Skip to content

CyberLink Releases Power2Go 13, Enhancing Its World-renowned All-in-one Burning, Authoring and Backup Solution

The most-trusted burning and backup software returns with new features including disc authoring tools to create home movie discs, premium templates and free music.

Taipei, TaiwanJune 11, 2019 CyberLink Corp. (5203.TW), today launched the latest all-in-one disc burning, authoring and backup solution – Power2Go 13. The globally renowned burning and backup software returns with a host of innovative new features and free premium content for comprehensive disc authoring. The new version includes simplified menu design tools, free background music and a collection of premium templates for video enthusiasts to create and author professional movie discs from their home video or photo collection.

Over the years, Power2Go has become the most trusted and dependable solution for Optical Disc Drive (ODD) vendors around the world with its burning, backup and conversion technology. Power2Go 13 continues this trend, introducing innovative tools to make movie disc authoring available to all aspiring home-video creators and amateur filmmakers. Research from Vox shows that DVDs and Blu-ray discs still deliver unparalleled picture quality, making them perfect media supports for home movies, and enabling video enthusiasts to include a wide range of extra content and special features.

With the addition of free background music, premium menu templates and menu-creation tools, users can burn and author discs in a wide range of formats, using premium add-ons to finish off their productions. Users can also pin YouTube and Vimeo in 4K and HDR quality, for watching offline on PC & mobile devices.

“We are excited to give users an all-in-one solution for creating impressive movie discs, complete with new menu design features and a host of free premium add-on tools,” said Dr. Jau Huang, CEO of CyberLink. “While PowerDirector has captured the hearts of video enthusiasts with its professional multimedia editing tools, Power2Go is the friendly companion that lets users create and author pro-looking movie discs easily.”
                       
Key Features Include:

Movie Disc Authoring
Create DVD & Blu-ray discs with engaging, tailor-made menus, complete with background audio, photo gallery, intuitive chapter titles and a host of customizable preferences for the perfect menu layout. Users can also access an assortment of premium menu templates and free background music for complete customization.

Convert & Transfer
Intelligent Smart Detect selects the optimal output settings for transferring media files to your mobile device, saves storage space when transferring files to your mobile, and even converts GoPro or iPhone video to watch on other devices with H.265 encoding and decoding.

Download & Backup
Backup data files, and protect your Windows system quickly and easily with a bootable CD, DVD, Blu-ray recovery disc or a single USB drive. Users can also keep data secure with 256-bit, military-grade encrypted CDs, DVDs, and Blu-ray Discs.

Disc Burning
The drag ‘n’ drop Desktop Widget allows users to burn CDs, DVDs, Blu-rays and AVCHD movie discs almost instantly. Meanwhile, Smart Fit ensures your media fits onto one disc in the highest possible quality. A simple interface designed for speed and ease-of-use means you can digitize your CD collection or mount and view ISO files.

 

Power2Go Availability Power2Go 13 is available today from the CyberLink Online Store in English, Japanese, French, German, Italian, Spanish, Chinese (Simplified and Traditional) and Korean.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

THE FIREWALL ISN’T A FIX-ALL

Understanding the limitations of perimeter security

June 10, 2019

Firewalls.

Everybody in IT knows what they are and nearly every company has them, some even without knowing it. They prevent unwanted communication. In most cases, it’s the first line of defense against network threats. They are effective, and are part of the list of basic requirements for any network security infrastructure.

But are firewalls enough? How about “Next Generation Firewalls”? To answer that, it is helpful to have at least a basic understanding of how firewalls work. Firewalls work like a ticket agent at the airport – you have a ticket? Great, you’re on the flight. No ticket? Go away. In technical terms, firewalls are based on rules that describe the network communication, which can, for example, allow or deny communication only from specific subnets, IP addresses, on particular ports, or no communication at all.

Firewalls haven’t stayed static, and they have become more advanced; like Next Generation Firewalls or Web Application Firewalls. Next Generation Firewalls are like a gatekeeper on steroids – not only will they not let you in if you don’t have a ticket, but will kick you out if you misbehave during the communication for which you had access. Essentially like a bouncer at a bar on New Year’s – you can come in if you have a ticket, but if you start being “fresh” with your fellow party-goers, you get tossed out. Beside basic firewall features, Next Generation Firewalls also contain Application Firewalls, which controls specific services or applications (not just IPs and ports) and Intrusion Prevention Systems, which block unwanted or malicious communication and are also referred to as IPS.

That’s a lot of walls.

Now, let’s look at whether they are as effective as they are expected to be.

