Skip to content

Fast and Simple eDiscovery with Backup and Recovery

What is eDiscovery?

Electronic discovery (sometimes known as eDiscovery, e-discovery) is one of those terms that means slightly different things in different contexts. 

For example, in legal spheres, eDiscovery involves identifying, preserving, collecting, processing, reviewing, and analyzing electronically stored information (ESI). The term also shows up in digital forensics, which focuses on identifying, preserving, collecting, analyzing, and reporting on digital information—clearly very similar, but not quite equivalent. 

In general, eDiscovery is the electronic aspect of identifying, collecting, and producing electronically stored information, such as emails, documents, databases, audio, and video files, and also includes metadata such as time-date stamps, file properties, and author and recipient information. In other words—regardless of the specific driving need—eDiscovery refers to finding and retrieving electronically stored ‘stuff’. 

Sounds easy enough, right? But as anyone who’s performed eDiscovery knows, today’s information-enabled organizations produce an awful lot of that stuff. In fact, the tendency for every single action we take to produce a digital trail led public-interest technologist Bruce Schneier to observe that “data is the exhaust of the information age” [Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, pg. 4].

Consequently, the sheer volume of electronically stored information makes eDiscovery a logistical challenge. Now, add in the time-specific nature of many requests—as in, needing to retrieve a file or record as it existed at a certain time on a certain date, a certain number of years ago—and the challenge becomes even greater. 

Beyond backup: enabling quick and simple eDiscovery

While the retention utilities included with software-as-a-service (SaaS) applications and cloud services may be adequate for retrieving something that’s a few weeks old, they certainly aren’t intended to provide—nor are they capable of providing—a substitute for long-term backup and the use cases it enables, including disaster recovery and eDiscovery.

To be resilient in the face of outages, compromises, and misconfigurations (or simply to find a crucial piece of information), your organization needs to be able to search and access SaaS and cloud data quickly and easily. Imagine the difference between a recovery mission aided by coordinates and a map versus a vague notion that someone is somewhere. 

Fortunately, with the right backup solution in place, eDiscovery really can be a breeze. Let’s look at a real-world example. 

ALPLA’s experience

With around 22,000 employees across 45 countries, ALPLA is one of the world’s leading manufacturers of high-quality plastic packaging.

The company’s rapid global expansion and cloud migration required an agile Microsoft 365 backup and recovery solution that could meet ALPLA’s need for 10-year data retention, and Keepit is proud to fulfill this need.

With other solutions, finding the right data to restore can be a tedious task, especially when very little information is provided by users—but Keepit’s unique and intelligent search features make it easy. In the words of Stefan Toefferl, Senior Data Center Engineer at ALPLA: “Keepit provides search filters that make eDiscovery simple, allowing us to quickly find and restore an exact file.”

One of the features most valued by ALPLA is the option to share a secure link to download a file, quickly getting the data back to the users. It’s features like this Public Links (40-second demo video) that makes Keepit more than just an ordinary backup and that helps our customers to become more efficient in their daily IT operations. Read more about the ALPLA customer case here.

Risk management in the digital age

The nature of backup and restoration is that you often don’t know when something might be needed: unexpected audits, legal discovery, cybersecurity incidents, or even an employee needing to recover something that they deleted years ago—these can all happen at any time.

That’s why truly managing risk requires a third-party backup solution that: 

  • Protects users and groups by providing snapshot-based restoration and timeline-based comparative analysis 
  • Preserves roles and permissions, with change tracking and straightforward comparisons 
  • Enables compliance and eDiscovery, for instance by capturing audit and sign-in logs, supporting log analysis, ensuring long-term retention, and enabling restoration to another site 
  • Accommodates growth into policies and devices by preserving device information and conditional access policies 

To help enterprises avoid disruption due to lost or inaccessible SaaS data, Keepit has architected a dedicated, vendor-neutral SaaS data backup solution that is resilient, secure, and easy to use.

You can see Keepit in action on our YouTube channel, or head to our services page to learn more about what we offer.  

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Why does Pandora FMS Open Source exist?

My name is Sancho and I am the person who started developing Pandora FMS in 2004. I want to tell you why Pandora FMS Open Source exists and why the community is so important to me.

We tell you why Pandora FMS Open Source exists

I always liked computers, I started with a ZX Spectrum and my first game was a hacked one. 

I had to teach myself how to peel a cable to plug the RCA video output into my father’s little TV. In fact, I think I’ve spent more time learning how to solder cables, copy games, and trick them than playing them themselves. 

In the 80s, technical knowledge was what someone could teach you, there was no Internet. And, as a child, I also didn’t have the resources to talk to expert adults. 

When the BBS (Bulletin Board Systems) arrived in Europe I was 14 years old. I still remember, with pristine clarity, the article from a computer magazine that filled my head with wonders: 

“Thousands of apps and games, access to information around the globe, messaging with users around the world…” 

I could learn anything!

And there were even many softwares that I could use without having to hack them!

When I connected to Fidonet in 1990 a world of possibilities opened up. 

I started talking to university students, set up a Fidonet node at home and had the need to do my first programs for my own BBS. It used RemoteAccess and FrontDoor, applications to give access to users and to connect to Fidonet through a modem over the telephone line.

I learned TurboPascal by reading documentation online and with photocopied books in English that other users lent me. 

