Skip to content

Meet the Team: chat with the Channel Sales Manager

At NordLayer, we embrace seamless online collaboration with team members scattered across the globe. And it’s always a joy to have colleagues from far away places visit our headquarters.

Today, we are fortunate to have Kyle Tatum, the Channel Sales Manager for the US market, as our guest. Kyle serves as the vital link between distributors and the end users of NordLayer. During our conversation, he shared his valuable insights and experiences gained from working with partners and end users.

What was your journey through the channel ecosystem? What life lessons have you learned?

My journey began in distribution at Ingram Micro. Two dedicated years later, I shifted gears, venturing into a vendor role. And after another four years, I proudly joined the NordLayer team.

In Depth
Meet the Team: exploring the globe with NordLayer’s Head of Brand Marketing
25 Oct 2023 / 14 min read

In Depth
Meet the Team: coffee break with the Managing Director at NordLayer
7 Jun 2023 / 3 min read

If I were to pinpoint one invaluable lesson from my time in this industry, it would be this: relationships are paramount. Connections are the compass that guides you, whether with partners, distributors, or even fellow vendors. Navigating this space without the right relationships is simply impossible.

What’s your take while working with MSPs & distributors?

There’s a common thread when we talk about Managed Service Providers (MSPs) and Distributors. They both seek vendors eager to invest in them.

Service Providers pursue a vendor partner willing to invest the necessary time and resources to nurture their growth. They don’t want to be perceived as a “customer” but as a genuine “PARTNER.”

Distributors, on the other hand, deal with a similar challenge, yet in a subtle way. Vendors often come aboard with this notion of instant sales.

However, distributors must rally their sales reps and MSPs around the proposed solution. The only way to do this effectively is if the vendor and distributor work together. Because, at the end of the day, nobody can champion your product as much as you do.

Share your insider knowledge—what are partners’ expectations for a vendor?

Partners seek a product that works and consistently delivers on its promises. It may sound straightforward, but in my experience, the primary reason for partner attrition is an unreliable product that fails to perform consistently.

Also, effective communication is crucial. Partners desire a vendor who can engage with them openly and efficiently. They want a vendor who stands by them with representatives genuinely invested in their success.

How does NordLayer help partners with the end-user challenges?

Delivering personal support hand-in-hand with our MSPs is key. MSPs are determined not to appear unprepared or incompetent during calls with their end customers, as it undermines trust. Having a dedicated NordLayer representative by their side is an undeniable benefit.

In addition, I strongly believe in providing easily accessible resources like knowledge bases and troubleshooting guides. This can significantly take the pressure off our partners.

When end users can find straightforward solutions to minor issues without the need to engage their MSP for support, it’s a win-win. It saves time, reduces headaches, and fosters a smoother partnership.

How do you enable your partners to excel in selling and supporting your products?

I always make myself accessible to them. I’m there if they need me to hop on a call and advocate for the product. And I’ve noticed, over time, as they witness me do it repeatedly, they gradually embrace it themselves. The same philosophy applies to deployments. If a partner needs me, I stand beside them, always ready to assist.

How will tech, especially cloud services, redefine the future of the channel sales? Are there any emerging trends in the channel ecosystem that catch your eye or raise an eyebrow?

In my view, channel sales are already leading the way, especially here in the United States. Virtually every major vendor has had to shift their focus away from direct programs and prioritize the channel.

This shift is primarily driven by the sheer efficiency and the vast number of organizations we can reach through partnerships.

Now, integrated platforms are gaining prominence. In the past, MSPs would assemble their tech “stack” with various solutions they deemed the best.

However, today, as they scale, MSPs are emphasizing workflow and seeking solutions that seamlessly integrate with their existing arsenal. Some vendors are acquiring smaller players to create comprehensive “all-in-one” platforms.

Thank you.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

How to manage passkeys on Android devices

Android users, here’s some great news! With the release of Android 14, Google’s support for third-party passkey storage and management solutions means NordPass can now offer a simplified and secure way to manage passkeys on Android devices.

Looking to make your online experiences smoother and safer? Let’s explore how NordPass can bring ease and added security to your digital life with the straightforward integration of passkeys in our everyday online interactions. If you’re an iOS user, learn more about passkeys on Apple devices here.

Passkeys explained

Think of passkeys as the VIP passes of the digital world — exclusive, secure, and efficient. Much like a VIP pass provides you with smooth and swift access to an event without going through the regular queues, passkeys facilitate seamless and secure entry to apps and websites, bypassing the traditional password process.

Here’s how it works: Passkeys employ a pair of cryptographic keys — a public key stored on the app or website’s server, and a private key on your device. When you attempt to log in, the server sends a request to your device, which responds with the private key. Once the keys are matched, you’re granted access, similar to having your VIP pass checked before entering an event. For a deep-dive on passkeys and all the ins and outs of the technology, check out our post on the topic here.

Passkey enhances user experience by eliminating the need to remember and type out passwords and improves security because the private key is securely stored on the user’s device and is never transmitted, reducing the risk of unauthorized access.

How to enable passkeys on Android devices

Enabling passkeys on your Android device is a simple process, designed to be user-friendly and quick. It’s like setting up a new app — a few taps here and there, and you’re all done. Let’s walk through the steps to unlock this feature and enhance the security and convenience of your online interactions on Android devices.

