Skip to content

What Are Immutable Backups? Your Guide to a Ransomware-Proof Recovery Strategy

Mastering OpenStack Backup: Storware and Sardina Systems Announce Strategic Partnership

For enterprises and service providers running on **OpenStack**, comprehensive data protection has often been a complex puzzle. Today, that puzzle is solved. **Sardina Systems**, the creator of the FishOS cloud management platform, and **Storware**, a European leader in enterprise data recovery, have announced a technical alliance.

This partnership integrates powerful, **API-driven backup and recovery** capabilities directly into **FishOS OpenStack** environments, empowering organizations to protect their entire cloud infrastructure—from virtual machines to application data—without the complexity of traditional agent-based solutions.

In large-scale, multi-tenant OpenStack deployments, simple snapshots are not enough. Organizations require a full backup solution that preserves the integrity of the entire ecosystem, including configurations, metadata, and user data. This integration delivers a unified platform for complete cloud protection and enables service providers to offer robust **Backup-as-a-Service (BaaS)**.

A Seamless, Agentless Approach to Cloud Protection

This partnership unites two proven platforms to create one powerful solution:

  • FishOS by Sardina Systems: An award-winning, OpenStack-based platform that delivers a scalable, automated, and zero-downtime cloud infrastructure, unifying OpenStack, Kubernetes, and Ceph.
  • Storware Enterprise Backup: A stable and versatile backup and recovery system that supports virtual machines, containers, and a wide range of cloud and storage platforms, making it the ideal complement to OpenStack.

The Storware solution integrates with FishOS via native **OpenStack APIs**, automatically discovering workloads and eliminating the need for cumbersome agents. It supports full, incremental, and differential backups of VMs, volumes, and application data. By leveraging **Ceph**—the most common storage backend for OpenStack—it can send backups to multiple destinations, including NFS, S3-compatible storage, tape, or other clouds for long-term retention.

“In large OpenStack environments with dozens of components and multi-tenant workloads, snapshots alone might not be enough. The technical alliance with Storware expands capabilities for FishOS users, providing greater fault tolerance and enhanced compliance with corporate security and recovery requirements.”

— Kenneth Tan, Executive Director at Sardina Systems

Key Benefits for Your Organization

This fully integrated, production-ready solution delivers immediate value:

  • Unified Protection for Your Entire Cloud: Safeguard all virtual machines, application data, and storage objects across your FishOS environment with a single, consolidated solution.
  • Eliminate Complexity with API-Driven Integration: Seamlessly integrate backup functions into FishOS without the operational overhead of managing agents.
  • Unlock New Revenue with Backup-as-a-Service: Enable service providers to offer high-value, VM-level backup services directly to clients.
  • Achieve Enterprise-Grade Resilience: Combine the stability of FishOS with Storware’s powerful data protection to ensure business continuity.
  • Flexible, Multi-Destination Storage: Meet compliance and long-term retention goals by storing backups on Ceph, NFS, S3, tape, or other cloud environments.
  • Optimized for Demanding Production Environments: Perfectly suited for telecommunications, private clouds, and any production OpenStack deployment requiring multi-tenant workload protection.

“By integrating with FishOS, we’re enabling OpenStack users to benefit from a unified, API-driven backup solution that ensures business continuity and operational efficiency. Together, we empower organizations to protect their workloads with confidence—no matter how complex their cloud environments are.”

— Paweł Mączka, CEO at Storware

Who Benefits from This Alliance?

This strategic partnership is designed for organizations that demand robust and scalable data protection:

  • Service Providers: Deliver BaaS to customers, expand service portfolios, and create a competitive advantage.
  • Enterprises with Private Clouds: Achieve comprehensive data protection without the cost and complexity of separate backup infrastructure.
  • Telecommunications Operators: Protect mission-critical workloads with enterprise-grade backup fully integrated into existing OpenStack deployments.
  • Organizations with Strict Compliance Needs: Meet regulatory and corporate security standards with flexible retention and recovery options.

