Skip to content

Scale Computing Wins 3 TrustRadius 2025 Top Rated Awards

Looking for the best HCI solution? Customer reviews just earned Scale Computing another Top Rated Award from TrustRadius.

We’re proud to share that Trust Radius has named Scale Computing a 2025 Top Rated Award Winner! Thanks to authentic feedback from verified customers, Scale Computing Platform (SC//Platform) has once again earned recognition in the primary category of Hyperconverged Infrastructure, as well as the secondary categories of Server Virtualization and Edge Computing.

Hyperconverged Infrastructure (HCI) unifies compute, storage, and networking components into a single, software-defined solution for greater simplicity and flexibility, and it’s rapidly replacing traditional virtualization infrastructure for primary data center computingedge computing, and virtual desktop infrastructure (VDI). Making the move to HCI is a significant undertaking, but a worthwhile one for organizations seeking the benefits of simplified management, high availability, built-in data protection, scalability, and cost efficiency.

To successfully transition to HCI, businesses need a trusted partner. We could tell you that Scale Computing is just such a partner to ensure a seamless VM migration, and how SC//Platform’s unique patented architectures and technologies are changing how IT teams think about the flexibility of IT infrastructure. But don’t just take our word for it; if you’re looking for the best HCI vendor, read what real customers have to say:

As the Automation Professional for a large pasta manufacturer, I use the Scale Computing platform to host all of the plant’s automation servers. As a 24/7-363 operation, these systems are critical for our day-to-day operations. We have been using the Scale Computing system for five years and have found it to be reliable, easy to operate, and manageable. In the rare case when I’ve had to call for technical support, the service has been prompt and professional. I would highly recommend Scale Computing and their products!— Matthew West, Automation Professional, Barilla America (Food Production, 1001-5000 employees)

At Scale Computing, our goal is to deliver superior HCI, edge computing, and virtualization solutions. A TrustRadius Top Rated Award win confirms our commitment to solving real customer challenges through innovative, integrated solutions. With a trScore of 8.9 out of 10 and 350+ verified, honest customer reviews, Scale Computing is recognized by our customers as a top player in the industry. Earning high marks in categories traditionally dominated by larger vendors underscores our ability to not only compete with, but often surpass, big-name competitors where it matters most—in customer satisfaction and value.

“Scale Computing Platform earning a TrustRadius Top Rated award is based solely on sentiment within their customer reviews,” said Allyson Havener, Chief Marketing Officer at TrustRadius. “Customers consistently highlighted the platform’s reliability, ease of management, and exceptional support—proving that Scale Computing is redefining what efficient, edge-ready infrastructure can look like.”

Scale Computing Platform earning a TrustRadius Top Rated award is based solely on sentiment within their customer reviews, said Allyson Havener, Chief Marketing Officer at TrustRadius. Customers consistently highlighted the platform’s reliability, ease of management, and exceptional support—proving that Scale Computing is redefining what efficient, edge-ready infrastructure can look like.

Since 2016, the TrustRadius Top Rated Awards have become the B2B’s industry standard for unbiased recognition of excellent technology solutions. Based entirely on customer feedback, they have never been influenced by analyst opinion or status as a TrustRadius customer. You can read a detailed breakdown of the methodology and scoring used by TrustRadius to determine Top Rated winners here.

At Scale Computing, we’re proud to create innovative solutions that inspire high praise in our user community. Thank you for supporting our work, and for sharing your feedback on TrustRadius!

About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Validating Internal Network Policies: Segmentation and Core Services

Defining your internal network policies takes time, coordination, and effort. But once those policies are in place, the critical question still remains: are they actually being followed?

For many IT teams, verifying policy adherence and enforcing internal rules on a daily basis is a persistent challenge. Even small violations, such as unauthorized access, outdated encryption, or misused services, can lead to data exposure or non-compliance with frameworks like NIS2.

This is the first part of a two-part blog focused on the practical side of network security policy enforcement and explains how GREYCORTEX Mendel helps you detect violations of any size quickly and effectively. Part two will cover encryption, application use, and identity-based access control.

🔗 Read Part 2 to continue exploring how Mendel supports effective policy enforcement and risk mitigation.

Network Segmentation & Perimeter Control

Segmentation and perimeter access policies are fundamental to limiting exposure and maintaining control over your critical systems.  Without a clear policy enforcement process, a single compromised device can lead to lateral movement across your network.

🔗 Watch our webinar to see how Mendel helps you detect and investigate lateral movement.

Policy violation: Unallowed east–west traffic between segments

Relevant for NIS2

East–west traffic refers to communication between devices within the internal network, such as between user devices and servers. When segmentation is not properly enforced, attackers can move laterally across segments and compromise your entire company network. Limiting this traffic is essential for helping you prevent access to critical systems.