A student at the University of Zaragoza lent me his credentials and I accessed the Internet for the first time through a RAS built on an HP-UX. 

I didn’t know what Unix was, but I had some commands written down to download things through FTP and then through Kermit to my computer. 

Along the way I had to stick with the AT commands and run head-on with the problem of being a 15-year-old boy who hires two phone lines for a BBS in a room of five square meters.

Antes de Pandora FMS Open Source

Thanks to other users I learned how to connect with the pair of tests in the phonebox of my house to call the US for free and download the McAfee antivirus updates, which I made available to everyone. 

I later learned how to connect to the internet through Compuserve using trial accounts that lasted 15 days. 

In short, I had an insatiable craving for knowledge

I loved to try, combine and dig

I used a lot of software that is now forgotten, such as Desqview or OS/2 Warp, to try to make my PC, made with second-hand parts, have the power to work in what became one of the largest BBS in Madrid (Edison BBS).  

All the software I developed (online games, time banks and things like that) I shared with other BBS Sysop, although my code was terrible. 

*Although no one cared much about the code because everything was to be done and the important thing was that it worked. 

Most of the programs I used had to be compiled by other people with more powerful PCs, my machine took days to compile and link the binaries.

Open Source Software Time

When I was in college, the Internet and ADSL came, as well as stacks of photocopied books. 

I tried programming video games and then my first job came. 

There I discovered that the Internet was a much, much bigger world than I had thought. Where there were servers and networks full of computers that people plugged into the web without notifying anyone, and lots of other stuff that appeared little by little… 

That’s when I discovered that it was necessary to bring order to so much chaos

I needed to know what was happening around me and monitor it. 

In each new work, that sense of chaos and lack of control grew. 

There did not seem to be a universal system to collect information and unify it, each had its applications, incompatible with the rest. Unlike the world of Star Trek where everything was compatible and universal.

That craving for knowledge and that habit of sharing at that time was not circumscribed to a philosophy, it did not have a name. It was a pure necessity: to share, learn, test, copy and modify.  

Some years later I discovered what the term Open Source meant. 

But it was just a name, the habit has been in me since I copied my first Game of Spectrum. 

*I once met in an interview an English developer older than me who had programmed one of those games, but that’s another story.

I spent many years learning thanks to others

Now I have to give back everything I have learned since my childhood. 

For me Open Source is not a license, it is not a political doctrine, it is not a fashion, it is a way of understanding life.

Sharing knowledge makes us better as individuals, as a society, and as professionals.

That is why Pandora FMS Open Source is not a “limited” version of the Enterprise version, no, the Open Source version has infinite documentation, in several languages, a changing documentation that includes everything, without secrets. 

The Open Source version not only has code, it has people who answer questions, guides and tutorials and has no limitations. 

It is made for that purpose, to bring order to chaos and allow anyone, programmer or not, to expand and improve it. Without having to share what you do, just let them use it however they want and for whatever they see fit.

There are many users, and companies, that like me when I was younger, cannot afford what an Enterprise license costs. 

I encourage them to use the Open Source version of Pandora FMS, not because it is free, but because you can learn without limit and can make Pandora FMS go far beyond what you think. 

Moreover, if they want, they can share their knowledge back and improve Pandora FMS. 

A code patch has the same value as a collection of icons or a Russian translation.

Where do we get the money?

Easy, not everyone has that craving for knowledge, to learn, to share. 

There are people who have their focus on managing problems, quickly and with professional help. 

They prefer an out-of-the-box tool that solves problems in hypercomplex and very specific environments. 

They still really want to learn and try, but they don’t have the time. Literally, their time is worth much more to their companies than Pandora FMS’s Enterprise license. 

Some Pandora FMS tools, such as policies, can be easily implemented using additional tools (or even your own scripts), but it takes time and knowledge. 

In the Enterprise version it is solved with a couple of mouse clicks.

The same goes for scalability. 

In the Enterprise version we support an active/passive HA system based on MySQL, any user can implement the same system as us, they can also build a Galley cluster to have almost infinite scalability, without the need to mount a Metaconsole (Enterprise). 

In fact we have some users who have been using Pandora FMS for many years with much larger environments than most of our Enterprise customers. 

I encourage you to see for yourself that the free spirit is still there! 

Call it OpenSource, free software, enter the license (GPL2), but above all: 

Learn, share and enjoy the process!

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

SCADAfence Named Winner of Three Prestigious InfoSec Awards During RSA Conference, 2022

SCADAfence Wins 3 Awards at RSA 2022 – 1. Most Innovative Governance, Risk and Compliance (GRC) 2. Next Gen ICS/SCADA Security  3. Most Innovative Internet of Things (IoT) Security  

San Francisco, California June 6, 2022 – SCADAfence, the global technology leader in OT & IoT cyber security, is proud to announce we have won the following awards from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine:

  • Most Innovative Governance, Risk and Compliance (GRC)
  • Next Gen ICS/SCADA Security
  • Most Innovative Internet of Things (IoT) Security

SCADAfence has won the award for Most Innovative Governance, Risk and Compliance (GRC) in recognition of the governance portal, which provides a multi-site regulatory and policy compliance framework. The portal provides companies with OT networks increased readiness and compliance for organizational policies and regulations. The SCADAfence governance portal is unique in the marketplace, that allows organizations to audit compliance based on real traffic data across multiple sites, and provides ready-to-use compliance dashboard and reports. SCADAfence is currently the only vendor who offers this technology.