Simplify Your Cloud Backup Strategy Today

The partnership between Storware and Sardina Systems isn’t just an integration; it’s a commitment to simplifying cloud management and data protection. To learn how this powerful solution can enhance your FishOS environment, contact us today.

 

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Post-Quantum Cryptography (PQC) Explained: Securing Our Digital Future in the Quantum Age

Post-Quantum Cryptography: The Urgent Need to Replace Classical Encryption

The cybersecurity landscape entered a new era in 2024 when the U.S. National Institute of Standards and Technology (NIST) released the world’s first standards for Post-Quantum Cryptography (PQC). The momentum continued in March 2025 as NIST added HQC, a code-based algorithm, to its list of finalists. This transition is not happening in a vacuum; with quantum computers from Google, IBM, and others advancing at a breathtaking pace, the clock is ticking for the classical encryption that underpins our digital world.

Today, nearly every aspect of our digital lives—from online banking and e-commerce to secure government communications—is protected by algorithms like **RSA and ECC**. However, these systems face an existential threat. Experts predict that by the mid-2030s, quantum computers will be powerful enough to break them, rendering decades of security infrastructure obsolete.

An even more immediate danger is the “Harvest Now, Decrypt Later” attack strategy. Adversaries are already capturing and storing encrypted data today, waiting for the day a quantum computer can unlock it. This puts any long-term sensitive information, from state secrets to personal health records, at profound risk.

In response, governments and enterprises worldwide are racing to adopt PQC, making it a cornerstone of any future-proof security strategy.

What is Post-Quantum Cryptography?

Post-Quantum Cryptography (PQC) refers to a new class of cryptographic algorithms that are designed to be secure against attacks from both classical and quantum computers. Crucially, PQC algorithms run on the computers we use today, meaning they can be deployed on existing IT infrastructure without requiring quantum hardware.

The vulnerability of current encryption lies in its mathematical foundations. RSA and ECC rely on problems like integer factorization and discrete logarithms, which are incredibly difficult for classical computers to solve. However, quantum algorithms—most notably **Shor’s algorithm**—can solve these problems with exponential speed. While no quantum computer can break RSA or ECC in a real-world scenario today, the migration to PQC is expected to take over a decade, making immediate action a necessity.

The New Guard: A Look at PQC Algorithms

PQC algorithms are built on mathematical problems believed to be hard for even quantum computers to solve. The NIST standards are based on several key categories:

  1. Lattice-Based Cryptography: This approach has emerged as the front-runner, forming the backbone of the NIST standards, including ML-KEM (Kyber) for key exchange and ML-DSA (Dilithium) and FALCON for digital signatures. These algorithms offer an excellent balance of security, performance, and key size.
  2. Code-Based Cryptography: Based on the difficulty of decoding error-correcting codes, this is one of the oldest and most trusted PQC approaches. The primary algorithms are McEliece and HQC, which was named a NIST finalist in March 2025. While known for its strong security, it often comes with the trade-off of very large public key sizes.
  3. Hash-Based Signatures: These algorithms derive their security from cryptographic hash functions. NIST has standardized SLH-DSA (SPHINCS+) for digital signatures. While it is highly trusted and conservative, its stateless design makes it an excellent choice for applications like firmware signing and digital certificates.
  4. Other Categories: Multivariate and Isogeny-Based Cryptography have also been explored, though challenges like large key sizes and recent vulnerabilities have led to their exclusion from the current standardization process.

The Global Race to Standardize and Deploy

NIST has been the global leader in PQC standardization, but this is a worldwide effort. Europe, through organizations like ETSI, is developing its own policies. China is promoting national PQC standards for its critical infrastructure. South Korea’s National Intelligence Service and KISA have published a PQC transition roadmap and are running pilot programs in the financial, public, and healthcare sectors.

