatching out of the VPN-only product shell. We quickly realized we had outgrown our shoes and needed to enhance our capabilities to offer an even better solution.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In 2020, <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/help.nordlayer.com\/docs\/threatblock\" target=\"_blank\" rel=\"noopener\">ThreatBlock<\/a> took the spotlight as NordLayer\u2019s flagship release. It was initiated by the business need to secure networks from potential risks. What\u2019s unique about ThreatBlock is that it automatically blocks harmful websites, so no malware or other cyber threats can infect your device.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Followed by identity management enhancements of single sign-on (SSO) integration with major service providers in the market <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/why-businesses-need-iam\/\">Azure AD, Okta<\/a>. Also, Google Workspace, the solution soon became available on all major OSs.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The introduction of <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/custom-dns\/\">custom DNS<\/a> functionality marked the time for something big to evolve.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2E8LNLEhFESMHMM6236ixN\/7ec8a994b86c49fd1af3d14dcd1ce929\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_2_1400x700.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"439\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer created a sophisticated offering to start establishing its market position. Based on existing features and our future vision, we quickly noticed how prominent NordLayer is in <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/zero-trust\/what-is-ztna\/\">Zero Trust Network Access (ZTNA)<\/a> and <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/sase\/what-is-sase\/\">Secure Access Service Edge (SASE)<\/a> frameworks. Naturally, that led us to focus our development efforts in that direction.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Strategic navigation<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The year 2021 started with improving what NordLayer offered its customers in the <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/ztna\/\">ZTNA<\/a> department.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Listening to feedback and adjusting to client business needs, we increased the number of Virtual Private Gateway locations.<\/p><\/article><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3hiNWaqrcVsy5PTXgv827\/791886e6f1c20f08aec6b8542e7a97b3\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_3_1400x500.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"296\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">We also introduced one more SSO integration with OneLogin, a popular <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/identity-access-management\/\">user identity access management<\/a> service provider, and added biometric authentication for a full range of trusted user authentication options.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">But these were just stepping stones compared to the launch of the year, a <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/smart-remote-access\/\">Smart Remote Access<\/a> functionality. It was like a network bridge interconnecting devices and creating a virtual LAN, bringing relief to IT administrators and employees and allowing them to work more efficiently wherever they are.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3lasbKbNwPtePsafwEVzSy\/b4e60d5e8bf8451e37bf1e0cd5a92073\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_4_1400x500.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"296\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As we navigated through a saturated cybersecurity industry market in 2022, our focus remains on a user-friendly implementation of complex concepts like network security. We also defined our vision and mission, dedicating ourselves to <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.youtube.com\/watch?v=EPGIHyuAEbY\" target=\"_blank\" rel=\"noopener\">stress-free cybersecurity<\/a> for our customers, no matter their work setup.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Leaning towards <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/security-service-edge\/\">Security Service Edge (SSE)<\/a>, a part of the SASE framework, NordLayer made network security as a service its main strategy. This approach, combined with the ZTNA model, emphasized the performance and convenience of using the tool.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Hence, the NordLynx (WireGuard) protocol was created to drastically increase connection speed compared to other protocols, maintain service quality, and security.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/65hhEJse5GwlPZghSBnr7H\/80f17da25b483c86641172d507951411\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_5_1400x700.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"414\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">VPNs can slow things down, causing delays. But NordLayer aimed to eliminate this interference so customers forget about the solution running in the background on their computers. <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/oxylabs-case-study\/\">And from what we&#8217;ve heard<\/a>, we succeeded in achieving seamless and uninterrupted connections.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">So, have you already noticed that we at NordLayer are always up for a challenge? A <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/4-new-dedicated-server-locations\/\">growing number of Virtual Private Gateways<\/a> in locations like South Africa and Brazil was a project that led to better service coverage.