Skip to content

Actiphy Releases New Version Of ActiveVisor, A Centralized Management And Monitoring Console For ActiveImage Protector Backup Clients

Wildomar, CA – Actiphy, Inc., publisher of backup, disaster recovery, and virtualization software solutions, announces the release of ActiveVisor version 7, a centralized management console which now includes management of backup tasks with ActiveImage Protector’s new Direct-To-Cloud backup feature.

As uncertainty increases globally, threats from cyber attacks are rampant. The COVID-19 pandemic has changed how and where we work. With so many people working from home and other remote locations, it is essential that a reliable centralized management solution secures backup and recovery.

ActiveVisor provides real-time monitoring and notification alerts so that issues are quickly identified and corrected. System administrators substantially reduce workloads by monitoring and managing the backup status and configure backup settings for ActiveImage Protector clients from any location.

New Features

  • Manage Client PCs and Servers for Direct-To-Cloud Backup
    Use ActiveVisor to configure tasks to backup directly to cloud storage.
  • Manage Client PC’s File Backup
    ActiveVisor now includes task creation of file-by-file backup tasks.
  • Manage Client Systems Booted from RescueBoot
    ActiveVisor can remotely perform a system disaster recovery by utilizing RescueBoot.
  • Supports Linux Clients

Standard Features

  • Administrators can manage, monitor, and configure backup agents, and task schedules from any location using a browser-based console.
  • Manage Azure Virtual Clients connected to local network domains.
  • Auto-scroll option in the monitoring panel displays alerts of the latest changes occurring on clients. When a monitored client’s status changes, the client’s information will automatically display at the top of the panel.
  • The dashboard window provides a graphical representation of managed and unmanaged client systems on the network.
  • Clients can be grouped for management purposes. Groups can be rearranged, if necessary, based on changes to a systems configuration.
  • Schedules can be configured based on individual client requirements, or a predefined scheduled template can be applied to deploy a pattern-based backup schedule to batches of clients.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

CyberLink’s CEO Jau Huang To Present at NVIDIA GTC 2022

TAIPEI, TAIWAN — March 16, 2022 — CyberLink Corp. (5203.TW), a pioneer in multimedia and AI technologies, announced today Dr. Jau Haung, its founder and CEO, has been invited to speak at NVIDIA’s GPU Technology Conference 2022 (GTC). Dr. Huang will address the role of AI in helping content creators enhance productivity and improve quality when making engaging, professional videos. The presentation will take place virtually on Thursday, March 24 at 11 a.m. CST (Wednesday, March 23 at 11 p.m. ET/8 p.m. PT).

GTC is a global AI conference held every half year, bringing together hundreds of developers who share the latest trends and applications for AI, computer graphics, data science, and machine learning.

At GTC 2022, Dr. Huang will share how CyberLink utilizes AI-powered tools in PowerDirector, its flagship video editing software, for features such as AI style transfer, sky replacement, motion tracking, and a series of enhancer tools. CyberLink first introduced its video editing software in 2001 and closely followed rising trends for more than two decades – from SD and HD to VR and 4K, from optical discs and files to online and streaming media – before deploying AI for editing in 2020.

“Artificial intelligence changes every aspect of life, from industrial-level image recognition to video analytics, security, autonomous vehicles and digital content creation,” said Dr. Jau Huang, CEO of CyberLink. “As the world-leading AI and multimedia software developer, we use AI extensively in our FaceMe® facial recognition solution as well as our creative software and apps, such as PowerDirector. It is CyberLink’s mission to help video creators at all levels achieve image and audio superiority, allowing them to create something extraordinary no matter their skill level.”

In the past, the use of motion tracking or motion masks was a labor-intensive and time-consuming undertaking reserved to professional creators. With the help of AI technology, PowerDirector delivers fast, accurate motion tracking – with just a few clicks, making this powerful tool accessible to every creator and for all creations, ultimately raising standards across all video productions.

In the same vein, AI brings some of the most sophisticated special effects to novice creators while cutting down dramatically the time spent by industry professionals. For example, PowerDirector’s sky replacement feature uses AI to precisely segment the sky in a video sequence and replace it with footage of sky conditions that better match the desired effect or visual aesthetics. This feature has the power to transform the atmosphere of a scene in a few clicks. From a practical aspect, it enables outdoor filming in a much wider range of sky conditions, eliminating costly interruption from changing weather or simply waiting for the right time between sunrise and sunset.

To learn more about PowerDirector, visit CyberLink online at http://www.cyberlink.com, or sign-up for CyberLink’s track at GTC 2022.

CyberLink @ GTC 2022 Information

  • Topic: AI-powered Video Editing for Creators at All Levels [S41616]
  • Speaker: Dr. Jau Huang, Founder and CEO of CyberLink
  • Time:
    • Thursday, March 24 11:00AM – 11:25AM (CST, Taiwan)
    • Wednesday, March 23 11:00PM – 11:25PM (EDT, New York)
    • Wednesday, March 23 8:00PM – 8:25PM (PDT, Los Angeles)
  • GTC 2022 Official Website: https://www.nvidia.com/gtc
  • Sing up for CyberLink Track

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

The Best Ways to Secure Device Onboarding in The Enterprise

With the prevalence of digital transformation in the enterprise, there is a clear necessity to balance IoT security issues and BYOD security measures that will prevent suspicious or malicious devices from gaining access to the enterprise’s assets and data centers, while at the same time, making sure that productivity and easy onboarding of devices is maintained. Employees, guests and contractors are bringing all kinds of Wi Fi enabled devices to the enterprise environment and they expect easy and quick network connectivity.