Validation with Mendel

Mendel’s peer graph, as seen below, offers you a clear view of internal communication. Your analysts can then filter internal traffic and define specific subnets to quickly verify whether unauthorized flows occur between isolated segments.


Policy violation: Unauthorized Internet access from restricted segments

Relevant for NIS2

Devices in restricted segments, such as servers or backup networks, are often not intended to communicate with the public Internet directly. In many environments, internet access must go through a proxy or DMZ, with firewalls blocking all other outbound traffic. If these controls fail, systems may be exposed to malware, data leakage, or command-and-control activity.

Validation with Mendel

Mendel allows the filtering of your outbound traffic from specific hosts, making it easy to identify devices attempting to access the Internet.


If such traffic is detected, your analysts can verify whether it passed through an approved proxy by checking the flow records. They can also confirm whether direct connections (bypassing the proxy) were blocked at the firewall level by checking the TCP flags and destination status.


Mendel lets you set policies to monitor Internet traffic from specific segments or devices. When a violation occurs, it automatically sends an alert.

Policy violation: New & disappeared IPs or MACs in controlled network

Relevant for NIS2

Controlled network segments, such as server or infrastructure zones, are often designed with static IP and MAC configurations. When unrecognized devices appear, it may indicate unauthorized access, policy misconfiguration, or a potential threat. 

Validation with Mendel

Mendel allows you to assign policies to specific subnets or hosts to monitor new or missing IP and MAC addresses.  Policies can also include limits on traffic, packets, peers, ports, duration, and flows.


If a policy is violated, Mendel will trigger an alert immediately. For automated blocking, Mendel can be integrated with third-party systems like a NAC or Cisco ISE.


Policy violation: Improper traffic between management and user networks

Relevant for NIS2

Dedicated management segments are designed to limit who can interact with your infrastructure components like switches, routers, or servers. Unauthorized access from user networks increases the risk of misconfiguration, privilege abuse, or direct exploitation.

Validation with Mendel

Mendel’s peer graph provides you with a clear view of communication between your defined network segments. Your analysts can focus on management subnets to verify whether they are properly isolated from user networks, as required by internal policies.

For example, subnet 10.0.20.0/24 was assigned as a management zone, but Mendel revealed active connections to other internal networks.


After updating firewall rules, Mendel confirms isolation by showing no communication from 10.0.20.0/24.


Network Services Policy Enforcement

Core network services like DNS and DHCP are frequent targets for misuse or misconfiguration. Ensuring that only authorized services are active helps prevent spoofing, data leaks, and disruptions to your network stability.

Policy violation: Usage of unauthorized internal/​public DNS servers

Relevant for NIS2

This policy ensures that only approved DNS servers are used for resolving domain names inside the network. Unapproved or misconfigured servers can bypass security controls, hide malicious activity, or return forged responses.

Validation with Mendel

Internal DNS usage:  Mendel allows you to filter internal DNS servers using the host tag Role/​Server/​DNS. This provides you with a clear inventory of devices offering DNS or DNS-relay services. Your analysts can review this list and drill down into individual IPs to confirm whether each DNS server is expected and approved.

For example, a device at 192.168.178.1 was identified as providing DNS services. No other services were detected, indicating a possible relay or misconfigured gateway.



Public DNS usage: By filtering outbound DNS traffic, Mendel reveals which internal devices are using public DNS servers. This allows your analysts to identify whether DNS queries are leaving the network through unapproved resolvers.

In one case, two hosts were detected using Google DNS services: one being a default gateway, and another (192.168.40.215) a standard internal client. Such cases should be reviewed against DNS usage policies to ensure compliance.



Policy violation: Unauthorized DHCP Servers

Relevant for NIS2

This policy ensures that only approved DHCP servers operate in the network. Unauthorized DHCP servers can assign incorrect configurations, enable man-in-the-middle attacks, or disrupt connectivity.

Validation with Mendel

Mendel automatically detects new DHCP servers in your network and generates an event. In addition, it lists all DHCP servers by filtering hosts with the tag Role/​Server/​DHCP, helping your analysts verify whether each one is authorized or misconfigured. Drilling down on each IP reveals additional services and host behavior for deeper inspection.

For example, device 192.168.2.254 was found running multiple services, including DHCP, NTP, DNS, SSH, TELNET, and Mikrotik Winbox. This suggests it may be a router or a misconfigured network appliance.



From Visibility to Accountability

Enforcing internal rules only matters if those rules are visible and actionable. Without continuous policy monitoring, organizations like yours risk overlooking gaps that can lead to misconfigurations or downtime. Mendel helps you by aligning internal visibility with real-time behavior, enabling your teams to improve incident response, reduce alert fatigue, and maintain control over your environment.