Additionally, SCADAfence has won the award for Next Gen Next Gen ICS/SCADA Security since they have a unique Micro Granular Baseline technology. This technology learns every device granularly, per asset and per traffic characteristics. This unique technology provides the most accurate detection mechanism, and dramatically reduces false-positives without the need to reconfigure the baseline upon any changes. Customers get baselining results in hours vs weeks and it keeps getting smarter with advanced AI capabilities.

SCADAfence has also won the award for Most Innovative Internet of Things (IoT) Security, for their ability to provide comprehensive protection to complex industrial IIoT networks comprising thousands of devices from various manufacturers with multiple vulnerabilities.

“We’re thrilled to receive one of the most prestigious and coveted cybersecurity awards in the world from Cyber Defense Magazine” said Elad Ben-Meir, CEO of SCADAfence. “We knew the competition would be tough and fierce. We couldn’t be more pleased to be recognized as Innovators and leaders in the OT security industry.”

“SCADAfence embodies three major features the judges look for to become winners: understanding tomorrow’s threats, today, providing a cost-effective solution and innovating in unexpected ways that can help stop the next breach,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

We’re thrilled to be a part of  this coveted group of winners, located here: www.cyberdefenseawards.com/

About SCADAfence

SCADAfence is the global technology leader in OT & IoT cyber security. The SCADAfence platform enables organizations with complex OT networks to embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. The non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and governance with minimal false-positives. SCADAfence delivers proactive security and visibility to some of the world’s most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in manufacturing, building management and critical infrastructure industries to operate securely, reliably and efficiently. To learn more, go to http://www.scadafence.com

About CDM InfoSec Awards

This is Cyber Defense Magazine’s eighth year of honoring InfoSec innovators. Our submission requirements are for any startup, early stage, later stage or public companies in the INFORMATION SECURITY (INFOSEC) space who believe they have a unique and compelling value proposition for their product or service. Learn more at http://www.cyberdefenseawards.com

About the Judging

The judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company submitted materials on the website of each submission including but not limited to data sheets, white papers, product literature and other market variables. CDM has a flexible philosophy to find more innovative players with new and unique technologies, than the one with the most customers or money in the bank. CDM is always asking “What’s Next?” so we are looking for Next Generation InfoSec Solutions.

About Cyber Defense Magazine

With over 5 Million monthly readers and growing, and over 17,000 pages of searchable online infosec content, Cyber Defense Magazine and our sister magazine being announced after the show is the premier source of IT Security information. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry. We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conference. CDM is a proud member of the Cyber Defense Media Group, a division of Ingersoll Lockwood. Learn more about us at http://www.cyberdefensemagazine.com and visit http://www.cyberdefensetv.com and http://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

Leveraging Machine Learning for Behavior-Based Access Control

Enterprises today need to be able to interact dynamically and share information with the right people at the right time. As a result, organizations continually add more interconnected systems to their network to allow information to be readily accessible to those that need it.

However, while this interconnectedness is crucial for modern businesses to thrive, it also leaves them vulnerable to cyberattacks. And as enterprise environments become more complex, it’s becoming clear that traditional approaches to access control and threat monitoring simply aren’t sufficient in an increasingly severe cyber threat landscape. But some leading cybersecurity researchers think there could be a better way – Behavior-Based Access Control (BBAC).

What Is Behavior-Based Access Control (BBAC)?

In simple words, Behavior-Based Access Control is a way of analyzing actor behavior and assessing the trustworthiness of information in real-time using machine learning algorithms. But before we can truly understand BBAC, we first have to understand how enterprises tackle these issues today.

The Current State of Access Control

Companies currently use a combination of different technologies and methodologies to monitor their systems and grant access to information.

The way we approach access control has evolved considerably over time and now includes methods like role-based (RBAC), team-based (TMAC), attribute-based (ABAC), context-based (CBAC), and Situation-Based (SitBAC) access control, among others. But while these approaches do a decent job of locking down information to authorized users, they’re not without drawbacks.

Crucially, most current access control methods are grounded in static policies governed by access control rules. And this presents some significant security risks. For example, what happens if a bad actor steals an access card? Or if an insider performs illegitimate actions within their privilege realm? With traditional access control methods, bad actors can potentially go undetected for a considerable amount of time, exfiltrating data or wreaking havoc on the network.

Misuse of information should be a top priority for any modern enterprise. Still, the situation becomes especially serious for companies that deal with highly sensitive data, like those in the healthcare, finance, and government sectors. And companies in these sectors (or sufficiently large companies in any industry) are increasingly moving towards large-scale distributed systems, where various components are spread across multiple computers on a network. But these systems are often as complex as they are large. As a result, managing access control at scale quickly becomes unmanageable, and errors often slip through the net.

The Current State of Threat Monitoring

On the monitoring side, companies leverage technologies like the Snort or Bro network intrusion detection system or the Host-Based Intrusion Detection System (HIDS). And while these cybersecurity monitoring systems help safeguard corporate systems, they have several limitations. Namely, these types of solutions are typically signature-based and narrowly focused on specific parts of the overall systems. Signature-based monitoring can’t account for sophisticated attacks, like zero-day attacks, where signatures are yet unknown.