Android 14 (for authentication in apps):

  1. Download and install NordPass on your Android device.

  2. Go to “Settings.”

  3. Find and open “General management.”

  4. Find and open “Passwords and accounts.”

  5. Find and select “NordPass.”

  6. Under the “Passwords, passkeys, and data services” section, set “NordPass” as the only option.

Android 14 (for authentication in websites) ONLY Chrome:

  1. Open Chrome browser.

  2. Enter “chrome://flags” in the address bar.

  3. Enter “Android Credential Management for passkeys” in the search bar.

  4. Find the “Android Credential Management for passkeys” flag and select “Enabled” next to it.

How to manage passkeys on Android devices using NordPass

Managing passkeys on Android devices with the help of NordPass is easy and intuitive. Just like on iOS, NordPass allows Android users to save, use, and manage their passkeys efficiently, ensuring quick and secure access to various apps and websites. Let’s delve into how you can optimize your online experiences.

Saving a passkey in NordPass:

  • Navigate through websites or apps as usual.

  • Pay attention to sites or apps offering passwordless login options.

  • When presented with an option to use a passkey or integrate one into an account, choose it.

  • A NordPass prompt will appear, guiding you to save the passkey.

  • Follow the provided steps to ensure it’s securely stored.

Logging in with a stored passkey:

  • Access the website or app where you’ve saved the passkey.

  • Select the passwordless login feature.

  • NordPass will prompt you to use the stored passkey.

  • Follow the on-screen instructions to authenticate and access your account seamlessly.

Managing passkeys in NordPass. The basics:

View the passkey creation date: NordPass allows you to see when a particular passkey was created, adding an extra layer of transparency.

Share passkeys safely: Quickly and securely share your passkeys with trusted individuals without compromising security, whether for business or personal use.

Add secure notes: NordPass provides the option to add secure notes alongside your passkeys, useful for adding extra information or reminders related to a particular service or account.

NordPass and passkey management

The rise of passkeys marks a significant development, promising enhanced security and user convenience in online interactions. At NordPass, we’re committed to facilitating this transition, offering users a user-friendly way to integrate passkeys on their Android devices for a more secure and streamlined digital experience.

The adoption of passkeys represents a step forward in technology, offering a preview of a future where online interactions are more intuitive and secure. With NordPass, accessing this future is uncomplicated, allowing users to explore the possibilities of a more secure and efficient online world. The transformation is in progress, with passkeys leading the way to a harmonious blend of security and convenience in our online lives.

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

IPEVO Launches VC-A10: Elevating Virtual Communication

Express Freely with a Compact and Flexible USB Speakerphone.

[Sunnyvale, CA, Oct. 18th, 2023] – IPEVO has launched the VC-A10, a portable USB speakerphone designed to enhance virtual communication in the ever-evolving work landscape. In a world where the COVID-19 pandemic has altered our work habits, making remote and hybrid work the new normal, the VC-A10 is here to make communication easier for users in their daily lives.

The VC-A10 is compatible with the latest devices, including smartphones, tablets, and computers, thanks to its USB Type-C connectivity, making it a versatile tool for any situation. It simplifies video conferencing setup by extending your computer’s audio range, ensuring outstanding audio quality in meetings. Its 360-degree omnidirectional microphone provides complete sound coverage, making it ideal for small huddle rooms, spaces without audio facilities, and work-from-home environments.

Setting up the VC-A10 is effortless with its “plug and play” USB connection. The intelliGo AI chip, powered by machine learning and based on over 5 million data points, reduces background noise and enhances voice clarity. A standout feature is IPEVO’s Dynamic Sound Technology, which optimizes audio quality, resulting in an immersive audio experience. Whether you’re in a meeting, attending an online class, or participating in a webinar, the VC-A10 ensures that you hear and are heard with unmatched clarity.

YOUR VERSATILE COMMUNICATION SOLUTION

The VC-A10, adding yet another choice to your array of communication devices, offers versatility like never before. Enjoy superb sound without the need to huddle around your computer, thanks to its outstanding microphone and speaker coverage. It’s perfect for work-from-home setups, effortlessly muting and eliminating background noise for uninterrupted and clear communication. Additionally, its exceptional audio quality elevates online learning and webinars, enhancing teaching effectiveness and the overall learning experience. Experience clarity and fluidity with the IPEVO VC-A10. Say goodbye to unclear audio, where meetings are as clear as if you were in the same room.

THE KEY FEATURES OF THE IPEVO VC-A10:

  1. Equipped with a 360-degree omnidirectional microphone, providing all-around high-quality audio capture.
  2. Features intelliGo AI voice enhancement, eliminating environmental noise while preserving natural voices.
  3. Utilizes IPEVO Dynamic Sound Technology for dynamic, premium audio quality that immerses listeners in lifelike sound.
  4. Compact and portable, enabling effortless connectivity to on-the-go.
  5. Plug-and-play functionality, requiring no installation or charging.

About IPEVO
IPEVO makes versatile teaching tools instead of specialized “classroom equipment”.
We go beyond the usual conventions of classroom technology—large, expensive, specialized and complex—to rethink simple and flexible solutions for interactive teaching in today’s classrooms.
IPEVO’s interactive teaching tools empower educators and teachers with radically affordable and compact technology that is simple, intuitive and flexible, so that precious time and resources can be wholly dedicated to teaching. We intend to make educational technology accessible and available to all.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Forgot your HBO Max password? Follow our password reset guide

Nothing is more frustrating than forgetting your HBO Max password, especially if you plan to spend the upcoming days binge-watching Game of Thrones or Succession. Don’t worry! Our guide will take you through the HBO Max password reset procedure straight to the land of secure, safely stored, and always-at-hand login credentials.

How to reset your HBO Max password

Note that the first step of resetting your password varies depending on the device you’re using.

Here’s what to do to reset your password:

  1. Open the HBO Max app on your mobile device, tap the Profile icon, and then sign in to your account. If you’re using your computer, go to HBOMax.com and click “Sign in“ the upper right corner.