Onboarding is the process in which new devices gain access to the enterprise for the first time. Unfortunately IT departments can sometimes experience additional workloads while endeavoring to get all the devices on the network so as not to hinder business productivity. At the same time, if they are not handling the process with top security standards in mind, they could potentially place users, devices, enterprise data and the network itself at risk. The question arises: how should IT Security teams allow for BYOD, IoT, contractors, guests, etc. to securely and quickly connect to the network without placing any of its components at risk of a breach or ransomware attack? The answer: automation.

By automating the entire onboarding process enterprises can achieve the following benefits:

  • Reducing the costs that are typically associated with manual work (including configuration and support activities).
  • Enhancing productivity – getting team members, contractors and guests connected to work faster.
  • Increasing end-user satisfaction – instead of hassling end-users with onboarding procedures, the whole process can and should be seamless.
  • Decreasing the risks – unmanaged, unpatched, high-risk devices should be blocked or connected from the beginning to a separate segment of the network from where the key corporate assets are stored (the “crown jewels” of the company).

Easy Device Onboarding

Employees, students, contractors, partners and guests should onboard their devices once and then automatically re-authenticate after that, within an environment that continuously monitors all devices on the networks and automatically provides a risk score for every device. This ongoing scoring allows security teams to understand the security posture of the devices and the network as a whole, at any given moment. At the same time, there is no need to have end users repeatedly re-enter credentials on subsequent network connections unless a device is deemed to have a high risk-score. This way the enterprise can easily onboard BYOD devices belonging to employees that are traveling, working remotely or working at a satellite office location. Additionally, this allows onboarding of IoT and smart devices for business such as flat screens, printers and IoT devices, as well as gaming consoles, smart refrigerators and more. These items, of course, must be on a separate segment from where company assets are kept.

Reducing Risks on the Network

A while ago Ofer Amitai, Portnox CEO, wrote about tips for securing endpoint devices on college campuses, institutions that are always desiring a relatively simple onboarding process. He discussed how changes in onboarding and guest access policies could reduce risks and improve network visibility and control. The principals for securing the enterprise require these steps and more. Having a clear onboarding set of policies will allow IT teams to have automated actions applied (see examples in the next section).

After handling the company’s initial network security audit and collecting the security posture of all devices, it is important to make sure that the enterprise authorization policies include conducting automated and continuous security assessments of the network.  This way, every device employs baseline security measures before being allowed to connect.  Additionally, the IT security team should use granular policies to govern the level of access while maintaining full visibility and control over network connected devices with the ability to revoke access at any time.

Automated Device Onboarding & Network Authentication

Having an automated onboarding set of policies can allow for automated actions such as:

  • Immediately allowing Internet access
  • Blocking/ disconnecting
  • Segmenting a device to a separate network section
  • Remediation actions

For example, IoT devices are considered to be easy to hack.  Therefore, once connected to the enterprise network, these devices should be separated from where core assets are located.  Having different segments on the enterprise network is a good solution for that.  Additionally, if a visitor is being connected, the visitor should gain access to the Internet and not to company files, even when plugging the computer to the wired network.

Two important advanced guest network onboarding features are recommended to be included:

  • Easy guest access – allowing for simple and fast connections together with the ability to continuously monitor all devices and ensure security.
  • Agentless access – once the IT administrators have set up the onboarding policy – contractors and guests on protected networks should be able to self-onboard without installing an endpoint agent.

Acquiring Advanced Onboarding Capabilities

One of the technologies that can help with safe onboarding is network access control (NAC).  In the past, companies used only desktops and laptops, connected and authenticated over a wired network, however; nowadays wireless networks and mobile technologies have introduced personal devices (via BYOD policies) and Internet of Things (IoT) to the workplace.  In addition, increasingly stringent compliance standards, such as PCI-DSS, SOX, and ISO standards require companies to openly communicate their security controls to external auditing authorities.  All of these can be achieved via NAC solutions. Network access security should be a priority for all companies moving forward.

Every enterprise today must support a rapidly proliferating world of devices and platforms.  From an operational view point, this shouldn’t pose an obstruction of workflows and productivity. Ideally, the enterprise IT team will automate and secure network onboarding and authentication so that the IT helpdesk doesn’t have to intervene when guests, contractors and IoT devices need to connect. Additionally, an effective plan for secure network onboarding will on one hand improve end-user experience for BYOD, IoT, users and guests and on the other hand improve IT security as part of a layered protection strategy.

Looking to set IT security policies and automate your device onboarding? Portnox CLEAR offers easy onboarding while never compromising on network security across the enterprise.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。