Lastly, while companies today often collect vast amounts of useful security such as server logs, they don’t analyze this data in real-time. Instead, this data is used for offline forensics, potentially days, weeks, or even months after a security event. By this time, attackers have likely already completed their nefarious activities and are long gone.

How BBAC Works

BBAC leverages machine learning to dynamically analyze actors’ intent and assess the trustworthiness of information within the system. But how?

BBAC uses a combination of rule-based behavior signatures with statistical learning methods to create a more robust and flexible way of assigning and managing trust. So, for example, BBAC can analyze patterns in the network and adjust access over time and as needed. It can also respond to potential security events in real-time. For example, the machine learning algorithm can create a baseline for expected user behavior by using historical and real-time data. Anything that falls outside of this could be considered suspicious and warrant immediate action, either manually or through automation.

This is contrary to how isolated traditional rule-based systems work, whereby once an actor gains access, they can essentially operate with impunity within their access rights.

The idea here is that BBAC can diminish the risk of misplaced trust and deter the abuse of authorized privileges by continuously monitoring behavior. It analyzes observable behaviors on several different layers in real-time to check for intricate patterns that would otherwise go unnoticed. And by employing this type of sophisticated analysis, IT teams eliminate the need for draconian deny rules at specific layers in the system.

At the same time, user-based BBAC can help alleviate some of the problems companies face when defining access. For example, let’s say a particular policy is set up to deny access to specific files if a user isn’t in an approved location. The machine learning model might detect that users continually request this type of access and alert the security team. Armed with this information, businesses can adjust their policies to allow more flexibility within certain contexts.

The Nuts & Bolts of BBAC

So, what’s actually going on here? How does this machine learning thing really work? Machine learning is all about getting computers to “learn” and make decisions without explicit instructions. And for a machine-learning algorithm to learn, it needs to process vast amounts of data.

For BBAC, the significant data comes in the form of network flow information (TCP and UDP), Higher-level transport protocols like (HTTP, XMPP, and SMTP), audit records (like those produced by web and DNS servers), and application-level content like PDF documents or email and chat messages.

So, that’s the data that feeds the model, but what about the model itself? BBAC models are still in their infancy, but current examples use a combination of supervised and unsupervised machine learning to achieve full BBAC functionality.

Supervised learning leverages labeled datasets designed to train or supervise the algorithm in classifying data and accurately predicting outcomes. So, for example, the algorithm becomes competent at separating data into specific categories, like expected network traffic and unexpected network traffic. This is called classification. The regression supervised learning method can also be used to understand the relationship between dependent and independent variables, which can be useful for predicting outcomes using numerical data.

By contrast, unsupervised learning uses unlabeled datasets and allows the algorithm to discover hidden patterns without human intervention.

Wrapping Up

Behavior-based access control has enormous potential to make enterprise environments more secure, flexible, and responsive. And as we progress through the 2020s, we expect to see more research in this area and likely adoption of this technology by reputable firms. The Department of Defense is actively interested in BBAC, so that should tell you something about where this approach is heading!

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

The Good News and Bad News About 0-Day Attacks

The team at Google Project Zero deserves a lot more recognition than they receive. Since 2014, they have been systematically studying 0-days (e.g. previously unknown vulnerabilities) to understand this unique cyber threat in depth. They research where 0-days are being found, how hackers are exploiting them, and what trends are developing. And, on an annual basis, they compile their findings into a comprehensive and prescriptive report. The latest report is out, covering attacks throughout 2021, and it has information everyone should be aware of – both good news and bad news.

Bad News – Attacks Have Increased Significantly

There were 58 0-days detected and disclosed in the wild in 2021, the most the Google team has ever recorded. This number is more than double the previous high of 28. Even more alarming, it’s a substantial increase over the 2020 total of 25 0-days. These numbers leave little doubt that 0-days remain a serious threat that could be getting (much) worse than ever before. The 2022 totals seem certain to set new records.

Good News – Detection and Disclosure are Getting Better

The alarming uptick in 0-days could actually be a positive sign according to the Google researchers. They attribute the 2021 totals to improvements in detection – we are catching more 0-days than we could before. They also credit a culture shift around disclosing 0-days. Instead of hiding these flaws away, as was often the case in the past, companies are being upfront about them, pushing the overall total upwards. This would suggest the 0-day problem is not necessarily getting worse but rather we are starting to see its true scope and scale. That’s progress.

Good News – 0-Days are in a Rut

Last year’s 0-days all share a notable feature: they leverage the same attack surfaces, bug patterns, and exploit techniques that we have seen in the past. Given the large annual total, we would expect to see a number of innovative, unique, and unknown tactics in play. That wasn’t the case – only two 0-days in 2021 were considered novel by the Google team. By and large, recent 0-days look a lot like the ones that came before them, which could suggest that hackers lack either the means or skills to push them in new directions.

Bad News – Old Exploits Remain Potent

Another, arguably more valid way to interpret the lack of innovation in 0-days is that it’s unnecessary. Existing methods still work, so hackers have little incentive to devise new ones. It has been the goal of developers and cyber defenders to “make 0-days harder” for years now, but that effort seems to have accomplished relatively little, allowing hackers to return to the same well instead of making them return to the drawing board. The huge number of familiar 0-days in 2021 suggests that while detection and disclosure are improving, actual defenses are not, which raises troubling (but important) questions about how we approach this issue.