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Moreover, we added user provisioning functionality with Azure AD and Okta for swift organization onboarding and management to improve the service experience for our customers.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Momentum mastery<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The year 2022 also proved to get momentum and turn into a snowballing escalation that only confirmed \u2014 buckle up, there\u2019s no way back.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">With a focus on <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/what-is-network-access-control-and-why-is-it-important\/\">Network Access Control<\/a> and a commitment to meeting compliance requirements, NordLayer introduced Activity monitoring and <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/device-posture-security\/\">Device Posture Monitoring<\/a> for advanced network visibility.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For a more robust and effective Internet Access Security, existing features were accompanied by <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/dns-filtering\/\">DNS filtering by category<\/a> and <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/deep-packet-inspection\/\">Deep Packet Inspection<\/a> (DPI), so the product offers a robust and supportive network management system for our customers.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4s9cLD39u0bI5rAwHzPS7i\/cdb8c14621d7a4d7df113607cb4ac441\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_6_1400x600.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"355\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Automation of processes is the future, and we at NordLayer know it well. That\u2019s why we implemented automated idle session timeouts from the NordLayer application. What&#8217;s more, optional enforcement of <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/multi-factor-authentication-best-practices\/\">multi-factor authentication (MFA)<\/a> and SSO for logging into the Control Panel was added to help ensure advanced security measures for our clients.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In 2023, NordLayer launched a one-of-the-kind <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/nordlayer-browser-extension-release\/\">Browser Extension<\/a> to provide more connectivity opportunities to our customers.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/2lXFrZPnfwwCSOMh8j42UE\/67f6da167996011b44538d3700d4eea9\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_7_1400x500.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"324\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A lightweight NordLayer version lets you multitask and secure connections on a browser level. It expanded how users can connect to NordLayer because, unlike the application, it doesn\u2019t need to be OS-compatible and runs only on a browser.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/always-on-vpn\/\">Always On VPN<\/a> was another big launch for NordLayer. It was dedicated to keeping users connected so organizations could trust that VPN connections stayed active.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/aEttOVs3CVZeY5OtXePNJ\/1b1149daf41228476c513fbeb6849afd\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_8_1400x500.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"318\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">To make rolling out NordLayer easier, we introduced the Team Administrator role. This allows admins to share some of their responsibilities in managing team access rights.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For a wider range of third-party service providers, JumpCloud became one of the five options to choose from SSO providers.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Unveiling the next era of NordLayer developments: Cloud Firewall &amp; Device Posture Security<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For better network access control, NordLayer is preparing to launch an upgraded Device Posture Security functionality. The already available capability to monitor who and when connects to a company gateway got enhanced with non-compliant device account blocking.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Improved functionality will allow IT admins to create rules, such as defining versions of OS and NordLayer, adding a requirement to have a specific file in a device, seeing if the device is rooted, and, in case of deviations from set rules, blocking the device from entering the network.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Finally, 2023 will be marked with a major product release\u2013<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/cloud-firewall\/\">Cloud Firewall (FWaaS)<\/a>. The new soon-to-be-released feature will bring NordLayer closer to becoming a unified SSE platform provider. Undoubtedly, it\u2019s a huge upgrade for more granular access control, which allows to deny or allow access based on User\/Team, destination, protocol, and port delivered straight from the cloud.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer\u2019s Cloud Firewall feature will be a great addition to hybrid infrastructures and a relief for legacy organizations that can finally replace expensive and resource-consuming hardware with security deployment in a few clicks.<\/p><p data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/1g8cvNZuDCtqwtFOQ4ePPq\/c723eac00316ddfab26951cf3519d730\/Andrius_quote_1400x672.