  2. Choose “Forgot password?“

  3. Enter the email address associated with your account and tap (or click) “Submit.“

  4. Check your inbox. You should get the “Reset Your HBO Max Password” email from HBO Max within a few minutes.

  5. Open the email and choose “Reset password.“

  6. Enter a new password and tap (or click) “Save password.“

Done! Enjoy your show.

How to change your HBO Max password, email address, or user name

You can change your password and other account information like name or email address in the profile settings. To do that, you must use an adult profile.

Here’s how to change your account details:

The first steps of the process depend on the device you’re using.

Phone or tablet: Open the HBO Max app, tap your Profile, and then go to “Settings.“ If you’re not signed in, do it.

Computer: Go to HBOMax.com and sign in to your account. Once you’re in, choose “Profile“ (upper right) and then “Settings.“

Smart TV: Account info can’t be changed on the TV. You’ll have to do it on your mobile device or computer.

  1. Choose “Account.“

  2. Go to the information you want to change and select the “Edit“ icon.

  3. To be sure you’re the genuine owner of the account, HBO Max will send you an email with the verification code.

  4. Open the “Here’s Your One-Time Code” email to find your 6-character code.

  5. Return to HBO Max, enter the verification code, and click (or tap) “Continue.“

  6. Change your account details and choose “Save.“

  7. If you enter a new email, you’ll receive a message with a verification request. Open the email and choose “Verify email.“

  8. The “You’re All Set“ page means your changes have been successfully saved.

HBO Max password requirements and tips for securing your account

People tend to disregard safety measures when it comes to streaming platforms. An unauthorized party accessing your account can do more harm than watch some movies on your behalf. Hacking your HBO Max password gives cybercrooks access to all the details attached to your account and opens the gate to further misuse of your private data.

Follow these tips to keep your account safe:

  • Ensure your HBO Max password is unique to the platform and that you haven’t already used it on different websites and apps.

  • Use at least 10 characters. HBO Max recommends not repeating more than 4 characters in a row, but we encourage you not to repeat characters at all! The longer and more complex your password is, the more secure your account. The easiest way to create genuinely safe passwords is to use a reliable password generator.

  • Change your passwords regularly. Yes, it’s annoying, but it can save you a lot of trouble.

  • If you share account info, do so safely with Password Sharer or an easy-to-use password manager.

  • Routinely review the list of devices using your account and delete the ones you don’t use or own anymore.

  • Make sure your email address is correct. One of the most common issues with resetting HBO Max passwords is caused by mistyped or inactive email addresses.

  • Remember, HBO Max never asks for your account password or payment details. If you receive such an email, it’s a phishing scam.

FAQ

Why is the HBO Max password reset not working?

If your HBO Max password reset attempt is not working, you most likely didn’t receive the password reset email, or the email got lost in the process. Here’s what to do:

  • Check your inbox for emails from HBO Max. It should be titled: “Reset your HBO Max password”. Be sure to search your “spam” and “promotions” folders.

  • Try another email address if you use more than one. Follow the instructions from the beginning of this article to do that.

If I change my HBO Max password, will it log everyone out?

Changing the HBO Max password doesn’t automatically log all users out. However, if other users log themselves out or you force their devices to log out, they will need a new password to re-access the HBO Max account.

Can you put a password on HBO Max profiles?

If you want your adult profile to stay private, you can secure it with a 4-digit Profile PIN. Once you set up the PIN, an icon of a closed lock will appear at the bottom of your profile picture.

Another way of securing the HBO Max profile is setting up parental control over Kids profile. Once turned on, the Kid-Proof Exit feature requires a 4-digit parent code to switch profiles.

How can I reset my HBO Max password if I’ve forgotten my email address?

Resetting your HBO Max account if you’ve forgotten your email address requires contacting the platform’s Help Center. You can do it either via email or, more quickly and conveniently, via chat.

How can I contact HBO Max support for password-related problems?

To contact the HBO Max Help Center, visit the website: help.hbomax.com/se-en/ContactUs. There are two ways of contact available – via email or chat.

Safely store your passwords in NordPass

Can you forget your HBO Max password and never have to reset it again at the same time? Yes! Store it securely in the NordPass password manager, and enjoy accessing your favorite shows effortlessly.

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

NordLayer Partner Program: Sequentur on why simple tools are key to overcoming complex security threats

A discussion with Christopher Capps, Chief Information Security Officer at Sequentur, about the main challenges organizations face with cybersecurity threats, the benefits of the NordLayer Partner Program, and what perspectives are anticipated for different industries.

Highlights

  • About the company. Sequentur is a US-based Managed Service Provider (MSP) that consults and supports clients on IT challenges across diverse industries, including but not limited to financial services, non-profits, law, and manufacturing.

  • Business case. Various clients pose distinct security challenges. Small and medium-sized businesses (SMBs) express particular concerns about network security in public spaces, while larger clients are apprehensive about employees accessing company resources while traveling abroad. The challenges of business network security are a complex subject.

  • NordLayer adoption. NordLayer’s main attraction is its simplicity and adaptability. Its deployment is user-friendly and intuitive, catering effectively to the specific requirements of various organizations, whether they are SMBs or large enterprises. Clients appreciate NordLayer’s ease of use, reducing travel-related issues and increasing efficiency.

  • Benefits of NordLayer Partner Program. The program equips MSPs with a comprehensive set of solutions, educational resources, and expert support. It emphasizes ease of use and broad issue coverage, ensuring both clients and MSPs have a smooth experience.

