Skip to content

CyberLink Joins FIDO Alliance, an Open Industry Association for Authentication Standards

The end-to-end integration brings FaceMe’s industry-leading facial recognition functionalities to AXIS camera and VMS setups, fusing live stream monitoring and group tagging in a seamless solution

TAIPEI, TAIWAN — April 15, 2022 — CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, today announced an important update to its facial recognition security software, FaceMe® Security. FaceMe Security now integrates with AXIS Communications’ AXIS Camera Station VMS (video management software), creating a robust, unified platform that brings facial recognition to AXIS’s security and access control applications. With this solution, users can now layer person-of-interest detection, group tagging and management, and visitor summaries on top of existing IP surveillance configurations with AXIS cameras and VMS.

AXIS is a global market leader in intelligent security solutions, integrating network cameras, video recorders, workstations, and video management systems. AXIS Camera Station is an easy-to-use, efficient VMS platform offering video surveillance and access control applications. Its intuitive interface and extensive compatibility make it an excellent fit for FaceMe® Security, a value-added smart surveillance software solution powered by CyberLink’s highly-ranked and precise FaceMe® AI facial recognition engine.

The unified platform, combining FaceMe’s real-time facial recognition to the AXIS Camera Station interface, delivers a unique, efficient and powerful monitoring solution. One operator can visualize up to 36 camera feeds on one screen. They can then rely on the facial recognition console running on a second display to receive real-time alerts. These alerts are triggered when individuals associated to a managed group (e.g., VIP, blocklists, employees) appear in front of a connected camera located in an area or at a time potentially requiring a certain action to be taken.

“Smart video management software is becoming an essential component to security and access control systems,” said Dr. Jau Huang, CEO of CyberLink. “Adding the facial recognition capabilities of FaceMe to the AXIS Camera Station enables a powerful, highly automated security monitoring environment, running on one intuitive platform.”

For an introduction to the FaceMe®-AXIS integration’s new features, visit the FaceMe® Security website or watch the introduction video.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Awingu VS Remote Desktop Gateway