Physical access

Picture a situation where an attacker tries to get into your network the easy way – through physical means. Firewalls are configured to ignore any communication that originates in the external network and is aimed at the core switch. The physical attack can include interaction with employees (more on that in our previous blog post), dumpster diving, physical access to areas, even the restricted ones, and more. In most cases, it’s enough to get into a conference room (sometimes even alone), plug your device into the network via wire and the attacker is into the network and off to the races. It’s then possible to set up a remote connection from within the network, because firewall policies for internal networks are often much less restrictive than those for external network (employees need to be able to work), allowing undisturbed access inside the network, not cut off by a firewall.

Remote access

Of course, access can be gained even without any physical access. For example, a new critical vulnerability is discovered for a popular network device provider which allows anyone to execute commands from the console on that device. Cases like this don’t happen every day, but they happen nevertheless. And when they happen, they can be catastrophic, because they are unknown to the existing network security tools or network/network security administrators. An attacker with remote shell access on such a device is then able to do anything. At that point, network is his, not yours.

While vulnerabilities like this are not as common, there are other remote attacks that are efficient, effective, and more common. In our previous blogpost we described one phishing scenario and we can build on that here. Say an attacker sends a crafted .pdf file via email to the victim. Since email communication is something that nearly every company needs, the email itself is not blocked. Maybe it’s disguised as an invoice or as a charity offer (as in the previous blog post), but once that file opens, the attacker gains full access to that computer and possibly even anything that’s available from there. You might think “but we use tools that prevent any malware in emails, we’re safe.” You might be right, but these are functionally just protection against spambots. Keep in mind that this will catch only known files – that are known to the security tool. If someone sends new malware, or specially created malware (which is usually how this attack is accomplished), then it won’t help.


BYOD

Finally, consider the example of the “personal device” – where (for example) Karen in the Accounting Department brings her phone to the office, and connects it to the network. Karen likes to watch MMA, but happens to use her mobile to stream content from sites which don’t respect authors and performance rights – what might be called a “bootleg feed” or a torrent site. As these streaming sites are notoriously rife with malware, Karen’s device is now infected – because she isn’t deploying mobile device security. When she accesses the trusted internal wifi network via her phone, she is opening up a direct pipeline for all of the malware on her phone, without having to go through the firewall.

In all of these scenarios, the firewall is ineffective, because not all of the communication comes through the firewall. This means that while a firewall is effective, it doesn’t offer 100% protection. Gaps exist, just a few of which have been included here.

But how to close the gap?

With enough time and effort, any network can be penetrated. To minimize the damage, you need to take precautions steps and close gaps left by tools like firewalls. How can you do this? To be able to identify what dangers have escaped your firewall, you need to be able to visualize every communication and every device in the network. Network Traffic Analysis (NTA) solutions monitor network traffic from communications not just through the firewall, but within the firewall as well – closing the gap on not just targeted attacks from outside, but also on BYOD, and other “safe” communications within the network. With full visibility, you know about everything that happens, right when it happens, which means you can respond to detected attacks before any serious damage happens to your organization, saving money, reputation, and your IT team’s sanity.

Identify anomalies

But what good is a mere visibility if there are countless packets every second? No one will be able to go through it all in real time – even with a team of thousands. So how to make sure that this incident gets the attention it deserves? NTA technology also helps to identify anomalous communications – devices acting strangely – on the network. Since an infected device starts to behave differently than it’s normal behavior – even in hard-to-identify ways – NTA technology; like MENDEL from GREYCORTEX, solves the problem, because it analyzes all network traffic and is able to spot these anomalous behaviors nearly immediately. It then informs the network team, allowing them to isolate infected or questionable devices from the rest of the network, preventing further damage, as well as to further investigate the incident without any risk of compromising further devices.

Having a firewall greatly improves the security of your network, but relying only on firewalls is irresponsible for many reasons – poor configuration, advanced threats or above-mentioned gaps. To be sure that nothing leaves your network without you knowing about it or having a say in it, you need bigger guns than just a firewall, even a next generation one. For significant improvement in your security, you need NTA solution to identify the hidden connected devices on the network, as well as to identify anomalous behavior that shows the hidden work of a compromised device.

SafeDNS Now Supports Filtering IPv6 Sites

Two years ago, we added support for IPv6 site blocking to all of our solutions – for home, education, business, and telecom – that allow SafeDNS cloud service users to restrict access to sites using the IPv6 protocol. 

In 2021, after having received loads of requests, we’ve finally released the beta version of our IPv6 resolver that comes to pile up on all our web filtering solution features aiming at making our solutions more robust, as we are permanently fighting web-based threats. 

The beta version includes enhanced security, more flexible subnetting, a simple address assignment, and a larger address webspace to name a few features. Therefore, because cyber threats evolve every day and we always strive to strengthen our solutions, we invite you to try and test our IPv6 resolver.

In our upcoming posts, we will inform you about any updates. Meanwhile, if you have any issues with the setup, here is the link on how to install the IPv6 resolver or simply contact one of our support team members.