  • Future projections. Some sectors, like education and healthcare, remain vulnerable due to budgetary constraints. Small and medium-sized businesses (SMBs) are potentially more agile in adopting modern security measures than larger entities.

About the company

Sequentur, a Managed Service Provider (MSP) established in 2007, is based in the United States. Spread across the East Coast and Midwest, the IT support company of 50 employees covers the customer’s technological management needs by consulting them mostly remotely. Just four years ago, Sequentur had only 15 employees. But after getting the SOC2 Type 2 certification, the company grew significantly in the MSP market.

Working with a diverse list of customers, Sequentur focuses on those clients looking to advance their infrastructure and security programs, trying to stay ahead in the modern world of IT. The scope of the covered industries ranges from financial services, non-profits, law, and manufacturing firms.

Christopher Capps, Chief Information Security Officer at Sequentur, explains how understanding common challenges and using NordLayer’s Partner Program helps them address client problems with flexible solutions. 

Business case: managing diverse level issues and sub-challenges of network security

Sequentur is experienced in dealing with a diverse range of challenges that organizations present to them. Whether consulting on compliance matters or overseeing entire IT departments, the company is adept at identifying both prominent and underlying issues that organizations commonly struggle with.

Scheme-of-Sequentur 1400x965First-line challenges

The diversity of Sequentur’s clients leads to a variety of problems that the company must address and resolve. Regarding network security, the main use cases are split between SMBs and large enterprises.

  • SMBs typically search for a solution that ensures users’ safety on unprotected Wi-Fi. In other words, their main concern is to provide network security when, for instance, their salespeople work from a Starbucks or other public spaces.

  • Larger clients are more likely to have employees who frequently travel in and out of the country. These companies need a tool that lets them easily manage groups of people without disrupting daily operations despite changes in location.

“Our biggest use case for NordLayer is jumping geofences. When clients’ teams travel abroad, we ensure they are set up with NordLayer, enabling users to access company resources even while they’re away.”

The key factor for companies of any size facing diverse security challenges is the effectiveness of a tool that is both simple and functional.

For an MSP, finding a solution like NordLayer that could be applied across different business cases for companies of varying sizes is a reassurance of efficiently placed resources and effective problem-solving.

The main requirement for both sides is a straightforward and easily adaptable solution that brings results instantly without demanding expertise or effort to deploy and maintain it. 

Second-line challenges

Sub-challenges of the first-line security issues, or the second-line problems, refer to various soft factors IT managers have to deal with. According to the Chief Information Security Officer at Sequentur, these challenges include: 

  • Users. Despite their experience, everybody using a technology system is vulnerable. Exposure to digital and online assets makes users the biggest security challenge for any organization, as human behavior is hardly manageable.

  • Keeping track of everything. It’s demanding to consistently monitor an organization’s digital inventory, user activity, and security levels. The larger the organization, the bigger the scope that requires extra resources to maintain a high level of effectiveness.

  • Communicating security concerns to C-level executives. Expressing complex cybersecurity topics and risks is challenging and creates a barrier between problem identifiers and decision-makers. Today, IT managers are still in this position where they must explain to their CEOs why multi-factor authentication (MFA) is important instead of working on security solutions.

  • Misinformation. Decision makers want a single solution that covers all pain points, whatever happens. Thus, thinking cyber insurance policy will address all organizational issues and solve potential problems is incorrect. As with most insurance policies, this simply isn’t the case.

Complexity overrides the dialogue between IT managers and executives who are not familiar with specific technology products that are constantly being upgraded with additional uses and improved functionality. 

Christopher’s insights point out that organizations need help from MSP companies to find and implement a tool. They also need support to eliminate gaps in communication and knowledge within the organization. Ultimately, companies need solutions that simplify internal network management processes. 

Advice on tackling multi-level security challenges

Network security can be built from small things and improvements—it’s only essential to start somewhere. Here are the recommendations highlighted by the Chief Information Security Officer at Sequentur every organization should work on:

  • Conducting cybersecurity awareness training for the employees. It will be the biggest line of defense when it comes to users, making them essentially suspicious of all incoming text messages, emails, and app notifications. Training can be outsourced or created internally but must be performed regularly.

  • Consulting with experts. If the IT manager lacks a team member with technical and/or cybersecurity expertise, they should consult a service provider about their security needs and how to facilitate them.

  • Automation. Whether an organization has a team of experts or not, automation is key. There is no way companies can keep up with the volume of attacks without automation, despite their size.

  • Establishing a security baseline using a cybersecurity framework. IT managers have many resources to develop a cybersecurity program, including various platforms, certifications, and tools for self-assessment based on voluntary frameworks.

  • Implementing straightforward solutions. Cybersecurity is complex in its nature, so there’s no need to overcomplicate things. Thus, use tools that are easy to integrate into daily network protection processes and centralize security policies.

Cybersecurity is a team effort, not a solo battle, and clarity is key to its success. Companies can partner with experts who have already curated the most effective tools to solve those challenges.

Navigating the saturated cybersecurity market can be challenging for MSPs. Opting for a tool that covers a wide range of business cases and is user-friendly for both end users and MSPs works miracles. It saves time, resources, and fosters strong partnerships.

Close-up on the solution

From an MSP perspective, the tool deployment and interface must be intuitive to save time and decrease potential complications on both the service provider and client sides.

When deploying NordLayer, onboarding was super simple. It was just a few clicks to get the initial tenant setup. Once we did, we wrote a script to run in our machine management tool to push it out, and it functions, Christopher Capps recalls.

“The NordLayer application, from a user perspective, is simple to the point of being questioned, but that’s a good thing because the user never really wants to have to deal with anything, right? They just want it to work.”