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"397\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Simple, intuitive, easy to roll out and use, and efficient, these are the words we often hear from our customers talking about their experience using NordLayer, and it couldn\u2019t make us happier because that\u2019s our goal to strive for.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This encourages the team to work on new and improved product capabilities constantly. We celebrate big launches and get to work even harder to deliver the most stress-free and robust network security solutions.<\/p><h2 id=\"nordlayer-use-cases\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">NordLayer use cases<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Product development is an exciting and rewarding process. But without a clear vision and application, all great work can\u2019t be used to its full potential. Thus, NordLayer formulated the main use cases our clients refer to us for help and support.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Internet access security<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Modern enterprises, navigating the intricate challenges of <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/secure-internet-access\/\">internet access security<\/a>, find themselves at a crossroads\u2014balancing communication demands against rising cyber threats. The transformation in work models\u2014remote, office, and complex hybrid\u2014has introduced unique security challenges.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Threat prevention<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer uses advanced encryption standards to protect data in transit. Whether employees work on-site or remotely, their internet traffic is encrypted, safeguarding company data from threats, potential eavesdroppers, and cyberattacks.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Business VPN<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">With NordLayer, employees can securely connect to public Wi-Fi networks, such as those in cafes or airports, without the risk of data interception. The VPN shields their connection from potential threats commonly associated with public networks.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Cloud VPN<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As businesses increasingly utilize cloud services, NordLayer ensures that access to these resources remains restricted and secure. Whether it&#8217;s cloud storage, SaaS applications, or other cloud-based resources, NordLayer&#8217;s protective layer ensures seamless and straightforward integration that reduces the risk of data breaches.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Network &amp; resources access management<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Companies face the challenge of managing diversified and global teams while embracing a hybrid work model without compromising security. NordLayer, rooted in the Zero Trust model, presents an innovative solution to <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/network-resources-access-management\/\">network and resources access management<\/a>.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Remote access VPN<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">A <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/remote-access-vpn\/\">remote access VPN<\/a> ensures secure connections to company resources, whether in-office or remotely. It encrypts user traffic, safeguarding data from unauthorized interception. With NordLayer, businesses can create dedicated gateways for encrypted access to their network, balancing data availability and security for all workers.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Identity and access management<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/zero-trust-security\/\">NordLayer&#8217;s Zero Trust approach<\/a> ensures that only verified users with the right permissions can access specific network resources. This model operates on a trust-no-one-verify-all principle, incorporating strict security measures like 2FA, MFA, SSO, and biometrics to ensure airtight user validation before granting access.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Secure Remote Access<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Designed for modern, distributed workforces, <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/secure-remote-access\/\">NordLayer&#8217;s Secure Remote Access <\/a>application allows teams to connect to company resources from any location. This feature enhances flexibility and maintains a high level of security, ensuring that remote connections are as secure as on-premise ones.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Network segmentation<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer provides organizations with the ability to segment their network through private gateways. This segmentation permits organizations to allocate specific resource access to certain user groups, ensuring that sensitive sections of the network remain insulated and accessible only to those who require it.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Achieving compliance<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">As regulations intensify and cyber threats amplify, <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/security-compliance\/\">achieving compliance<\/a> has never been more critical. With staggering statistics revealing the vulnerability of many enterprises, investing in robust cybersecurity mechanisms like NordLayer is essential.