Preparing for the Future of 0-Days

The Google report makes clear that we have made some progress on 0-days but still have much left to do. The question is how we get from record high 0-days to record lows?

Above all, it will take cooperation, communication, and collaboration among stakeholders inside and outside cybersecurity. 0-days are a complicated beast, both to prevent and remediate, that exceeds what any team, department, or company can address on its own. A culture of mutual defense and shared responsibility has an obvious advantage: it gives the defenders vastly more resources than the attackers could ever muster.

But it all depends on bringing together different ideas, experiences, and perspectives, which is where the vsociety comes in. This social community provides a space for voices from across cybersecurity and the larger tech landscape to unite around issues like 0-days and so much more. The conversation starts here.

Photo by Adi Goldstein

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About vRx
vRx is a consolidated vulnerability management platform that protects assets in real time. Its rich, integrated features efficiently pinpoint and remediate the largest risks to your cyber infrastructure. Resolve the most pressing threats with efficient automation features and precise contextual analysis.

3 Years On, Has SASE Lived Up to the Hype?

First coined by research firm Gartner in 2019, SASE has become a hot topic in the IT industry in just a few short years. Undoubtedly accelerated by the COVID-19 pandemic, SASE has captured the attention of IT professionals in the network and security landscape as they prepare for an increasingly cloud-centric way of working. 

However, with so much hype surrounding SASE, many people wonder whether it lives up to its promise to future-proof corporate networks. Or, in other words, is the hype actually overhype? And does SASE deliver the simplified but secure networking reality we’ve all been waiting for? Let’s get into it. 

What is SASE?

Secure access service edge (SASE) is a framework for network architecture that combines VPN and SD-WAN capabilities with cloud-native security functions to securely connect users, systems, and endpoints to applications and services anywhere. 

It converges network security solutions like secure web gateways (SWG), cloud access security brokers (CASB), firewall as a service (FWaaS), and zero-trust network access (ZTNA) with SD-WAN to create a unified, cloud-native service. But why has it garnered so much attention?

What Problems Does SASE Promise to Address?

In the past, companies would implement network access with siloed point solutions that were often complex, costly, and difficult to manage. This hurt IT agility and prevented enterprises from scaling their networks effectively and securely. And this issue has only become more challenging as companies shift from on-premise to the cloud. 

SASE offers a solution to these problems and more. It promises to simplify network security in the cloud, improve efficiency and security, and reduce costs. For example, with SASE, organizations can fine-tune network access control (NAC) and secure seamless access for users, achieve real-time application optimization, apply consistent security policies, enable more remote and mobile access, and more. 

In simple words, SASE promises a way to future-proof your business. If you suddenly experience a surge in traffic or decide it’s time to expand into other regions, you can rely on SASE to keep up. Because it’s a cloud-based distributed service, you can add or remove capabilities as needed and ready your network at breakneck speed, all without purchasing additional software and managing new contracts. 

Why SASE Is Failing To Live Up to the Hype

Despite the many promises SASE offers, many companies are struggling to realize these benefits for several reasons. Successfully adopting and implementing SASE presents many challenges for organizations. And at the same time, many security vendors don’t yet have the skills or experience with SASE to deliver on its promises. Or in other words, SASE can work brilliantly when done well, but more often than not, this isn’t happening. 

The Hurdles to SASE Realization

A Paradigm Shift

Some people argue that SASE is nothing new but rather a consolidation of various security tools already in existence. However, while this statement has some truth, SASE requires a paradigm shift in organizational mindset. SASE shifts security from a site-centric model to a more user-centric and contextual-based approach. This means security teams have to rethink how they view the network. 

Additionally, consolidating these tools under a unified solution means companies need to break down silos between networking and security teams. These teams need to collaborate, and as a result, roles may need to be more flexible. 

When organizations fail to embrace these changes, they don’t realize the true potential of SASE. 

A Confusing Vendor Ecosystem

Security vendors are all too aware of SASE’s hype and leverage this with non-stop marketing. Unfortunately, this can leave many companies confused about the tools and methodologies they need to help their business stay competitive. 

And even when an organization decides on a specific set of tools to adopt, it’s not as simple as choosing a vendor that offers these tools. The organization also needs to look closely at its existing tech stack for duplicative capabilities. Failing to do this can lead to tool sprawl – where unnecessary purchasing of new IT tools leads to redundancy, wasteful spending, and increased system complexity. 

And then there’s the risk of vendor lock-in. Adopting SASE is an excellent way for companies undergoing cloud transformation to simplify the security process and cover many compliance requirements. However, companies also have to accept that they’re getting all capabilities from one supplier and that this comes with a cost. If the chosen SASE product becomes outdated, switching to a new one might not be straightforward. 

A Young SASE Market

Legacy hardware vendors are increasingly offering SASE architecture to rise to the current demand. However, with their lack of expertise, these vendors might not be the best option. For example, they could lack the cloud-native mindset to bring the SASE architecture to life, resulting in cost and performance problems. Also, traditional vendors often lack the experience in evaluating context, a core principle of SASE, limiting their ability to make context-aware decisions. And lastly, some solutions might come up short because the providers only have experience in either networking or security, but not both. 

The Future of SASE

There’s no doubt that as the current IT landscape continues to mature, there will be an increased need for simplified network and security management. And we see this reflected in attitudes toward SASE. For example, Gartner predicts that by 2025, 60% of all enterprises will have clear strategies to adopt SASE. 