And so even if you go the manual route for the user management and config, the user themselves only have to click a couple of times to get on a VPN or get off of it.

“The biggest comment from the clients on using the tool is about the simplicity. The IT administrators we work with expect an endpoint VPN solution to be difficult, but after rolling out NordLayer, they get pleasantly surprised.”

Based on the Chief Information Security Officer’s experience with NordLayer, the team receives fewer travel-related tickets. They don’t have to adjust access policies and geofences every day, all day. They can provide a solution for their client, train users, tell them what to do, and move on.

Why join the NordLayer Partner Program?

Our Partner Program provides MSPs with an ecosystem of user-friendly solutions, educational materials, and hands-on support from our experts. The main benefit of NordLayer is in our approach to thinking two steps ahead for our clients and partners.

Scheme-of-Sequentur 1400x520

  • It’s a tool that users love. Happy clients who find NordLayer hassle-free result in fewer inquiries for the managed services provider. The solution doesn’t require technical knowledge to operate.

  • Broad issue coverage. NordLayer offers secure network access solutions that address venture network and resource access management issues, handle internet access challenges, and support achieving compliance requirements.

  • Keep it simple. Centralized controls of the Service Management Portal allow partners to deploy the solution easily and intuitively manage their clients in one place. NordLayer’s Control Panel, which is accessed by the client organization’s IT administrators if needed, is also user-friendly and easy to use.

  • Bridging the knowledge gap. A lack of expertise will not hinder efficient network security. Features and capabilities are designed to work seamlessly in the background. If you have questions, we support our users and partners with required how-to materials and expert guidance.

  • Less traditional processes. Implementing modern security, configurations, and processes is easier without the burden of traditional methods and practices.

Interested in collaborating to build a more resilient and aware cybersecurity landscape for businesses and organizations? NordLayer invites Managed Service Providers to seize the opportunity to join our Partner Program.

Thank you, Christopher, for sharing your experience of using NordLayer to help your clients overcome network security challenges. 

Future projections: ups & downs of industry trends

We love thinking about the future and thus didn’t miss the chance to ask our speaker Christopher to shed light on the tendencies of small- and medium-sized businesses and large enterprises.

Quotes-of-Sequentur web 1400x790

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

IPEVO Launches the V4K PRO 120: A Portable USB Document Camera with Tabloid Size Capture Range and Ultra-Wide-Angle Capabilities

Revolutionizing Visual Learning and Beyond with a 120° Wide-Angle Lens.

[Sunnyvale, CA, Oct. 18th, 2023] – IPEVO, a pioneer in education technology and communication solutions, proudly presents the V4K PRO 120, a revolutionary addition to the world of document cameras. Designed for educators, professionals, and creatives, this portable 4K USB Document Camera with tabloid size capture range redefines the boundaries of versatility and convenience. This product reflects IPEVO’s ongoing commitment to catering to the diverse needs of its users.

COMPACT, PORTABLE AND WIDE-ANGLE, READY FOR ANYWHERE!

The V4K PRO 120 is a compact powerhouse, combining the benefits of portability with an impressive wide-angle 120° FOV lens. Its lightweight and sleek design make it an ideal companion for anyone on the move. Whether you’re in a classroom, meeting room, or working remotely, it ensures you’re always prepared for captivating presentations and content creation.

Experience unrivaled visual clarity with the V4K PRO 120. Equipped with a SONY CMOS sensor and 4K resolution, it guarantees breathtaking image quality. Say goodbye to manual adjustments with its swift autofocus, ensuring sharp focus on every detail. Capture it all from versatile angles with the sturdy and adjustable arm. Plus, it functions as an AI-supported wide-angle webcam, perfect for crystal-clear audio and engaging video in virtual collaborations. Illuminate your content precisely with the built-in light source. Even in challenging lighting conditions, your presentations will shine.

The V4K PRO 120 is an indispensable tool for educators, professionals, and anyone seeking to elevate their visual presentations and content creation. We recognized the need for a wider field of view, which is why we created the new IPEVO V4K PRO 120. This allows users to experience a broader field of view and meet a wider range of needs. We are excited to invite users to experience the power of portability and ultra-wide-angle capture like never before with the V4K PRO 120 from IPEVO.

THE KEY FEATURES OF THE IPEVO V4K PRO 120:

  1. Powerful 120° wide-angle lens with tabloid size capture range.
  2. Ultra-portable and compact, its lightweight design at just 581g.
  3. Utilizing SONY CMOS technology and 4K swift autofocus, it delivers exceptional visual quality.
  4. Enhanced with AI noise reduction, elevate your video calls and presentations by effectively eliminating background ambient noises.
  5. With its built-in light, V4K PRO 120 ensures clear captures, even in low-light settings.
  6. Adjust the camera easily for optimal capture; the sturdy stand offers versatile angles and tightens joints with a simple coin turn, making it swift and versatile.
  7. Compatible with Zoom, Google Meet, Skype, Microsoft Teams, and more — on Windows, Mac, and Chromebooks.

About IPEVO
IPEVO makes versatile teaching tools instead of specialized “classroom equipment”.
We go beyond the usual conventions of classroom technology—large, expensive, specialized and complex—to rethink simple and flexible solutions for interactive teaching in today’s classrooms.
IPEVO’s interactive teaching tools empower educators and teachers with radically affordable and compact technology that is simple, intuitive and flexible, so that precious time and resources can be wholly dedicated to teaching. We intend to make educational technology accessible and available to all.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Get to know Account Switching — a handy feature

Switching between different accounts in NordPass could be quick and smooth. And it’s all thanks to Switch Account, a feature that guarantees an effortless experience navigating across different accounts in NordPass.