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Remote access VPN<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer ensures that connections and all data transfers are encrypted, safeguarding sensitive information from unauthorized access. This is especially crucial for organizations subject to regulations like <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/hipaa-compliance-saas\/\">HIPAA<\/a> and GDPR, which emphasize the importance of data confidentiality.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">NAC and monitoring<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer enforces rigorous access controls, such as single sign-on (SSO), biometrics, and two-factor authentication (2FA). Additionally, it offers 24\/7 network activity monitoring, allowing organizations to track secured connections, detect anomalies, and promptly address potential security incidents.<\/p><h4 class=\"Heading_root__vbfeI Heading_heading10__WX42n Heading_primary__3VZgz Heading_normal__hJuNy RichText_h4__aEhVR\" data-testid=\"heading\">Network segmentation<\/h4><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">By implementing <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/network-segmentation\/\">network segmentation<\/a>, NordLayer allows businesses to allocate resource access using private gateways. This heightens overall network security and restricts movement within the network, limiting potential damage from cyber breaches. Such segmentation is essential for compliance with standards that mandate limited and controlled access to specific data sets.<\/p><h2 id=\"how-nordlayer-can-address-your-business-needs\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How NordLayer can address your business needs<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">We cannot emphasize enough how NordLayer outgrew being a simple business VPN and started offering beyond-reaching functionalities. Features we develop unlock a number of different possibilities to secure businesses in many ways:<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Protect traveling employees &amp; secure access through public Wi-Fi.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Prevent access to malicious websites while browsing the internet.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Access geo-specific content needed for quality assurance or remote customer support.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Ensure IP address masking.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Monitor VPN usage in the organization and generate reports.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Ensure that employees are connected to a VPN at all times.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Allowlist specific cloud tools with fixed IP addresses.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Segment network access to hybrid-cloud resources by teams.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Restrict access to content categories or specific apps, ports, and protocols.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Monitor and restrict non-compliant devices in the organization\u2019s network by predefined security rules.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Establish a connection between remote devices and a remote connection to on-site networks.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Provide access to company resources on a browser level only.<\/p><\/li><\/ul><h2 id=\"looking-forward-to-innovation-and-growth\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Looking forward to innovation and growth<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Looking towards the future, our primary objective remains the same: ensuring our customers enjoy uninterrupted growth fortified by robust network security. We recognize the evolving dynamics of modern workplaces and are committed to enabling every way of working.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3MWT739fF8ZTobwvDSH2r4\/decc46ac5fabbc074f31efdf969b71d4\/Donatas_quote_2_1400x635.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"828\" height=\"376\" \/><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3MWT739fF8ZTobwvDSH2r4\/decc46ac5fabbc074f31efdf969b71d4\/Donatas_quote_2_1400x635.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3MWT739fF8ZTobwvDSH2r4\/decc46ac5fabbc074f31efdf969b71d4\/Donatas_quote_2_1400x635.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3MWT739fF8ZTobwvDSH2r4\/decc46ac5fabbc074f31efdf969b71d4\/Donatas_quote_2_1400x635.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3MWT739fF8ZTobwvDSH2r4\/decc46ac5fabbc074f31efdf969b71d4\/Donatas_quote_2_1400x635.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3MWT739fF8ZTobwvDSH2r4\/decc46ac5fabbc074f31efdf969b71d4\/Donatas_quote_2_1400x635.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3MWT739fF8ZTobwvDSH2r4\/decc46ac5fabbc074f31efdf969b71d4\/Donatas_quote_2_1400x635.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3MWT739fF8ZTobwvDSH2r4\/decc46ac5fabbc074f31efdf969b71d4\/Donatas_quote_2_1400x635.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3MWT739fF8ZTobwvDSH2r4\/decc46ac5fabbc074f31efdf969b71d4\/Donatas_quote_2_1400x635.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"Donatas quote 2 1400x635\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">To achieve this, we&#8217;re <b>looking closely into the <\/b><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/sase\/what-is-sse\/\"><b>SSE framework <\/b><\/a><b>by developing and providing<\/b> <b>ZTNA, FWaaS, and <\/b><a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/secure-web-gateway\/\"><b>SWG features<\/b><\/a>. These advanced models allow us to offer a seamless, stress-free security environment, ensuring that our clients can focus on their core operations, confident in the knowledge that their network remains impervious to threats.