Skip to content

The importance of protecting your company’s User Identities

With the increase in phishing attacks all over the world due to the outbreak of COVID-19, companies are reassessing the efficiency of their information security systems, since the home office opens loopholes for a company’s security and such type of malware.

One of the first steps for you to ensure your company is secure is by protecting user identities so that in the event of a cyberattack on your corporation, the databases containing personal, sensitive, and financial information are protected by a PAM solution.

In addition to preventing leaks of personal data, privacy abuse, loss of reputation, and financial disasters, your company complies with data protection laws, such as the LGPD (General Data Protection Law) and GDPR (General Data Protection Regulation).

Even though it is a fundamental practice for information security, many companies ignore good practices for PAM and do not protect user identities as they should, opening loopholes for information security.

The importance of protecting your user identities

From the use of a PAM solution, all the company’s critical data is protected, since the access to this data needs one of the privileged credentials, also known as user identities.

The only people who must use these identities are those who need to access the environments to perform their tasks, so the number of people with this type of access is limited.

There are reports of hackers being able to steal these user identities through malware, such as phishing.

Typically, the goal of this type of attack is to target someone at the top of a company, such as directors and coordinators, and collect sensitive information from the corporation, such as the high-privilege credential of these people. 

According to Gartner, 95% of these attacks happen via email, which makes it difficult to detect their installation on a machine or network infrastructure, leaving the entire corporation vulnerable.

How to protect your user identities

Some practices are critical to maintaining the security of corporate user identities, such as managing privileged credentials.

Discovering compromised identities quickly is not an easy task, but using a complete PAM solution that detects suspicious actions within the privileged session quickly is the best way to keep your company secure.

Besides recording all actions taken, your PAM solution must notify you in real-time when any suspicious activity occurs, so that the person responsible for managing this can take appropriate measures, allowing a quick response to incidents and reducing operational costs.

In addition, it is important to check the expiration of the digital certificates of your company’s access environments. Being unaware of the expiration of a certification opens many security holes in a company.

The senhasegura solution ensures these and other measures to protect user identities, eliminating every security hole in your company when it comes to PAM.

Request a demo and find out why senhasegura has the best score (4.9/5) among competitors on Gartner Peer-insights.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

ESET launches ESET Cloud Office Security to provide advanced protection for Microsoft 365

ESET, a global leader in cybersecurity, has today launched ESET Cloud Office Security, a new standalone software as a service solution that provides advanced preventative protection for users of Microsoft 365 applications. The software is designed to reflect the modern role of emails and collaboration tools used within organizations.

Microsoft Office 365 is used by organizations all over the globe, with the cloud becoming an integral part of many businesses’ data storage and systems, regardless of their size. With more than 84% of organizations (according to Gartner survey*) using or intending to use Microsoft 365, it is crucial that businesses and their cloud tools are adequately protected. Businesses that leverage ESET Cloud Office Security are protected against incidents caused by email-based attacks or malware and can help employees stay focused on work tasks.

Email is the foundation of modern business communication, yet it remains one of the most effective channels to distribute malware, the consequences of which can be disastrous, especially in combination with the infiltration of collaboration tools. ESET Cloud Office Security provides an additional layer of protection for Microsoft 365 cloud email and storage, ensuring peace of mind for all team members with the automatic protection of new user mailboxes. The solution allows for total control and visibility over threats, with immediate notification when the detection of malware occurs and an easy-to-use web console that allows IT administrators to take immediate action.

* Implementing Microsoft Office 365: Gartner Survey Results and Analysis, 2019, Published: 4 September 2019

The combination of spam filtering, anti-malware scanning and anti-phishing secures companies’ Exchange Online services, which in turn protects communications against malware, minimizes the adverse effects of unsolicited emails on everyday productivity and helps prevent incoming external emails from being used as a channel for targeted attacks. ESET Cloud Office Security anti-malware protection also reacts to any file changes in OneDrive, helping to safeguard your company’s data and mitigating the risk of malware spreading to other devices. Accessible from anywhere, the easy-to-use cloud console also gives an overview of quarantined items and immediately provides notifications when detections occur.