Switch Account is available on NordPass across all platforms

The Switch Account feature is designed to make the process of navigating across different NordPass accounts convenient and quick. With its help, NordPass users don’t need to log out from one of their accounts just so they can log in to another one. The feature makes the entire process quick and smooth without compromising anything from a security point of view.

Switch Account comes especially in handy in situations when users have multiple NordPass accounts. For instance, if you have both a personal and a business NordPass account, switching between the two will be a breeze.

With the introduction of Switch Account, users will also be able to choose which account’s encrypted vault is where they want to autosave new credentials, credit cards, or personal information.

How does Switch Account work?

Switch Account is available on NordPass across all platforms. It allows users to switch between accounts via the Menu tab and on the Master Password screen. Here’s a quick overview of how you can switch between different NordPass accounts on different platforms smoothly and quickly:

Mobile

  • Open NordPass.

  • In the Menu screen, click the Profile icon.

  • Select Switch Account.

  • Choose your preferred account

If you’re not logged in to any of your accounts on the NordPass app, you can click your email address on the login screen and select the preferred account.

Desktop

  • Open the NordPass app.

  • Click the Profile icon at the top left side of the screen.

  • Select Switch Account.

  • Select the preferred account from the Switch Account section.

Please note that you can add up to five accounts to switch between. It is also important to note that you can remove any of the added accounts at any time in the Switch Account section by clicking the three dots next to the email address. Finally, you can choose to have your accounts locked or unlocked. Locked accounts will require your Master Password to log in when switching between them while unlocked ones will not.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

IPEVO’s TOTEM 360 Wins Best of Show AV Technology Award at INFOCOMM 2023

IPEVO Inc. announced today that its flagship TOTEM 360 has been awarded the prestigious Best of Show, AV Technology Award by AVNetwork at INFOCOMM 2023. This accolade recognizes the exceptional capabilities and innovative design of the TOTEM 360, enabling fully immersive plug-and-play meetings to be held anywhere.

INFOCOMM, the world’s largest professional audiovisual trade show, serves as a platform for industry leaders and innovators to showcase their latest advancements. Judged by a panel of independent judges, the Best of Show AV Technology award honors products that demonstrate exceptional quality, innovation, and the potential to make a significant impact on the market. Amid fierce competition, the TOTEM 360 emerged as the clear winner, impressing judges and attendees with its performance and versatility.

“We are thrilled to receive the Best of Show AV Technology award for the TOTEM 360,” Oscar Tu, Marketing Manager, IPEVO Inc. “This recognition underscores our commitment to pushing boundaries and developing products that redefine the way people interact and communicate. We believe that the TOTEM 360 will revolutionize the AV technology landscape and elevate the audiovisual experience to new heights.”

The TOTEM 360 is a game-changer in the world of audiovisual solutions. Combining a 360-degree camera, powerful speakers, and advanced AI-enhanced microphones, the TOTEM 360 delivers a complete collaboration and communication solution that is easily accessible through its intuitive plug-and-play design. With four unique and immersive video modes, the TOTEM 360 can adapt to and enhance engagement in various settings, including classrooms, conference rooms, and remote learning environments.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About IPEVO
IPEVO makes versatile teaching tools instead of specialized “classroom equipment”.
We go beyond the usual conventions of classroom technology—large, expensive, specialized and complex—to rethink simple and flexible solutions for interactive teaching in today’s classrooms.
IPEVO’s interactive teaching tools empower educators and teachers with radically affordable and compact technology that is simple, intuitive and flexible, so that precious time and resources can be wholly dedicated to teaching. We intend to make educational technology accessible and available to all.

Multi-Factor Authentication: The Ins and Outs

Multi-factor authentication, often referred to simply as MFA, is what we call an additional layer of security that, today, we can enable on most of our online accounts for better security. Unfortunately, MFA is often overlooked. Whether it’s because users don’t know what it is or how it works remains a mystery. Today, we’ll explore MFA. We’ll look into what it is, how it works, and why it is important. Hopefully, by the end of this post, you’ll be rushing to enable MFA on all of your online accounts.

What is MFA?

What does MFA stand for cyber security? Multi-factor authentication, although some security experts refer to it as “multi-step authentication”. Usually MFA is described as an additional layer of security. Technically speaking, MFA is an access management component that requires users to provide two or more factors of authentication to access an account. Essentially, MFA requires users to provide extra proof of identity besides their username and password. Think of MFA as an extra lock on your door.

Unfortunately, misconceptions about MFA exist and often deter users from using it and taking advantage of the security that it provides. The misconceptions seem to be prevalent in the business world. Organizations tend to think that incorporating multi-factor authentication software into their IT infrastructure and rolling out MFA for the entire company is difficult and cumbersome and could be counterproductive.

The reality of the matter is the opposite. With today’s security technologies, enabling MFA for company-wide use can be done quickly and with virtually no interruptions. And once it is done, the benefits that MFA brings to the table far outweigh any possible inconveniences that a company might face during implementation.

How does MFA work?

MFA works by employing a variety of technologies to authenticate the user once they try to access their online account. With MFA enabled, a user first needs to enter their username and passwords, but besides these credentials, the user is also asked to authenticate their identity by some other means. Once the two factors are authenticated, the user is granted access to their account. One of the most popular MFA factors is known as one-time passwords (OTP); these are the 4-8 digit codes that are sent to you via SMS, email, or authentication app.

how does mfa work

Types of MFA factors

A variety of factors could be used by MFA to authenticate the user. Here are some of the most common ones.