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Where NordLayer is today, and its direction forward, gives us the confidence to offer our clients a stress-free and user-friendly network access security solution. A product that enables businesses to achieve the best results, improve productivity, and take their technological posture to another level.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">For us, it\u2019s all about fulfilling our goals to deliver an effective, secure, and genuine cybersecurity tool for modern companies. If you want to learn more about security solutions, <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/contact-sales\/\">contact our sales team<\/a>.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21818f9 elementor-widget elementor-widget-video\" data-id=\"21818f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=u-C6riv85nc&amp;embeds_referring_origin=https%3A%2F%2Fnordsecurity.com&amp;source_ve_path=MjM4NTE&amp;feature=emb_title&amp;ab_channel=NordSecurity-creatingasafecyberfuture&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb34594 elementor-widget elementor-widget-text-editor\" data-id=\"eb34594\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"Article_wrapper__YyQ2_\"><p class=\"text-base leading-normal\">In this episode, we dive into:\u00a0<\/p><ul class=\"list-disc ml-24\"><li class=\"ml-20\"><div><p class=\"text-base leading-normal\">ChatGPT\u2019s evil twin WormGPT<\/p><\/div><\/li><li class=\"ml-20\"><div><p class=\"text-base leading-normal\">The Federal Trade Commission (FTC) investigation into OpenAI data leak and ChatGPT\u2019s inaccuracy<\/p><\/div><\/li><li class=\"ml-20\"><div><p class=\"text-base leading-normal\">A new 4-day rule for disclosing cyberattacks set by the US Securities and Exchange Commission (SEC)<\/p><\/div><\/li><\/ul><p><a class=\"inline-block px-24 text-center text-micro leading-normal uppercase outline-none focus:outline-none duration-250 ease-out rounded-small focus:bg-blue-400 text-white rounded-md normal-case font-regular py-10 px-26 bg-black-solid hover:bg-blue-600\" style=\"border-radius: 12px;\" href=\"https:\/\/www.youtube.com\/watch?v=u-C6riv85nc\">Watch Cyberview here\u00a0<\/a><\/p><h2 id=\"ChatGPT's evil twin WormGPT\" class=\"text-h2 leading-none text-left\"><b>ChatGPT&#8217;s evil twin WormGPT<\/b><\/h2><p class=\"text-base leading-normal\">The new tool, WormGPT, is advertised on underground forums as a blackhat alternative to ChatGPT for launching <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/thehackernews.com\/2023\/07\/wormgpt-new-ai-tool-allows.html\" target=\"_blank\" rel=\"noopener noreferrer\">phishing and business email compromise (BEC) attacks<\/a>. Although, ChatGPT\u2019s natural language abilities can already help hackers write convincing emails, resulting in the obvious signs of malicious emails disappearing.<\/p><p class=\"text-base leading-normal\">Tools like ChatGPT and Google\u2019s Bard have some safeguards in place that try to ensure that AI-generated content does not cause harm. However, <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.independent.co.uk\/tech\/chatgpt-dark-web-wormgpt-hack-b2376627.html\" target=\"_blank\" rel=\"noopener noreferrer\">WormGPT is specifically designed to be fully unrestricted and facilitate criminal activities<\/a>, so it raises even more questions about the ethical limits of AI.<\/p><h2 id=\"FTC investigates OpenAI over data leak and ChatGPT\u2019s inaccuracy\" class=\"text-h2 leading-none text-left\"><b>FTC investigates OpenAI over data leak and ChatGPT\u2019s inaccuracy<\/b><\/h2><p class=\"text-base leading-normal\">Has ChatGPT broken consumer protection laws by <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/07\/13\/ftc-openai-chatgpt-sam-altman-lina-khan\/\" target=\"_blank\" rel=\"noopener noreferrer\">risking personal reputations and data<\/a>? The FTC has opened an investigation into OpenAI, requiring details on how OpenAI gathers and protects data and vets information.<\/p><p class=\"text-base leading-normal\">The FTC wants to know how information was used to train its model and how it prevents false claims from being shown to users. Additionally, they are interested in how APIs connect to OpenAI\u2019s systems and how user data is protected, all while the <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"\/blog\/FTC%20issued%20multiple%20warnings\" target=\"_blank\" rel=\"noopener noreferrer\">FTC issued multiple warnings<\/a> that existing consumer protection laws apply to AI.<\/p><h2 id=\"The 4-day deadline for public companies to report breaches\" class=\"text-h2 leading-none text-left\"><b>The 4-day deadline for public companies to report breaches <\/b><\/h2><p class=\"text-base leading-normal\">US companies hit by cyberattacks will face a 4-day deadline for publicly disclosing hacks, under new rules approved by the US Securities and Exchange Commission (SEC). There are mixed feelings about this new requirement. On the one hand, it is praised for <a class=\"cursor-pointer outline-none transition-colors duration-250 ease-out text-blue-500 hover:text-blue-600 focus:text-blue-400\" href=\"https:\/\/news.bloomberglaw.com\/privacy-and-data-security\/companies-have-4-day-deadline-to-report-hacks-in-final-sec-rule\" target=\"_blank\" rel=\"noopener noreferrer\">encouraging transparency<\/a> about cybersecurity breaches, as they are considered as important to investors as any other significant operational disruption.