Ján Brunovský, Product Manager at ESET, commented: “Almost every business across the world relies on emails for communication, and yet it is one of the main attack vectors cyber criminals exploit. We are excited to launch ESET Cloud Office Security and to provide a solution that will protect countless businesses and their most valuable interactions and data. Securing email and cloud storage is the linchpin of cybersecurity for businesses, and without a strong foundation of anti-malware protection, organizations are left wide open to attack. We are proud to provide a new, cutting-edge, easy-to-use solution for the broad spectrum of businesses that need to secure their cloud tools.”

For more information about ESET Cloud Office Security click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET issues its Q3 2020 Threat Report – remote workers under fire from RDP attacks

BRATISLAVA – October 29, 2020 – ESET, a global leader in cybersecurity, has released its Q3 2020 Threat Report, summarizing key statistics from ESET detection systems and highlighting notable examples of ESET’s cybersecurity research – including previously unpublished ESET research updates. The report and its findings were exclusively presented during the “ESET European Cyber Security Day – Towards a Secure Post-COVID Future” virtual event.

After months of abusing the COVID-19 theme in their campaigns, cybercriminals appear to have returned to their usual tactics in the third quarter of 2020, the Q3 2020 Threat Report shows. An area where the risks remain particularly high, however, is remote work.

ESET telemetry showed further growth in attacks targeting Remote Desktop Protocol (RDP), which grew throughout H1. While the number of unique clients targeted rose by more than a third, the total number of attack attempts surged by 140%. “The continued rise in RDP attacks may be a result of the growing number of poorly secured systems being connected to the internet during the pandemic, or possibly other criminals taking inspiration from ransomware gangs in targeting RDP,” comments Jiří Kropáč, Head of Threat Detection Labs at ESET.

Other key trends observed in Q3 were the revival of cryptominers, Emotet returning to the scene after months of inactivity, and Android banking malware surging following the source code release of the notorious mobile banking trojan Cerberus.

The ESET Q3 2020 Threat Report also reviews the most important findings and achievements by ESET researchers. Among many other findings, they uncovered more Wi‑Fi chips vulnerable to KrØØk-like bugs, exposed Mac malware bundled with a cryptocurrency trading application, discovered CDRThief targeting Linux VoIP softswitches, and delved into KryptoCibule, a triple threat in regard to cryptocurrencies.

The exclusive research presented in the Q3 2020 Threat Report includes campaigns leveraging malicious MAXScripts, the spread of Latin American banking trojans to Europe, new activity of the TA410 threat group and a look into the updated arsenal of the Gamaredon Group.

Besides these findings, the report also recapitulates the many virtual talks held by ESET research specialists in Q3, introduces talks planned for the upcoming quarter and provides an overview of ESET’s contributions to the MITRE ATT&CK knowledge base.

For more information, check out our ESET Threat Report Q3 2020 on WeLiveSecurity.

Make sure to follow ESET research on Twitter for the latest news from ESET Research.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET recognized for giving back to the community with a 2020 Tech Cares Award from TrustRadius

BRATISLAVA – 28 October, 2020 – ESET, a global leader in cybersecurity, has been recognized by TrustRadius with a 2020 Tech Cares Award. The award celebrates companies that have gone above and beyond to provide their communities, clients and frontline workers with support throughout 2020 and during the COVID-19 crisis. While over 100 tech companies were recognized, ESET was one of just two cybersecurity vendors to receive the award.

TrustRadius is the fastest growing review site and insights platform for businesses, helping buyers make better product decisions based on unbiased and insightful reviews. The review site launched the Tech Cares Award in response to the unique challenges that 2020 has posed for tech, and in recognition of the companies who have risen to meet the needs of those around them.

In collaboration with the scientific community in Slovakia, ESET developed the first testing kit for COVID-19 in Slovakia, donating 100,000 kits to the Slovak Republic. Recognizing the importance of education in light of rising cyber crime and a newly remote workforce, ESET launched extensive educational activities for both the general public and expert community around cybersecurity awareness, including Remote Desktop Protocol and VPN security, encryption and backup.

The Tech Cares Award recognizes companies that have contributed directly to combat the virus, either with their products, knowledge or financial support. The award is based on user feedback and TrustRadius community nominations. Users highlighted how the nominated organizations have acted selflessly in support of their customers throughout the pandemic, and the research team at TrustRadius individually vetted each nominee to ensure that their actions met the standard for outstanding conduct and support during the COVID-19 crisis.