What you know (knowledge factor)

The knowledge factor typically consists of a password, PIN, passphrase, or security questions and their answers known only to the rightful account holder. For the knowledge factor to work correctly, the user must enter the correct information requested by the online application.

What you have (possession factor)

Before we had smartphones that we could use for MFA, people carried tokens or smartphones to generate an OTP that would be entered as a factor of authentication. These days, smartphones are the primary physical tools that we use to generate an OTP, usually via authenticator apps. However, physical security keys are also available as a possession factor, which are often considered one of the most secure options when it comes to MFA types.

What you are (inherence factor)

As an additional factor of authentication, users today can use biometric data.

Such data includes the person’s fingerprints, facial features, retina scans, voice recognition, and other biometric information. Biometric authentication is gaining more traction by the day, as authentication is frictionless when compared to other types.

Where you are (location factor)

The last (but not least) of the authentication factors — location-based authentication — usually checks the user’s IP address and their geo-location. Users can whitelist certain geo-locations and block others. If the login attempt comes from an unrecognized location, MFA blocks the access to the account and vice versa.

inner types of mfa

Why is multi-factor authentication important

As cybercrime continues to increase in frequency and sophistication, individuals and companies alike look for effective and simple ways to ensure the security of their online accounts. MFA provides just that.

When bad actors are able to steal passwords and usernames, they can easily gain unauthorized access to accounts and network systems. But with MFA enabled, even hackers with the correct login credentials would need to get through an additional layer of security, whether it’s OTP, biometric authentication, or other means of MFA. All of that complicates things for attackers because for a successful hack they would need to somehow have access to smartphones or other devices related to the user.

Given that up to 80% of data breaches are related to poor password habits in one way or the other, MFA can significantly improve your security. Reports also indicate that the volume of brute force attacks grew by 160% starting in May 2021. But that’s not all. Security experts and researchers continue to see an increase in phishing attacks, which are usually at the top of the hacking funnel. As cybercrime continues to rise in prominence, MFA is quickly becoming a critical part of everyone’s security, whether it’s an individual or a large organization.

Difference between MFA and Two-Factor Authentication

As you can probably guess, the difference between 2FA and MFA — as the names suggest — lies in the number of authentication factors required to authenticate a given user.

Two-Factor Authentication (2FA), unsurprisingly, requires exactly two factors of authentication – no more, no less.

Therefore, following this logic, Multi-Factor Authentication (MFA) requires two or more authentication factors to work as intended.

Basically, this means that every two-factor authentication is an example of multi-factor authentication, but not the other way around.

MFA benefits

The number one thing that MFA brings to the table is enhanced security. MFA works hand in hand with strong passwords to ensure the best possible security. It makes it harder for devious parties to access accounts or system networks without factored authentication. This applies to both individuals and organizations.

However, for businesses, MFA also helps with compliance. Security standards such as the GDPR and HIPAA require the highest level of security to protect sensitive user data and MFA can be that additional layer of security that helps businesses comply with security standards.

Additionally, MFA can boost a company’s reputation among its customers if it offers MFA as an additional layer of security for their accounts. These days, ​​customers trust and appreciate businesses that take precautions to protect them seriously.

Multi-factor authentication examples

As already mentioned, multi-factor authentication is about using two or more authentication factors to identify a given user. Those factors can be passwords, pins, passphrases, tokens, or biometrics (f.ex. fingerprint recognition or face IDs). By creating combinations of the factors above, you can build authentication sequences with different levels of security.

For example, you can make log-in credentials — such as an account number or email address and the password that was set for the account — the first factor (or step) in the multi-factor authentication. By providing these two pieces of information, the user can specify which account they want to access and confirm that they know the password required to log in. That’s a great starting point, but as you know, passwords can be stolen, therefore, you must make sure that the person trying to access the account is its real owner.

So, you can put another line of defense by asking that person to also provide the pin number sent right after they entered the password to the phone number associated with the account. This will be the second factor. If the person provides the pin, this will be an indication that they are in possession of the mobile device with the correct phone number and thus it is very likely that they are the rightful owner of the account.

You can add more factors to be absolutely sure that you do not grant access to the wrong person. For example, you can ask a person to confirm their identity by using biometrics, e.g. scanning their fingerprints with their mobile device. Keep in mind, however, that the introduction of too many authentication factors may negatively affect the user experience, making logging into the application or system too burdensome.

MFA types that NordPass Business supports

NordPass Business is a secure and intuitive password manager purpose-built to facilitate smooth and secure password management in a corporate environment, and it comes equipped with three MFA options: an authenticator app, a security key, and backup codes, which can come in handy when you don’t have access to the authenticator app or a security key. NordPass supports major authenticator apps such as Google Authenticator, Microsoft Authenticator, and Authy.

Besides MFA, NordPass Business is packed with a variety of advanced security and productivity features. Not only does NordPass allow users to create complex and unique passwords on the spot and store them in an encrypted vault, but it also can autofill login credentials and autosave new ones with just a few clicks.

Furthermore, with NordPass Business, organizations can regularly check for weak, old, or reused passwords with Password Health and check if any of company-related domains or emails have been compromised in a data leak with the Data Breach Scanner. A business password manager is quickly becoming a ubiquitous tool for any company wishing to succeed in today’s digital world.

If you are interested in learning more about NordPass Business and how it can fortify corporate security and even bring business closer to cyber insurance eligibility, do not hesitate to book a demo with our representative.

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

IPEVO’s Flagship Video Conferencing Camera TOTEM 360 Released

Get The Ultimate Communication Experience!