What IPv6 is

IPv6 is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the internet. Unlike the widely used IPv4 protocol, IPv6 has a larger addressing space as this modern-day protocol uses a 128-bit address system and is a successor to IPv4, designed to replace the latter with its 32-bit address system, which will soon run out of IPv4 addresses.

IPv6 is widely used in different industries for the interaction of M2M sensor systems. The IPv6 protocol is at the heart of IoT networks and is used, along with IPv4, on many popular websites and mail services. SafeDNS is aware of the growing popularity of IPv6 and its influence on contemporary computer networks. In anticipation of a mass transition to this more advanced protocol, we are taking steps to be fully ready for it.

 

Why supporting IPv6 is important

Despite a relatively small number of IPv6 sites existing now, the SafeDNS support for blocking both IPv4 and IPv6 sites is significant for more comprehensive protection of the company’s users against all kinds of cyber threats. Previously, the SafeDNS filtering service just skipped sites on IPv6. Starting from today, SafeDNS makes the internet safer for you – by filtering out sites using IPv6 as well as IPv4. The opportunity to block IPv6 sites is supported on all the SafeDNS plans.

First and foremost, SafeDNS support for IPv6 is likely to be in demand with internet service providers that use IPv6 on their networks (including for their internal services). However, home and corporate users of the SafeDNS service will find the new opportunity quite useful cause the number of sites on IPv6 (including dangerous ones) is increasing every year.

How to enable IPv6 site blocking with the SafeDNS service

It is simple. You do not have to do anything. IPv6 support is already available for all of the SafeDNS users on any service plan. So there’s a need to change anything in your filtering settings. From now on, the sites using IPv6 are correctly blocked according to your SafeDNS settings.

Stay tuned!

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

CyberLink’s CEO Dr. Jau Huang Shared Insights about the Future of AI Facial Recognition in an On-Stage Speech at 2019 COMPUTEX Forum

Taipei, TaiwanJune 5, 2019 COMPUTEX 2019 brought a glimpse into the future of technology, showcasing the latest innovations from global tech leaders. Dr. Jau Huang, founder and CEO of CyberLink (5203.tw), a provider of cutting-edge AI and facial recognition technologies, was invited by the COMPUTEX Forum, to give an on-stage speech in its AIoT session. Dr. Huang shared insights on the future of edge-based AI facial recognition, and he demonstrated case studies showing how CyberLink’s FaceMe® AI Facial Recognition Engine helps AIoT developers transform applications such as smart retail, smart security and more.

 

AI Facial recognition and edge computing are currently two of the hottest technology trends. Most IoT applications need real-time response to facial recognition, requiring edge-based solutions that offer better processing performance with minimal latency and much higher efficiency than facial recognition processed on the cloud. CyberLink’s FaceMe®, the leading edge-based AI facial recognition engine and one of the world’s top solutions, yields up to 98.5% true acceptance rate (TAR), offers highly flexible capabilities and runs cross-platform on Windows, Linux, Android, iOS, and more operating systems. It offers hardware and system providers one of the best environments to quickly integrate facial recognition technology into their existing and new solutions.

“As they are quickly evolving and maturing, game-changing facial recognition and edge computing technologies are now among the most significant AI trends. When deployed on edge devices and without operating system limitations, facial recognition’s processing speed can be greatly enhanced, resolving latency problems caused by cloud computing,” said Dr. Jau Huang, CEO of CyberLink. “CyberLink’s FaceMe® has ranked among the top-tier facial recognition engines in a number of global competitions, including the National Institute of Standards and Technology Face Recognition Vendor Test (NIST FRVT 1:1) and the MegaFace Challenge, establishing our solution as one of the most accurate and fasted engines in the world.”

In his speech, Dr. Jau Huang shared a number of FaceMe® success stories across AIoT applications. For smart retail, FaceMe® can help retailers collect customer statistics such as visit counts, age, gender, and satisfaction, and recognize VIP guests as well as blacklisted visitors. In another scenario, FaceMe® can be integrated into service robots that welcome and identify customers upon arrival and provide them with helpful directions, like a virtual concierge. FaceMe®’s anti-spoofing capabilities matched with 2D/3D cameras can significantly enhance protection against fraudulent access, enabling reliable and advanced smart security and banking. For broad deployments such as law enforcement systems, FaceMe® supports hybrid architectures where facial data can be quickly captured from edge devices and then sent to a main server for further facial landmark analysis.

Less than a year after launching FaceMe®, CyberLink has collaborated with more than 100 global partners, including hardware makers, solution providers and system integrators, deploying the technology across multiple IoT/AIoT scenarios. FaceMe® was recently honored with COMPUTEX d&i awards for its innovative and powerful capabilities.

COMPUTEX Forum – CyberLink “Facial Recognition at the Edge: the Future is Now

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com