In the next part, we’ll explore how Mendel validates encryption policies, user identity enforcement, and application-level restrictions, which are critical areas for maintaining compliance and reducing operational risk.

Want to evaluate your own network? Request a security audit with Mendel.

 

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

CentOS vs. Red Hat Enterprise Linux (RHEL)

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Shadow AI: The New Frontier in Enterprise Risk

Artificial Intelligence has swiftly become the darling of modern innovation—reshaping industries, redefining productivity, and inspiring entirely new business models. But in the rush to embrace its promise, organizations are confronting an urgent, often overlooked risk: Shadow AI.

In a recent conversation, a senior executive at a major software company unpacked the hidden implications of unchecked AI adoption in the enterprise. From their vantage point—advising Fortune 500 CISOs and CTOs on security strategy—the threat is clear: Shadow AI is the new Shadow IT, and its impact may be even more disruptive.

What Is Shadow AI?

Much like Shadow IT, Shadow AI refers to the unsanctioned use of artificial intelligence tools within an organization. Employees, driven by curiosity or productivity goals, begin experimenting with AI applications—often without the knowledge or oversight of IT or security teams. Whether it’s using generative tools like ChatGPT to draft emails or uploading sensitive data to AI-powered analytics engines, these interactions create significant blind spots.

“It’s not that AI gives people access they didn’t already have,” the executive explained. “It’s that it exposes the access they already had—data they never realized was reachable. That gets risky very quickly.”

Think HR files. Intellectual property. Regulatory data. Financial records. When employees feed these into AI systems with unclear data governance or opaque model architectures, the result can be catastrophic.

AI and Data Governance: Security Gaps You Can’t Ignore

Shadow AI has exposed the cracks in many organizations’ foundations, particularly around identity and access management (IAM) and data security.

“We’re still talking about DLP after 25 years,” the executive said, noting how many organizations implemented only 30–40% of their data loss prevention capabilities and then stalled. Now, with AI reasoning over massive datasets in seconds, that oversight isn’t just inefficient—it’s dangerous.

And it’s not just internal risks. Threat actors are leveraging AI, too. The executive highlighted how attackers now use AI to supercharge phishing, social engineering, and data analysis. “What used to take them weeks or months, now takes minutes. That accelerates the attack lifecycle dramatically.”

AI Governance Risks: Why Security Can’t Be an Afterthought

Despite growing awareness, many organizations are still racing ahead with AI deployments—often without involving security teams early enough. “We threw security by design out the window for AI,” the executive observed. “We’re repeating the same mistakes of the past—tacking security on at the end instead of baking it in from the start.”

From the boardroom to the engineering team, everyone wants AI, but few are asking the hard questions:

  • What data can we feed into these models?
  • Have we anonymized sensitive content?
  • Are these systems hosted, or are they local?
  • What’s our plan for data retention or deletion?

Without clear answers, the enterprise becomes vulnerable—not just to data exposure, but to noncompliance with regulations like GDPR or the EU AI Act.

The Rise of AI Agents… and Shadow Agents

Looking ahead, the risks compound further with the evolution of AI agents—autonomous systems that act on behalf of humans.

We’re already seeing this with virtual assistants and automated bots. But as agents become more capable, they’ll require governance models equivalent to those used for human users: IAM, activity logging, behavioral constraints, and revocation mechanisms.

The risk? Shadow agents—unauthorized or rogue AI processes operating without visibility or control. “It’s not just about bad actors,” the executive warned. “What happens when an agent decides the guardrails are too restrictive and tries to bypass them?”

How CISOs Can Respond to the Rise of Shadow AI

So, how can security leaders respond?

“Back to the basics,” the executive emphasized. The fundamentals haven’t changed:

  • Start with a strong asset inventory: Know your data, devices, and identities.
  • Double down on identity-first security: Every human and non-human identity needs clear, enforceable permissions.
  • Focus on data security posture management: What data do you have, where is it, and who can access it?
  • Maintain zero trust principles, but balance them with zero-friction policies to keep users productive.

Security doesn’t need to be a roadblock. When done right, it’s invisible—built into workflows, enabling safe innovation.

Final Thoughts: From Risk to Resilience

Shadow AI isn’t just a technical problem. It’s a governance problem, a cultural challenge, and a test of how quickly security can adapt to innovation.

CISOs must evolve from being the “department of no” to the department of know, bringing clarity, context, and guardrails to AI adoption. It’s about guiding the business to move fast safely, not halting progress out of fear.

In the words of our guest: “We can absolutely make security fun. The best security is the kind you don’t even see—but it’s there, helping you do your job better.”

In the age of AI, that’s not just a goal. It’s a necessity.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.