Post-quantum cryptography is no longer a distant, theoretical concept—it is an urgent, practical necessity. The threat of “Harvest Now, Decrypt Later” is active today, and operational quantum computers capable of breaking current encryption are on the horizon.

Given the immense complexity of our global digital infrastructure, a full transition to PQC will take years of careful planning and execution. Organizations cannot afford to wait. Starting the journey now—by inventorying cryptographic systems, developing migration roadmaps, and adopting hybrid encryption models—is essential. Our cybersecurity in the quantum era will be determined by the preparations we make today.

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What the Chip Industry Can Learn from Video Games: 5 Key Lessons

The semiconductor industry is the foundation of modern technology, powering everything from smartphones to AI. But as chip complexity soars and market demands shift faster than ever, the industry’s traditional, rigid development cycles are becoming a bottleneck, slowing down innovation. In sharp contrast, the gaming industry thrives on rapid, iterative development and a deep obsession with the user. For semiconductor executives, the agile principles that drive the gaming world offer a powerful new playbook.

1. Swap Waterfall Rigidity for Agile Iteration

The Challenge: Slow, Inflexible Development Cycles

Semiconductor design often follows a rigid “waterfall” model, planned years in advance, which minimizes costly errors but stifles the ability to adapt to new market opportunities.

The Lesson: Innovate Faster with Iteration and Feedback

Game development is dynamic. Studios release early-access or beta versions, gather massive player feedback, and pivot the project based on that input to constantly refine the user experience.

How to Apply It to Semiconductors:

  • Agile Verification: Test and validate smaller IP blocks incrementally to catch major flaws earlier and create a faster feedback loop.
  • Early Prototyping: Use FPGAs and emulation platforms for early software development, creating a hardware feedback loop long before tapeout—much like a game’s beta test.
  • Spiral Development: Adopt a model where each design iteration builds upon the last, incorporating new requirements and feedback in successive loops.

2. Focus on the Player: Prioritize the End-User Experience

The Challenge: A Disconnect from Real-World Users

Semiconductor companies are engineering-driven, focusing heavily on transistor density and power targets. This focus can create a disconnect from the final consumers and software developers who use the technology.

The Lesson: Obsess Over Your End-Users

Game developers are fanatical about the “player experience.” They conduct countless hours of playtesting to ensure a game not only performs well but also “feels right,” prioritizing user enjoyment over raw benchmarks.

How to Apply It to Semiconductors:

  • Optimize for Reality, Not Just Benchmarks: Design chips for specific, real-world workloads like AI inference or high-fidelity gaming.
  • Partner with Software Developers: Actively engage with developers building on your hardware to reveal which features are most critical and how to optimize silicon for the people who program it.

3. Think Like a Game Engine: Implement Real-Time Optimization

The Challenge: Static, Pre-Defined Performance

A chip’s performance parameters are traditionally locked in during design. This static nature can lead to inefficiency, either consuming too much power for simple tasks or failing to deliver peak performance when needed most.

The Lesson: Adapt in Real-Time

Game engines like Unity and Unreal constantly adapt, dynamically adjusting rendering quality and physics to maintain a smooth frame rate, perfectly balancing visual fidelity with performance.

How to Apply It to Semiconductors:

  • On-Chip AI: Integrate AI directly into the silicon to predict future workloads and preemptively adjust clock speeds, voltage, or processing unit configurations.
  • Adaptive Architectures: Design chips with reconfigurable components that can dynamically reallocate resources between CPU, GPU, and neural units based on an application’s real-time demands.

4. Build a Bigger Playground: Break Down Ecosystem Walls

The Challenge: Fragmented and Proprietary Ecosystems

The semiconductor landscape is filled with fragmented architectures, forcing software developers to waste resources optimizing code for each proprietary platform, which stifles innovation.

The Lesson: Prioritize Cross-Platform Consistency

Game engines allow a developer to build a game once and deploy it on a high-end PC or an old smartphone with a consistent experience, achieved by focusing on APIs that abstract away hardware differences.