But how quickly SASE will become the new norm is still up for debate. Today, many companies are shifting a significant proportion of their environment to the cloud and outsourcing SD-WAN management. At the same time, they’re choosing to maintain control over their security services internally. As a result, these companies may not be in a rush to move to the SASE approach because their current setup works well enough. 

We could also see SASE adoption massively boosted if the major cloud suppliers decide to incorporate SASE services in their licensing models. Still, we’ll have to wait to see if this becomes a reality. 

As it stands today, the future of SASE looks promising, but it’s not set in stone. 

Wrapping Up

SASE is a powerful concept, but it’s still in its infancy. This means organizations and vendors are still ironing out the issues that come with new technologies. And where there’s new tech, there’s always resistance. However, resistance isn’t always a bad thing – modern cybersecurity encourages us to do away with implicit trust and be cautious and deliberate in our actions.

Network security should be taken seriously, but that doesn’t mean it needs to be hard work. This is where Portnox comes in. We offer robust and affordable cloud-native network access control (NAC) solutions for companies of any size. Get in touch to learn how we can future-proof your network. 

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

What’s new Pandora FMS NG LTS Akira

Let’s check out together the features and improvements related to Pandora FMS new release: Pandora FMS 762. Remember that this is an LTS, we only have two of them a year, they are stable.

What’s new in Pandora FMS latest release, Pandora FMS 762

CHANGES AND IMPROVEMENTS

Improved the PostgreSQL plugin to be able to be executed as a server plugin

Enterprise plugin

Through this plugin you may monitor postgreSQL databases through custom queries remotely

Go to the library 

New OpenShift plugin

Enterprise plugin

With this plugin you may monitor your openshift nodes and pods. Which can be useful to analyze their performance.

Go to the library

New WebSphere plugin

Enterprise plugin

Thanks to this plugin you may monitor each websphere application server, being able to see data from the threadpool or free memory for example.

Go to the library

New Veeam Backup plugin

Open plugin

Through this plugin you may see data from your Veeam Backup environment such as the last backup made or the jobs.

Go to the library

New InfluxDB plugin

Enterprise plugin

With this plugin you may monitor InfluxDB databases to see their performance.

Go to the library

New Redmine plugin

Enterprise plugin

By means of this plugin you can create, edit or delete tickets in Redmine with Pandora FMS.

Go to the library

New Zammad plugin

Enterprise plugin

With this plugin you can create, edit or delete tickets in Zammad with Pandora FMS.

Go to the library

Resources

Download the release note

Pandora FMS plugin library

Foro oficial Pandora FMS

I want to learn more!

Our Trial

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

HVZ Rivierenland onboards Awingu to enable secure remote access to specific applications and files for all users on any device, anywhere

Nederlandstalige versie: zie onder

The Fire Brigade Zone Rivierenland (Zone Antwerp 2) is one of the 35 Belgian and one of the five Antwerp rescue zones. The zone officially started operating on 1 January 2015 and provides fire and medical assistance (ambulance) in the southwest of the province of Antwerp.

The Fire Brigade Zone Rivierenland comprises 19 municipalities that together represent a population of approximately 420,000. The total surface of the service area covers approximately 570 km². The Zone Rivierenland also borders on other ones like Antwerp, Rand, Kempen, East Flemish Brabant, Flemish Brabant West, East and Waasland.

Which applications are used via Awingu?

The IT department of the Fire Brigade Squad Rivierenland explains which applications are made available through Awingu in a safe way, based on the profile of the user.

ABIFIRE

For many zones ABIFIRE is the centre of daily operations. It contains modules for intervention reports, privacy-related personnel data, construction advice, prevention reports, material management and much more. If this package is not available for technical or security reasons, the operation of the zone practically stops.

For Rivierenland, it was therefore an absolute necessity to secure ABIFIRE even more. For them it was a minimum requirement that they could secure the login procedure with multi-factor authentication. As this is also built into Awingu, this was the first checkbox that could be ticked.

3P

The 3P package is a mandatory tool of the Government in procurement procedures. This application is also made available in the Awingu Virtual Workspace because the 3P licence only works with pre-agreed domain credentials.

BLUEBEAM

As a CAD programme, Bluebeam is a widely used tool within rescue districts to draw or modify plans. At HVZ Rivierenland this application runs on a separate server.

“Before Awingu was brought into use, this program was installed locally on each device. This required a lot of maintenance and follow-up, which can now be done centrally at the server level due to the limited IT team. Also, the performance for those who work remotely through Awingu is optimal with this CAD application. Thanks to Awingu, we were able to tick 2 more boxes.”

HERMES

The old, well-known accounting program is no longer current or in use at the zone. However, there is still a need to be able to access certain data here. Awingu as secure gateway brings here the perfect balance between security and user experience. Also, the impact of the irregular use of Hermes is nil, since the Awingu licenses are based on a concurrent model and not on a named basis. Another thing HVZ Rivierenland could tick off thanks to Awingu!

MERCURIUS

The Mercurius billing software is not only used by HVZ Rivierenland, but also by various local police zones. (Today, more than 60 police zones in Belgium work with Awingu). Within the HVZ, the need arose to build in some extra security. For example, there was no MFA foreseen for the internally hosted, web-based application, making the security risk too high. By putting this application behind Awingu, with MFA and a protocol switch on the Awingu appliance, a direct connection between the end user device and the server backend environment is avoided.