This is the second time ESET has been recognized for activities undertaken during the COVID-19 outbreak. The What the Next Normal Will Be Post-COVID-19 report by leading IT market research and advisory firm, IDC, outlined the top 10 changes we can expect, inspired by the initiatives of industry leaders, and also highlighted the support ESET provided during the COVID-19 crisis.

Ignacio Sbampato, Chief Business Officer at ESET, commented, “ESET is immensely proud to have been recognized for the actions it has taken to support businesses and individuals during the COVID-19 pandemic. As a company, we endeavor to put people at the heart of everything we do – whether this is providing specialized educational resources for teachers or extending free trials of our products to support those who may be suffering financially. ESET cares deeply about the communities it serves globally, nationally, and locally and has created a Fund for Effective Diagnosis & Prevention of SARS-CoV-19, initially donating €300,000. We are honored to be among the few cybersecurity vendors to receive an award and will continue to work to give back to the community as we move forward through the Coronavirus crisis and into the future.”

“We are excited to announce our first-ever Tech Cares Award Winners,” said TrustRadius CEO Vinay Bhagat. “This pandemic isn’t just a test of fortitude. It’s an opportunity to distinguish yourself. We have been completely inspired by the way the B2B technology industry responded to COVID-19. So many companies pivoted with grace, leading to many of them standing out in our minds as major community contributors during this time. Not only do we feel that these companies are deserving of recognition — we also consider their example when deciding how we ourselves can find new ways to give back.”

To find out more about ESET’s initiatives during COVID-19, click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

RADIUS Change of Authorization (CoA): What Is It? Why Use It?

The RADIUS change of authorization (as defined in RFC 5176) provides a mechanism to change authorization dynamically after the device/user is authenticated. Once there is a policy change for a user, you can send RADIUS CoA packets from the authorization server to reinitiate authentication and apply the new policy.

The RADIUS CoA process allows you to change the user access immediately when needed, without the need to wait for the wired switch or access point to initiate a re-authentication process, or for the device to disconnect and re-connect again.

CoA use cases (for connected authenticated devices) include:

  • Access control policy update, such as VLAN assignment for a group of devices/users
  • Risk/posture assessment policy was updated for a group of devices/users
  • Administrator blocked a device/user
  • Device risk score/compliance changes: Device is out of compliance (such as AntiVirus or firewall was turned off), thus needs to be set to quarantine VLAN or have access completely blocked; Or device is back in compliance, thus needs to be set to the production VLAN.

The CoA process functions as follow:

  • A device is connected to a wired ethernet switch or WiFi SSID after a successful authentication
  • There was a policy update or a change on the endpoint which requires that the device completely disconnect from the network or reconnect with different access than the current one (i.e. different VLAN, apply ACL)
  • The RADIUS server sends the CoA packet to disconnect the device which leads to re-authentication and applies the new access policy

CoA Packets

The RADIUS CoA packet is sent on port UDP 3799 or UDP 1700 – as used by some network vendors.

Disconnect-Request (PoD – Packet of Disconnect) is a request being sent to the NAS – Network Access Server (i.e. switch/access point), in order to terminate the user session/s. As a reply, two packets can be sent from the NAS:

  • Disconnect-ACK – acknowledgment, successful disconnect
  • Disconnect-NAK – negative acknowledgment, disconnect session failed

CoA-Request packet can also be sent to initiate changes on the device or port such as re-authentication and bounce port. As a reply, two packets can be sent from the NAS: CoA-ACK (successful CoA action acknowledgment) and CoA-NAK (CoA failed action). When there’s a need for a VLAN change, using CoA-Request, might not force the endpoint IP address to be released and renew. Instead, it may only change the VLAN. Thus, for implementations that require VLAN change, it’s recommended to use the Disconnect-Request CoA packet which will lead to re-authentication, and for the device to get a new IP address on the updated VLAN.