How to Apply It to Semiconductors:

  • Standardize Software Interfaces: Work collaboratively to create standardized APIs and hardware abstraction layers (HALs) to make the code “write once, run efficiently everywhere.”
  • Embrace Open Standards: Supporting open standards like **RISC-V** is a powerful way to demolish ecosystem walls and foster broader collaboration and adoption.

5. From Customers to Community: Build a Fanbase

The Challenge: A Siloed, B2B Mindset

Many semiconductor firms operate with a traditional B2B mindset, viewing their customers only as other companies rather than as a community of individual developers and users, missing opportunities for co-innovation.

The Lesson: Harness the Power of Community

Successful game companies treat their community as their greatest asset, actively engaging with players, streamers, and modders to get direct feedback, foster loyalty, and create a powerful, organic marketing engine.

How to Apply It to Semiconductors:

  • Embrace Open-Source: Actively contribute to and support open-source hardware and software projects to build goodwill and gain direct insight into user needs.
  • Gamify Learning: Inspire the next generation of engineers with creative engagement, such as the UC Davis game “Photolithography” that teaches the basics of chip building.

Designing an Adaptive and Collaborative Future

AI and gaming are driving the next wave of semiconductor innovation. The companies that lead this new era will be those that embrace agile methods, user-centric design, and real-time adaptability. This cultural shift requires the right tools to manage complexity.

This is where solutions like Perforce IPLM come in. It provides a unified platform to manage the complexities of modern semiconductor design, from IP lifecycle management to global verification. By breaking down silos and enabling secure collaboration, Perforce IPLM empowers companies to adopt the agile, community-driven principles of the gaming world and accelerate their journey to innovation.

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The 3 Levels of IT Automation: A Roadmap to Secure, Simplify, and Scale Your Business

The IT Automation Roadmap: Scaling Your Team for Business Growth

Business growth is exciting—until it breaks your IT team. As new hires come on board and new markets open up, the manual processes that once worked for a small team quickly become unsustainable. IT teams get buried in repetitive tasks, creating bottlenecks that slow the entire organization down.

This is not a sign of failure; it’s a signal that it’s time to evolve. This article provides a clear roadmap to move beyond reactive, manual IT. We’ll explore the three levels of automation maturity that will help you build a secure, scalable system that enables growth, rather than hindering it.

Level 1: Foundational Automation – Taming the Repetitive Tasks

When a company is small, handling tasks like creating user accounts or configuring laptops one by one is manageable. But when you grow from 20 employees to 200, this manual approach creates chaos.

Foundational automation is the first and most critical step. It targets the high-frequency, low-complexity tasks that consume your team’s time and energy. By automating this routine work, you reduce human error, enforce consistency, and free your team to focus on more strategic initiatives.

By the Numbers: A 2025 forecast predicts that 69% of daily managerial work will be automated, highlighting a massive business trend toward offloading repetitive tasks to technology.

Quick Wins for Foundational Automation:

  • Automate the User Journey: Sync your identity provider with your HR system (HRIS). This ensures new hires have the access they need on day one, and permissions are instantly revoked when they depart—closing a major security gap.
  • Zero-Touch Device Setup: Configure and deploy new devices with the correct settings, software, and security policies without IT ever touching the hardware.
  • Automated Policy Enforcement: Automatically apply and enforce security policies for disk encryption, password complexity, and screen lock timers across your entire fleet to maintain compliance.

Level 2: Connected Processes – Unifying Your Tech Stack

Once individual tasks are automated, the next level of maturity involves connecting processes across different systems. Most organizations suffer from “tech sprawl”—a patchwork of disconnected tools that creates information silos and operational friction.

This forces IT teams to waste time manually reconciling data between systems. In fact, the average organization uses 9.3 different tools for core IT functions, yet only 19% report having a fully unified environment. This level bridges those gaps, creating a single source of truth for users, devices, and access.