DIV

The DIV of the Flemish Government can now also be accessed directly, whereas previously the IT service had to push an Internet shortcut in each user profile.

REMOTE DESKTOP

To securely access your own servers from the outside, a secure connection is made via Awingu’s remote desktop functionality. In addition, every login and activity can be traced in the Awingu dashboard. Something that has proven to be very useful. This was the case when a certain anti-virus program caused another program to close down promptly. Of course, this also happened to be on a non-managed device belonging to one of the volunteers who work for the zone… Via the track & trace in Awingu, this issue could be detected and resolved fairly quickly, says the IT department as an anecdote.

The effect of Awingu at HVZ Rivierenland

We can conclude that the users are satisfied and the IT team even more so because, compared to the former Citrix use, there has been a strong simplification with Awingu.

“Volunteers who do not use a managed device from the zone, can simply use their own device to access the necessary applications as well as the file share that was integrated after the switch to Awingu. On top of that, nothing needs to be installed on the devices themselves, because Awingu is completely browser-based. This saves our IT admins time for configuration and maintenance, but also significantly reduces the cost for the type of devices.” The only thing that still needs to be installed is the remote application helper when using a Smartcard (eID).

In terms of security, huge steps have been taken with the introduction of just one tool, Awingu:

  • MFA is built in for free
  • All data processed through the browser is encrypted
  • A complete audit of everything is available
  • Even screen recording is used in some cases (especially when suppliers need access to the network).

The fact that HVZ East-Flemish Brabant and West-Flemish Brabant have also started working with Awingu, shows that HVZ Rivierenland is not alone and has made the right decision with this future proof solution.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

Best Practices for Data Theft Prevention

It is important to emphasize that, with the digital transformation and the increase in the use of digital media identified in recent years, there has also been a spike in the practice of cybercrime, that is, those crimes that occur through virtual means.

These crimes are usually performed by cybercriminals, who are holders of technical knowledge about internal computer systems and electronic devices, programs, and networks.

Cybercrime can occur in different ways and for different reasons. In general, users who become victims end up having their information and data stolen or their accounts hacked by criminals, which often results in episodes that can bring disastrous and immense damage to the victims.

Therefore, it is ideal to establish preventive security measures before attacks occur. There are currently many ways to ensure greater protection of your data and information.

Keep reading the article and learn more about the problem of data theft and what should be done as preventive measures.

The Biggest Data Thefts of Recent Years and the Current Cyber Scenario

We all know that cyber vulnerabilities are not a current issue. However, with the evolution of technology and virtualization growing in all areas of society, cybercrime becomes more and more frequent, creating a critical problem that deserves a lot of attention from the digital security industry. 

One of the biggest challenges is to keep up with the evolution of these crimes, because as technology advances, crimes become increasingly strategic and sophisticated, requiring even more technological advances and security efforts, in addition to repeating a cycle that is difficult to prevent.

According to data from FortiGuard Labs, the year 2020 had 41 billion attempts of cyberattacks in Latin America. The good news is that while these attempts are taking place, the cybersecurity industry has also worked hard and strengthened itself to ensure as much security as possible for digital media and to weaken this cycle of attacks.

To get a sense of the scale of this problem, here is a summary of the top 5 data thefts in recent years.

Solar Winds: The Biggest and Most Sophisticated Attack in History

In 2020, Solar Winds, an information infrastructure company, suffered what can be considered, according to Microsoft’s President Brad Smith, as “the biggest and most sophisticated attack the world has ever seen”. This is because several tactics and techniques of cyber invasion and espionage were employed. 

Cybercriminals have inserted malicious software into Solar Winds’ monitoring software update that has been sent to up to 18,000 customers. These include Microsoft companies and the US Departments of Energy, Justice, and Nuclear Safety. But it was FireEye, one of the Solar Winds’ client companies, the first victim to identify the attack. 

In the Microsoft attack alone, according to its president, at least a thousand engineers took part. Ongoing investigations indicate that the operation is very complex and surprising even for specialists, as it combines very advanced and stealthy techniques, which have bypassed the radar of the most experienced security specialists. This made everyone apprehensive about a critical vulnerability in the technology infrastructure.

Colossal DDoS Attack Against Dyn

Dyn, an American company of DNS (Domain Name System) services, has suffered a DDoS attack, which, in general, is a type of attack that intensifies data traffic and overloads a certain server, making it unavailable to users.

This attack caused a system crash for all the company’s customers in 2016, who had virtual newspapers and magazines from the United States and other large companies among them: Amazon, Netflix, PayPal, Spotify, Tumblr, Twitter, GitHub, Xbox Live, and PlayStation Network. 

It was an event known as “The American Internet Blackout”, one of the biggest DDoS attacks in recent times.

ASUS Automatic Updates

One of the largest laptop manufacturers in the world, ASUS, was the target of a cybercriminal attack in 2018, with an automatic software update that infected nearly 1 million users worldwide. 

The attack targeted 600 computers, but the malware spread and reached more users. As the attackers used the company’s legitimate security certificate during the action, it was almost impossible to raise suspicion.

This type of crime can increase users’ distrust and lead them to avoid machine upgrades, which can raise the level of vulnerabilities and cause even bigger problems. 