Video conferencing equipment gets a makeover! Global leading professional video communication brand IPEVO officially announced today the release of its new flagship product, the IPEVO TOTEM 360 Immersive Conference Camera + Speakerphone. The product integrates multiple video conferencing functions into a single device and delivers an AI-powered high-quality audiovisual experience. The release of this top-rate product brings new momentum to IPEVO’s conferencing series, introducing a whole new level of conferencing experience.

IPEVO, a global leader in professional video conferencing, announced the release of its flagship product TOTEM 360, a video conferencing camera and speakerphone in one device aimed at creating immersive hybrid conferencing experiences by integrating user-friendly design with comprehensive functions.

General manager Aaron Lee of IPEVO, said,

“I’m very happy to share with you the flagship product that we are officially releasing, TOTEM 360. We successfully integrated multiple functions and modes for high-quality video conferencing into one device. It marks an important milestone for us after entering the video conferencing market last year. In the future, through product innovation and more streamlined video communication experiences, IPEVO will continue to eliminate the limitations that come with video conferencing equipment, breaking through communication barriers, and enabling users to make every space a meeting place.”

FLAGSHIP VIDEO CONFERENCING DEVICE RELEASED! WITH PERSON & VOICE AI TRACKING AND A SEAMLESSLY STITCHED 360° IMAGE FROM FOUR CAMERAS – TOTEM 360 DELIVERS AN ALL-ROUND VIDEO CONFERENCING EXPERIENCE IN ONE DEVICE

To provide business professionals with the finest quality of online communications, TOTEM 360 integrates high-quality audio and video technology so that users no longer must worry about ambiguous sound or missing participants who can’t be covered by camera FOV. When a user is speaking, they are automatically identified by the onboard person & voice AI tracking, which processes the input from the TOTEM’s cameras and from its array of four beamforming microphones with AI noise reduction. Its omnidirectional microphones are equipped with echo cancellation and AI noise reduction, greatly enhancing the audio quality. The image from four cameras is seamlessly stitched, providing video in panoramic 5K resolution. With just one device, users will be able to enjoy a top-rate immersive communication experience just like being physically present on the scene.

With the seamlessly stitched image from four cameras and built-in AI tracking, users can easily achieve a seamless audio-visual communication experience.

EVERYTHING YOU NEED IN ONE DEVICE! EASILY SWITCH AMONG FOUR VIDEO MODES. IPEVO’S FLAGSHIP DEVICE WITH THE MOST USER-FRIENDLY FUNCTIONS TO CREATE THE NEW ERA OF VIDEO COMMUNICATIONS

IPEVO’s top-rate flagship video conferencing device TOTEM 360 comes with four different modes for conferencing, presentations, and hybrid learning. Its lightweight and compact design allows users to turn any place into a conferencing space.

If a user is taking part in a small conference with fewer participants, they can select the Presentation mode, bringing full focus to the presenters and the presented materials, creating an experience similar to one-on-one meetings. For medium-sized conferences, the Conferencing mode can be used. It divides the screen into two sections, displaying all the participants in the bottom panoramic image and highlighting up to four active speakers in individual close-ups at the top. The Surround mode is most suited for larger conferences, since it splits the 360° image into two 180° panoramic screens, allowing all the participants to be displayed equally. Aside from business communications, TOTEM 360 may also be applied to various learning scenarios – be it in a classroom, educational training site, or large conference hall. Hybrid Learning mode displays the lecturer and the audience at the same time on separate screens delivering a highly immersive experience to the viewers, breaking the barriers between the online and offline experience. It also automatically follows the lecturer, maintaining what matters in the focus of the shot.

PRACTICAL AND STYLISH AT THE SAME TIME! TOTEM 360’S UNIQUE DESIGN AWARDS PRIZES BOTH DOMESTICALLY AND ABROAD FOR DEMONSTRATING THE SPIRIT OF “AESTHETICS IN TECHNOLOGY”

Aside from comprehensive functions and top-rate specs, with its lightweight body and unique design, TOTEM 360 has received recognition from multiple international prizes including Good Design Award and more recently the Red Dot Design Award. Thanks to its user-centric design, the product introduces a new level of video conferencing experience and puts Taiwan in the global limelight.

TOTEM 360’s unique design has bagged international design awards, including the Red Dot Design Award (dubbed the “Oscars of the design industry”) and the Good Design Award.

PRODUCT SPECS AND FEATURES OF TOTEM 360 IMMERSIVE CONFERENCE CAMERA + SPEAKERPHONE:

  1. Designed in Taiwan.
  2. Up to panoramic 5K resolution.
  3. Seamlessly stitches 360° video from four cameras, free of spatial distortion.
  4. Equipped with AI noise reduction and four beamforming microphones, with an optimal audio capture distance of 16.4 ft / 5 m.
  5. 360° speaker with sound diffusion design.
  6. Lightweight and portable body (1.27 lbs / 575 g).
  7. Plug and play compatible with Zoom, Google Meet, Skype, Microsoft Teams, Barco ClickShare and more on Windows, Mac, and Chromebooks.
IPEVO TOTEM 360 is a unique and powerful camera, microphone, and speaker–all in one device. Simply place TOTEM 360 at the center of a table or room and capture all participants.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About IPEVO
IPEVO makes versatile teaching tools instead of specialized “classroom equipment”.
We go beyond the usual conventions of classroom technology—large, expensive, specialized and complex—to rethink simple and flexible solutions for interactive teaching in today’s classrooms.
IPEVO’s interactive teaching tools empower educators and teachers with radically affordable and compact technology that is simple, intuitive and flexible, so that precious time and resources can be wholly dedicated to teaching. We intend to make educational technology accessible and available to all.