CoA Disconnect-Request with 802.1X RADIUS Authentication Flow

>RADIUS Change of Authorization Packet Capture

CoA RADIUS codes

CoA PacketRadius Code
Disconnect-Request40
Disconnect-ACK41
Disconnect-NAK42
CoA-Request43
CoA-ACK44
CoA-NAK45

Packets Capture Examples using Wireshark

Disconnect-Request:

Disconnect-ACK:

These packets contain attributes with information on the NAS (wired switch/access point), endpoint involved, timestamp, and a link to the frame of the RADIUS server requests / NAS responses.

RADIUS Change of Authorization with Portnox CLEAR

Using Portnox CLEAR for CoA with dynamic VLAN assignment (previously discussed in Dynamic VLAN Assignment) implementation, allows the administrator to achieve a secure and segmented network for dynamic changes in the environment. Whether it’s an access policy change for a group of users/devices or a compliance change on a specific endpoint, the device(s) will be immediately placed on the relevant network, or blocked according to the policy.

In the following video, we’ll demonstrate a CoA use case of risk violation for a device with Portnox CLEAR. Scenario description:

  • Configure SSID to work with CLEAR services, including CoA.
  • In CLEAR, review risk assessment policy which requires AntiVirus to be up, running, and updated, and access control policy which places devices with risk violation in quarantine VLAN.
  • Connect a device with AgentP (CLEAR agent on the endpoint for risk assessment) enrolled to the configured SSID and authenticate successfully with a certificate.
  • Turn off AntiVirus on the endpoint, CLEAR identify the risk, and send CoA packet to disconnect the device.
  • The re-authentication process starting, and the device is being placed in the quarantine VLAN.
  • Add remediation action to start AntiVirus | AntiVirus is being enabled on the endpoint by CLEAR and the device is back in compliance.
  • CoA process is initiated, and the device is being placed back in the production VLAN.

Author Ran Fridberg

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Protecting consumers at every level with enhanced protection for Windows

BRATISLAVA – ESET, a global leader in cybersecurity, has today launched new versions of its Windows security products for consumers. The new versions upgrade the protection in ESET Internet SecurityESET NOD32 Antivirus and ESET Smart Security Premium.

The wide range of security improvements cover malware detection, online banking, password security and smart home support – in line with ESET’s goal to create a safer digital world for everyone to enjoy. With the ever-increasing volume of reported cyberattacks, it is vital that users are secured in their online activities. These product updates address key issues, including online payments and banking-related threats, identity theft and leaking of personal information, stolen passwords and connected device security.

ESET is continuously improving its solutions to ensure that users are equipped with the very latest technologies in cybersecurity while keeping a low system footprint. The updates bring fine-tuning of the Host-Based Intrusion Prevention System and Advanced Machine Learning modules, along with a significant reduction in the size of the Machine Learning module.

Other key updates include the new Windows Management Instrumentation (WMI) and System Registry scanners capable of detecting malware that uses the WMI or the registry maliciously. The Connected Home module is also improved with better connected device detection and security issue troubleshooting.

Financial security is a top priority, and the upgraded Banking & Payment Protection features a special secured browser mode through which users can safely pay online. The new feature allows users to run any supported browser in secured mode by default. With secured mode on, the communication of the keyboard and mouse with the browser is encrypted to guard against keylogging. In addition, Banking & Payment Protection now also notifies users when Remote Desktop Protocol (RDP) is turned on to alert them about the danger of malware abusing RDP.

Finally, ESET Password Manager has been completely rebuilt with new functionalities such as remote logout from websites and remote clearing of browser history, and is available via both browser extensions and native mobile apps.

Commenting on the updates, Matej Krištofík, product manager at ESET, said, “As cyberthreats continue to evolve in sophistication and frequency, it is vital that consumers and their devices are protected on every level. Technology is at the center of our lives, from online banking to connected homes, so it is more important than ever that our personal technology is safe and secure. We are proud to offer our latest Windows security product updates to consumers, reflecting our dedication to consistently improve and innovate in order to provide a safe digital experience for all.”

To find out more about ESET’s home security products for Windows, click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

First Israeli Hi-Tech Delegation Takes Off for the Emirates

The first Israeli high-tech delegation to the Emirates departed this morning (Sunday), led by Jerusalem Venture Partners Fund and entrepreneur Erel Margalit. Over the next four days, the delegation is set to hold high-level meetings with senior officials as well as innovation and investment counterparts in Dubai and Abu Dhabi, to build cooperation between Israeli and Emirati hi-tech, and deepen the newly found relationship between the two countries.