Key Initiatives at This Stage:

  • Deep HRIS and IAM Integration: Go beyond basic syncing. Create a direct link where a status change in your HR system (like a promotion or department transfer) automatically triggers the correct permission updates across all connected applications.
  • Consolidate Your Tools: Reverse tech sprawl by consolidating overlapping tools into a unified platform. This reduces complexity, lowers costs, and improves security by centralizing management and visibility.

Level 3: Intelligent Orchestration – From Reactive to Proactive IT

The highest level of automation maturity transforms IT from a reactive support function into a proactive, strategic partner. At this stage, fully coordinated, data-driven workflows are automatically triggered by business events, allowing your IT environment to respond dynamically to changing conditions.

This advanced orchestration anticipates needs and mitigates risks before they impact the business, often powered by modern data pipelines and machine learning.

The Power of Data: As of 2025, over 70% of organizations are using data and machine learning (ML) pipelines to train generative AI models, which is the same technology that powers this level of sophisticated automation.

Key Capabilities of an Orchestrated Environment:

  • Automated Incident Response: A security event, like a suspicious login, automatically triggers a containment workflow—such as isolating a device from the network or locking a user account—in seconds, not hours.
  • Adaptive Access Control: Using a Zero Trust philosophy, access decisions are made dynamically. A user’s permissions can change in real-time based on their location, device security posture, or unusual behavior.
  • Predictive Analytics: Use AI and ML to predict hardware failures before they happen or to identify patterns that indicate an emerging security threat, allowing you to address issues before they cause downtime.

The Path to Sustainable Growth

Growth should be an opportunity, not an operational burden. The journey from automating foundational tasks to building a fully orchestrated environment provides a clear path to an IT program that scales effortlessly with your business. This isn’t about just reacting to problems—it’s about building a foundation ready for the future.

Ready to put these principles into action? Explore how JumpCloud can help you automate workflows, connect your IT stack, and build a foundation that supports growth at every stage.

About JumpCloud
At JumpCloud, our mission is to build a world-class cloud directory. Not just the evolution of Active Directory to the cloud, but a reinvention of how modern IT teams get work done. The JumpCloud Directory Platform is a directory for your users, their IT resources, your fleet of devices, and the secure connections between them with full control, security, and visibility.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Thinfinity Workspace 8.5 Is Here: Unlocking Total Visibility, Smarter Cloud Automation, and Enterprise Flexibility

Thinfinity Workspace 8.5 Release: Unprecedented Visibility and Intelligent Automation

The launch of Thinfinity Workspace 8.5 represents a significant evolution in secure workspace delivery, giving IT teams unprecedented visibility, smarter automation, and greater architectural freedom.

This release introduces a completely redesigned Monitoring Module for unified system visibility, adds MySQL and MariaDB support for database flexibility, and supercharges the Cloud Manager with advanced threshold-based autoscaling. Combined with an enhanced client experience and a new native Linux client, Thinfinity 8.5 is a powerful, cloud-agnostic platform built for the modern enterprise.

Gain Total Visibility with the New Unified Monitoring Dashboard

Thinfinity Workspace 8.5 replaces the old Broker Monitor Tool with a completely reimagined Monitoring Module, providing a single pane of glass for your entire infrastructure. This unified dashboard offers a real-time, holistic view across all core components—Gateways, Brokers, and VDI Agents—transforming how you manage your environment.

Now, administrators can:

  • Monitor resource consumption (CPU, memory, active sessions) for every service from one place.
  • Track performance trends across the entire stack to identify patterns.
  • Visualize operational data through interactive, real-time dashboards.
  • Proactively identify bottlenecks and optimize resource allocation before users are impacted.

This turns your Thinfinity environment into a self-diagnosing infrastructure, enabling proactive maintenance and performance tuning without needing complex third-party tools.

Optimize Cloud Costs with Intelligent, Threshold-Based Autoscaling

The Cloud Manager in version 8.5 gets a major upgrade with fully customizable usage-based scaling thresholds. This gives you fine-grained control over how and when your virtual machines scale to meet real-world demand, optimizing both cost and performance.