<\/p><p class=\"text-base leading-normal\">On the other hand, the new rule is being labeled as a controversially short deadline that may not allow companies enough time to put an action plan in place or fix vulnerabilities. Although regulations state that if the SEC is informed in writing of a national security or public safety risk, a delay in breach disclosure of up to 60 days is allowed.<\/p><p class=\"text-base leading-normal\"><b>Stay tuned for the next episode of Cyberview.<\/b><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the world of cybersecurity, things move at lightning [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1075,1130,61],"tags":[1132,974,1076],"class_list":["post-72485","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-year2023","category-nordlayer","category-press-release","tag-nordlayer","tag-nord-security","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Optimizing access to third-party resources in cloud environments - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Optimizing access to third-party resources in cloud environments - Version 2\" \/>\n<meta property=\"og:description\" content=\"In the world of cybersecurity, things move at lightning [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-27T09:22:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/6IWerCjPuDXqa2To8y7KQh\/e20ff9af8629ba651de4bcf7c43e5c0e\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/optimizing-access-to-third-party-resources-in-cloud-environments\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Optimizing access to third-party resources in cloud environments\",\"datePublished\":\"2023-09-27T09:22:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/optimizing-access-to-third-party-resources-in-cloud-environments\\\/\"},\"wordCount\":2782,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/6IWerCjPuDXqa2To8y7KQh\\\/e20ff9af8629ba651de4bcf7c43e5c0e\\\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"NordLayer\",\"Nord Security\",\"2023\"],\"articleSection\":[\"Nord Security\",\"2023\",\"NordLayer\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/09\\\/optimizing-access-to-third-party-resources-in-cloud-environments\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/\",\"name\":\"Optimizing access to third-party resources in cloud environments - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/6IWerCjPuDXqa2To8y7KQh\\\/e20ff9af8629ba651de4bcf7c43e5c0e\\\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2023-09-27T09:22:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/6IWerCjPuDXqa2To8y7KQh\\\/e20ff9af8629ba651de4bcf7c43e5c0e\\\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/6IWerCjPuDXqa2To8y7KQh\\\/e20ff9af8629ba651de4bcf7c43e5c0e\\\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/nordlayers-evolution-enhancing-network-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Optimizing access to third-party resources in cloud environments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Optimizing access to third-party resources in cloud environments - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/","og_locale":"zh_HK","og_type":"article","og_title":"Optimizing access to third-party resources in cloud environments - Version 2","og_description":"In the world of cybersecurity, things move at lightning [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/","og_site_name":"Version 2","article_published_time":"2023-09-27T09:22:41+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/6IWerCjPuDXqa2To8y7KQh\/e20ff9af8629ba651de4bcf7c43e5c0e\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"17 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/09\/optimizing-access-to-third-party-resources-in-cloud-environments\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Optimizing access to third-party resources in cloud environments","datePublished":"2023-09-27T09:22:41+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/09\/optimizing-access-to-third-party-resources-in-cloud-environments\/"},"wordCount":2782,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/6IWerCjPuDXqa2To8y7KQh\/e20ff9af8629ba651de4bcf7c43e5c0e\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["NordLayer","Nord Security","2023"],"articleSection":["Nord Security","2023","NordLayer","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/09\/optimizing-access-to-third-party-resources-in-cloud-environments\/","url":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/","name":"Optimizing access to third-party resources in cloud environments - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/6IWerCjPuDXqa2To8y7KQh\/e20ff9af8629ba651de4bcf7c43e5c0e\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2023-09-27T09:22:41+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/6IWerCjPuDXqa2To8y7KQh\/e20ff9af8629ba651de4bcf7c43e5c0e\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/6IWerCjPuDXqa2To8y7KQh\/e20ff9af8629ba651de4bcf7c43e5c0e\/The_Evolution_of_NordLayer_for_Enhanced_Online_Safety_1400x800.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/nordlayers-evolution-enhancing-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Optimizing access to third-party resources in cloud environments"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-iR7","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/72485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=72485"}],"version-history":[{"count":1,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/72485\/revisions"}],"predecessor-version":[{"id":72486,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/72485\/revisions\/72486"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=72485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=72485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=72485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}