Erel Margalit, CEO and founder of the Jerusalem Venture Partners (JVP), February 18, 2019. / Hadas Parush/Flash90

On Tuesday, participants will join first of their kind ’round table’ meetings between entrepreneurs from the two countries– both of which are renowned internationally as leaders in the field. Ahead of the visit, the delegation was honored to have received the warm welcome of the UAE Government and was looking forward to the opportunity to meet senior ministers during the visit.

“Hi-tech is the locomotive engine that leads the Israeli economy, so we have a key role in leading relations and cooperation with the Emirates, with an emphasis on partnership,” commented JVP founder and chairman of Margalit Startup City Erel Margalit.

He added, “I am proud to lead the first Israeli hi-tech delegation to the Emirates. Our companies have been in business contact with the Emirates for a number of years, and now an opportunity has arisen to expand this network of relationships, deepen the ties significantly, and allow more and more Israeli companies and entrepreneurs to be part of this connection and success.”

Margalit stressed, “This is not just a business opportunity, but a political opportunity for a new page between the Israeli hi-tech community and the entire Middle East. With us in the delegation, are the CEOs of emerging Israeli hi-tech companies from every field, and I am sure we will create real partnerships here that will contribute to building successful Israeli companies that will propel the Israeli economy forward, precisely during this period, and create more and more new jobs.”

The delegation was invited to the Emirates by the DIFC (Dubai International Financial Center), the body that manages the free trade area in the financial heart of Dubai – which is one of the global financial centers. Members of the delegation will also receive a comprehensive tour of the financial center.

Among the companies participating in the delegation: Earnix, one of the world’s leading companies in insurtech and personalization of insurance and banking, an area with great interest in the Emirates, which is considered a powerhouse in the field of insurance in the Middle East; Up Control, an emerging Israeli company leading a revolution in the management of remote work networks; Morphisec, from Beer Sheva, which is a leader in innovative technology for protecting endpoints in organizations, which is a particularly relevant development for the protection of banks and infrastructure; and Secret Double Octopus, also from Beer Sheva, which provides a leading biometric solution for passwords.

Also of significant interest to the Emirati Government, companies, and investors is the field of foodtech. Among the delegation in the field is InnovoPro, a company that produces a protein substitute from chickpeas with high nutritional values. One of the most interesting companies in the world in the field, it is already a major player in dairy products in some of Europe’s leading chains, with products from ice-cream to mayonnaise. The company is now preparing for a breakthrough in the Middle East. Another company participating in the delegation is Agrint, which has developed technology to identify diseases in trees before they cause damage. One of the most serious infections in the world is the palm bacteria that destroys entire palm groves. Agrint’s solution for this has significant potential for agriculture in the Middle East.

Members of the delegation included: Entrepreneur, and former senior official in the Mossad, David Meidan; Udi Ziv, CEO of Earnix; FrankZvi, CEO of Copilot; Elad Ben-Meir,-CEO of SCADAfence; Dror Liwer – Co-Founder& Chief Security Officer of Coronet; Asaf Ganot, CEO of Control Up; Omri Kohl, CEO of Pyramid Analytics; Gal Rimon, CEO of Centrical; Ronen Yehoshua, CEO of Morphisec; Raz Refaeli, CEO of Secret Double Octopus; Mark Gazit, CEO of Thetaray; Yaron Ravkaie, CEO of Teridion; Tali Nehushtan, CEO of InnovoPro; Yehonatan Ben Hamozeg, CEO of Agrint; they were joined by JVP partners Yoav Tzruya, Fiona Darmon, Gadi Porat, Michal Drayman, and Rinat Remler, senior VPs Shimrit Kenig, Guy Pross, Pnina Ben Ami, and communications director Omri Sheinfeld.

Source from: https://www.jewishpress.com/news/business-economy/first-israeli-hi-tech-delegation-takes-off-for-the-emirates/2020/10/25/

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

Main risk trends for information security in 2020

Due to COVID-19, the attention of CISOs had to be reinforced to plan an efficient information security strategy, and to help in this task, Gartner has published a very interesting report, which pointed out some security trends and risks for information security in 2020.