You can now define any metric—concurrent users, CPU load, memory usage—as an absolute number or a percentage to trigger scaling events.

Practical Examples:

  • Scale Up Automatically: When a VM reaches 80% capacity (e.g., 8 out of 10 active users), Cloud Manager instantly provisions a new VM to handle the incoming load.
  • Scale Down Intelligently: When usage drops below a defined threshold (e.g., fewer than 2 users or 25% CPU load), the system can automatically shut down or deallocate the VM to save on cloud costs.

This policy-driven automation adapts to user behavior in real time. Combine it with scheduled automations to create a truly efficient environment that runs lean after hours and scales powerfully during peak demand—all without manual scripts or intervention.

Embrace Flexibility with MySQL & MariaDB Support

Thinfinity 8.5 breaks free from database constraints by adding full support for MySQL and MariaDB, alongside Microsoft SQL Server. This gives enterprises greater flexibility in designing high-availability (HA) and multi-cloud deployments.

Now you can:

  • Host your Profiles and Audit Log Databases on managed services like OCI MySQL or any compatible platform.
  • Implement robust redundancy and failover strategies using open-source database clusters.
  • Optimize costs by leveraging powerful open-source databases without sacrificing performance.

Secure Hardware Integration Anywhere: Advanced USB Redirection

For industries reliant on hardware-based security, Thinfinity 8.5 introduces advanced USB redirection. This feature creates a dedicated virtual channel for low-level USB passthrough, ensuring seamless integration for even the most complex peripherals directly within a virtual session.

This enables:

  • Smart cards and digital signature tokens for authentication.
  • FIDO and other hardware security keys for multi-factor authentication.
  • Specialized devices like scanners or encryption modules to function natively.

Best of all, it provides true USB transparency whether users connect through a web browser or the Thinfinity Desktop Client—no plugins or local software required. This empowers secure workflows in finance, healthcare, and government, delivering hardware-level compliance from any device.

A Superior User Experience on Any OS

The client experience in 8.5 is smoother and more responsive than ever. Enhancements include true multimonitor support and dynamic session resizing, making remote desktops feel just like a local machine.

Furthermore, Thinfinity now offers a native Linux Client for Ubuntu and Debian. This allows developers, engineers, and other Linux users to access Windows or Linux virtual desktops from their native OS, ensuring a consistent, secure experience across your entire organization.

Feature Summary

FeatureDescriptionBenefit
Monitoring ModuleUnified visibility across Gateways, Brokers, and Agents.Proactive maintenance and real-time performance insights.
Cloud Manager ThresholdsCustomizable logic for scaling VMs up or down.Optimal resource use and significant cost savings.
MySQL/MariaDB SupportExpanded database compatibility for enterprise needs.Greater flexibility for high-availability and cloud designs.
Advanced USB RedirectionPassthrough for smart cards, FIDO keys, and peripherals.Native hardware integration and security from any client.
Native Linux ClientFull support for Ubuntu and Debian distributions.Universal access and a consistent experience for all users.
Enhanced Desktop ClientSeamless multimonitor and dynamic resizing.A fluid, local-like remote desktop experience.

Experience the Future of Work with Thinfinity 8.5

Thinfinity Workspace 8.5 is more than an update—it’s a leap forward in building an intelligent, adaptable, and secure workspace platform. By delivering deeper insights, smarter automation, and greater flexibility, Thinfinity empowers IT teams to reduce complexity, control costs, and provide a superior user experience.

Ready to see these new features in action? Deploy Thinfinity Workspace 8.5 in your environment or schedule a live demo today.

About Cybele Software Inc.
We help organizations extend the life and value of their software. Whether they are looking to improve and empower remote work or turn their business-critical legacy apps into modern SaaS, our software enables customers to focus on what’s most important: expanding and evolving their business.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.