When NFT Is the Creative Limit

Imagine this: It’s a nice spring afternoon and you decide to visit an art gallery. You get dressed up, grab your keys and face mask (depending on COVID restrictions in your area) and leave your house. You walk through the city to your favorite gallery, feeling the light breeze on your cheeks. You pay for a ticket and start walking around. You can see the art, almost touch it. You might meet a few people who are also admiring paintings and sculptures. You wave and smile with your eyes. Now imagine none of it is true. There is no need to physically go to the gallery and view art. We’ve arrived in an era when virtual galleries are becoming a reality. Digital art is gaining popularity, and Non-Fungible Tokens (NFTs) are making it that much more profitable for artists. By now, we’re so used to sharing and viewing content online for free that it is second nature. But what if an art piece was enriched by a unique feature—an NFT? We have been hearing so much about NFTs over the past few months. But what exactly are they? Non-Fungible Tokens. That’s it. It’s a piece of digital data, embedded in a file that is unique for that piece and that piece only. Just like a physical piece of art, a digital piece with an NFT is non-replicable. There is only one of its kind. And that is what gives it its value. These pieces cannot be exchanged or substituted with similar items of the same value. Just like physical art cannot be swapped by a similar piece with the same value. NFTs have been around since 2015, but have recently gained in popularity. Many thanks to the National Basketball Association (NBA) in the US, which started selling “NBA Top Shots” in 2020—non-fungible short clips of basketball shots, similar to formerly popular basketball cards. Each is unique, has its own value and cannot be substituted by another. This new development has the potential to revolutionize the art world. NFTs act as a digital certificate of ownership of an art piece. After an NFT art piece is created, it is tokenized on a Blockchain (cryptocurrency service). This proves the artist’s legal ownership of the piece they created. And since a blockchain is secure and is hard to hack, tracking ownership is pretty easy. This helps the artist gain popularity and get their art out into the world. Anyone online can view their piece, even share and copy it. You may think that this kind of defeats the purpose. If you can freely access it, view it and share it, why pay for the ownership? The trick is, unless you purchase the NFT, you can’t fake ownership. Just like with physical art, you can take a photo of it, or even make a copy. But unless you own the original piece with a certificate, your copy/photo is not of the same value as the original. When you buy an NFT, it becomes your property and you can do with it as you please. However, the buyer does not possess any Intellectual Property Rights, such as the right of adaptation or reproduction. This is an exclusive right of the creator. Creating digital art breaks bounds artists have been bound by. Artists can now work more freely and independently. They have the right to sell their piece at a price they believe it deserves, set conditions before selling and much more. They also have the authority to rent and display their art as they please. It makes it also easier for them to distribute their art globally without limitations of their location. It all sounds great, but every digital advancement comes with its risks. NFTs are sold on digital trading platforms. Those operate similar to online shops. Vulnerabilities in these platforms are often caused by insufficient security considerations during the development phases. These oversights become the criminals’ target, once uncovered. They might either upload an artwork containing malicious code, steal people’s accounts or trade NFTs at a low price and resell them for profit. According to HKCERT, there have been several cases of cybersecurity breaches in the NFT area. One of the latest occurred in February 2022 via a phishing attack on OpenSea (an NFT trading platform). A cybercriminal sent out an email social engineering users into signing a contract and sending crypto assets to his wallet. The total amount stolen was $1.7 million. It seems that most of the attacks are of a phishing nature. But there has also been a security vulnerability found in one of the trading platforms, OpenSea. It is one of the biggest and most popular of its kind. The vulnerability allowed NFT art pieces to be sold for less than 1% of the price floor, which caused problems to creators. There are no limits to innovation and creativity. NFTs and digital art are proving that progress cannot be stopped. And it should not be. Progress is here to stay and develop. But where there is progress there are risks. ESET has been protecting progress and development since its establishment over 30 years ago. Security of digital users is priority number one; this means making sure that the progress we as humans have made is protected so we can safely step into the future. Where technology enables progress, ESET is here to protect it.
 

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

CyberLink Joins FIDO Alliance, an Open Industry Association for Authentication Standards

As a member of the FIDO Alliance, CyberLink commits to developing and supporting new biometrics-based authentication standards through FaceMe®, its facial recognition technology

TAIPEI, TAIWAN — April 21, 2022 — CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, announces it became an Associate Member of the FIDO Alliance, an open industry association focused on authentication standards and device attestation. CyberLink joins hundreds of industry players in developing and implementing new authentication specifications and standards, including facial recognition, that will better protect user privacy.

The FIDO Alliance is an industry association centered on advancing authentication standards to decrease dependence on passwords, which can be easily stolen or hacked. These new standards make authentication simpler for consumers to use and easier for service providers to manage. The Alliance’s rich membership comprises stakeholders that include government agencies, service providers, technology players and financial services industry leaders.

Technology industry member CyberLink is dedicated to providing encrypted biometric authentication through its FaceMe AI facial recognition solutions. With its facial recognition expertise, CyberLink is well-positioned to help the Alliance promote the adoption of biometric technologies that will deliver to our society more secure and convenient authentication alternatives to those with inherent flaws that are generally used today.

“We are excited to welcome our newest Associate Member CyberLink,” said Andrew Shikiar, Executive Director and CMO of the FIDO Alliance. “The FIDO vision of universal strong authentication promises better security, enhanced privacy, more commerce and expansion of services throughout digital industries. CyberLink’s addition to our Alliance supports our industry goal to make user authentication easier and safer for all parties.”

“As privacy and protection are increasingly critical imperatives of our society’s reliance on technology in every facet of life, users deserve stronger yet more intuitive authentication methods,” said Dr. Jau Huang, CEO of CyberLink. “I have no doubt that CyberLink’s biometrics authentication expertise, cemented through FaceMe, our facial recognition technology, will benefit the FIDO Alliance in establishing and providing safer authentication methods for end-users.”