According to Peter Firstbrook, VP Analyst at Gartner, “The pandemic and the resulting changes in the business world have accelerated the digitization of business processes, endpoint mobility, and the expansion of cloud computing in most organizations.”

As a result, many companies have revised their remote access policies and migrated to cloud systems, increasing productivity and information security risks. Check out the main trends that Gartner has listed:

XDR

Through XDR (External Data Representation) solutions, the detection of threats becomes faster and more accurate in emails, endpoints, servers, networks, etc.

Task Automation

Through automation tools, tasks that are performed repeatedly are done in a faster, scalable way, without errors and risks to a company’s information security.

It is recommended that this automation be done in repetitive tasks so that professionals focus on functions that demand more time and will have a greater impact on the company’s security.

Artificial Intelligence

Through the use of artificial intelligence in your company’s information security, it is possible to protect digital business systems, combine it with packaged security products to enhance security defense capabilities, and prevent the improper use of artificial intelligence by attackers.

Enterprise-level CSOs

With the significant increase in cyber-physical attacks, hiring CSOs is becoming a trend across companies.

In addition to adding to IT security, these professionals also work in OT security, physical security, supply chain security, product management security, etc. This significantly reduces the risks to information security.

Privacy

From the sanction of data protection laws such as LGPD and GDPR, data privacy has become an obligation to be followed, and this affects the entire corporation, which requires collaboration from all areas, such as IT, HR, legal, management, etc.

Digital Security and Trust

The importance of maintaining consumer security at points of contact has become an advantage for companies.

Having a team focused on the administration of all points of contact makes the exchange of information both secure and complete, regardless of the means of contact chosen by the customer, which reduces the risks to information security.

Zero-trust Network Access Technology

Access to environments through VPNs tends to decrease. Through Zero-trust Network Access (ZTNA), companies have greater control over remote access.

ZTNA only communicates with the ZTNA service provider and can only be accessed through the ZTNA provider’s cloud service, which avoids information security risks.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

What’s new in the latest version of ESET’s home Windows offering?

Each year, around autumn, ESET releases a new version of its Windows offering for home customers. This year sees the arrival of the fourteenth version of the home Windows lineup, with a long list of new and improved features for users. With cyberattacks surging massively over the past few months, this update meets users’ need for comprehensive online security in times of uncertainty and increased threats.

Included in the updates are ESET Internet Security, an advanced security solution that brings rock-solid protection for modern web users; ESET NOD32 Antivirus, a fast and light solution that is perfect for gamers and everyday users who don’t want any interruptions; and ESET Smart Security Premium, a comprehensive product built without compromise for users who want it all, including extra data encryption and easy password management. With the aim of creating a safer digital world for everyone to enjoy, version 14 adds a series of new features to these products, along with improvements in malware detection, online banking and password security.

A crucial upgrade was made in the Advanced Machine Learning module, which now has better detection while retaining a tiny footprint. The improvements in the data selection and algorithm components will lead to increased detection of threats, including those transmitted via email. Synchronous Advanced Machine Learning in the Cloud, which runs more heavyweight detection models on cloud platforms, also brings considerable improvements for the detection of new malware.

Similarly, ESET is continually working to improve behavioral detection, with a focus on extending protection across system components that are typically abused by malware. To this end, the Host-Based Intrusion Prevention System, which utilizes advanced behavioral analysis to protect your system from malware and unwanted activity, has also been bolstered with further detection methods. This includes improved detection of ransomware and other malware using suspicious encryption and decryption API calls.

The update also provides users with new protection in the form of the Windows Management Instrumentation (WMI) and System Registry Scanner, which are capable of detecting malicious uses of the WMI and the system registry.

Finally, version 14 also brings changes to Banking & Payment Protection, including a “secured browser” mode through which you can safely pay online. This mode gives users the option to run any supported browser in secured mode by default; after it has been set up, the browser will always start in secured mode. The improved Banking & Payment Protection automatically protects users when banking online and when accessing web-based cryptocurrency wallets. The update encrypts the communication of your keyboard and mouse for safer transactions in your browser, and notifies you when Remote Desktop Protocol is on – a possible sign that malware is spying on you.

For more information about the full list of features included in ESET’s home Windows offering, please see here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.