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Network Maps with Pandora

The wait is finally over, and the seventh version of Pandora FMS, “Next Generation” has arrived to keep your networks in working order, and more. Now including UX monitoring, transaction monitoring, extra features and visual highlights, interactive network maps and events history. It’s difficult to imagine that there is a more powerful and complete monitoring software currently available. We’re excited to talk about the new network maps upgrades, but if you’d like to find out about the other new additions click here.

The glowing iridescent Pandora FMS Omni-Brain that directs the office hive-mind has instructed the developers to make changes to the network maps function, consolidating both Open and Enterprise versions into a single tool, all-in-one. It’s now possible to display network maps totally visually and dynamically, with greater interaction possibilities, and represent any kind of network topology, including manual L2 links. You can also view all and any sub-networks that your organization is running and/or maintaining, on- or off-site; create hierarchy relations allowing a greater level of topological detail than ever before.

Creating network maps

Network maps can be created from:

  • An agent group, if there are hierarchy relations between nodes in a group and these are going to be shown on the map.
  • A network mask, to define the boundaries of a sub-network.
  • Finally, one of the most usual ways, via self-discovery tasks. A reconnaissance task can be carried out to detect your network topology, respecting the connections and relations between nodes. At network interface level and layer 2 relations, information is presented automatically.

Keep in mind the relations between modules and agents to define the network topology you want to view.

In the following screenshot the available options for map-generating can be seen. You can select a group of agents (Group), a recon task (Recon task), or a network mask (CIDR IP mask).

network maps

If “Recon task” is selected the map design will show discovered nodes and any relations detected among them:

network maps

In a wider environment the perspective is going to be different: here you can see what a network map with more connected nodes would look like:

network maps

You can see how Pandora FMS connects to intermediary locations in the node diaspora. These locations usually correspond to routers, switches or access points.

Navigating network maps

Simpler than before, once a network map has been created you can move around it by simply dragging the mouse. Double-click or scroll to zoom in.

If you zoom in on a recon task-generated map you’ll see an image like the one below, allowing you to see relations between different map elements in more detail, including those at interface level.

network maps

It’s also easier to navigate map elements; simply drag and drop the elements, or scroll around the map at your leisure.

Editing maps

But there’s more; Pandora FMS 7’s maps are completely dynamic, meaning their default design can be modified, and elements displayed in the way that best suits the user. All intuitively and by simply using the mouse.

Double-click on any node on the map and you’ll see different edit options deployed, plus their relevant details. Likewise, you can now create, delete or modify relations between nodes and also their appearance.

network maps

To create a dependent relation between nodes or interfaces simply click on the node and create the relation by defining the parent and child element. You can also change the position of the node by dragging and dropping them on the map. If you need to move various nodes simultaneously, press “ctrl” and select the groups you want to move.

network maps

Right click on a node to deploy its options, see details or create a relation between two nodes at interface level, selecting the parent and child element respectively. Right click on a blank space to see the following options:

network maps

One of the most important labor-saving tools is the automatic generation of relations. This is possible thanks to self-discovery tasks, that allow relations between existing nodes to be automatically detected.

Last but not least, Pandora FMS 7 Next Generation includes the holding area. If you need to manually add new agents and relations to a pre-existing map, or if the recon task discovers new hosts, using the “refresh holding area” option will display nodes created or discovered subsequently in the “holding area”, and the original map will maintain its aesthetic, not being sullied with elements created a posteriori. Drag the new nodes out of the holding area to see its corresponding relations by clicking refresh.

In the Pandora FMS video “Network Maps” you can see everything we’ve explained in this article, and find out how to create, edit, and use a network map in a dynamic, graphic and easier way than in previous versions.



For more info visit https://pandorafms.com/ or our YouTube channel.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.