 STJ: Great Cyberattack in Brazil

Brazil is one of the countries with the highest number of users connected to the Internet, and according to the Internet Security Threat Report, released in 2019, the country occupies third place in the ranking of cyberattack attempts, fourth in bot attacks, and seventh in crypto-jacking.

As might be expected, government agencies are not left out of vulnerability to cybercrime. In Brazil, the biggest data attack involved the STJ (Supreme Court of Justice), a target of the ransomware action, which invaded more than 1,200 servers of the institution and destroyed the backups on the machines. 

On the scale of this attack, Marta Schuh, Director of Cyber Insurance at the international broker Marsh, stated that: “It was like the STJ databases could be placed inside an incinerator.” As expected, the criminals offered to ransom the information in exchange for a sum of money.

Leak of Sensitive Data from Over 100 Million Americans

Paige A. Thompson, a former Amazon employee, was responsible for hacking the database of Capital One, a US financial institution, compromising the data of more than 100 million Americans and 6 million Canadians by obtaining access to personal data of credit card requests. 

Although the affected information does not contain the users’ credit card numbers, as Capital One claimed, the damage will cost around $150 million to boost the institution’s digital security.

What Should Be Done to Remedy the Theft of Information and Data?

When an organization experiences a security incident, such as cybercrime, it needs to act promptly and quickly. We are not always prepared to deal with situations like these, but it is necessary to remain calm and take action.

Of course, actions should be taken according to the specific type of attack that took place and what was actually stolen or hacked into.

Therefore, carefully read the possibilities listed below on which procedures should be taken in these cases and see which ones fit best for you.

Identify the Action of the Intruders

It is important to find out how the criminal action took place and what data was disclosed. 

Thus, the procedure must take place so that the necessary measures are taken in order to restrain the results of the crime and prevent further invasions.

You can start an investigation through companies specializing in cybercrime and hard evidence.

Look for Evidence of Crime

When becoming a victim of a cybercrime, if possible, you must record the evidence of the crime.

In this sense, it is worth noting that the most correct and secure means is through specific solutions that allow the recording of all actions performed in the environment.

This can even assist in the incident remediation process, reducing operational and downtime costs.

Change Your Passwords Immediately

Another important action to be taken if you have suffered a cyberattack in which there was data theft, and also one of the ways to minimize the problem, is the immediate change of your passwords, whether for emails, networks that may be related to the theft, or for your systems.

This will prevent criminals from continuing to develop other types of damage that can be done by using your stolen data.

Check the Backup of Your Files

The use of software that backs up your information and data automatically and efficiently is a preventive measure that can help a lot in these moments.

If you have already performed this procedure, the chance of recovering your information will be much greater, so check the backup of your files and see if you can recover them.

Communicate About Information Leaks

If the information that was leaked is related to other individuals, such as employees or consumers, they must be informed about what happened and about the measures being taken about the case.

This behavior is an ethical measure, which must be carried out clearly and objectively.

Analyze the Weaknesses that Made the Invasion and Theft of Your Data Possible and Invest in Security

In addition to looking for those responsible for information leaks, it is important to recognize the limitations and deficiencies that allowed intruders access to your system.

When recognizing them, it is essential to take appropriate action so that future losses are avoided.

But What Can You Do to Prevent Data and Information Theft in Your Company?

Now that we have already talked extensively about the current cybercrime scenario involving data theft and what should be done when these incidents happen, it is time to present the main measures to prevent data theft.

One of the worst scenarios involving cyber incidents is just reacting when they happen. The best cybersecurity frameworks encourage prevention practices and the development of secure processes and projects from the beginning.

So, learn what you can do today to improve your cyber posture in the face of information theft.

Invest in Privileged Credential Management

To ensure information security, you need to develop prevention practices regularly, such as managing your company’s privileged accounts.

A solution that does not provide this function leaves the security of your information with many loopholes, which makes a cyberattack possible.

With this capability, your company can manage all active privileged credentials and confirm the privilege level of each one, verifying it is appropriate for such users to have access to certain environments, in addition to being able to revoke credentials that are no longer required, such as from former employees.

To avoid the risk of information being leaked, besides verifying access to privileged credentials, it is important to properly manage it through the automatic change of passwords.

Prioritize Strong Backups and Passwords

This practice is very simple and, at the same time, essential. Through a Privileged Access Management (PAM) solution, one can implement effective credential management and make associated passwords available to users, however, it is necessary to have some kind of guarantee that all privileged credentials have strong passwords, difficult to be broken with the use of malicious software.

The ideal is to guide the user to create a complex password that mixes upper and lower case letters, numbers, and special characters, with at least 8 characters.

In addition, the backup appears as one of the last options for data protection, which guarantees that even with leaked and/or deleted information, the company has access to all elements protected by the privileged access management solution.

Implement Two-Factor Authentication Mechanisms

The main solutions on the market require two-factor authentication from the user, usually through an OTP (One-Time Password). It is also possible to send an SMS or an email with a confirmation code for someone to be able to use the privileged credential.

This type of capability makes it difficult for unauthorized people to use the privileged user’s credentials.

The use of multifactor authentication (MFA) comes as a tool to prevent attacks from cybercriminals seeking to get hold of important information, such as credentials and passwords. MFA brings greater security to user data, through additional authentication, as well as, of course, the already known password.

Have Emergency Access

If any kind of security incident occurs that puts your company at risk, it is necessary to rely on one last capability of the security system, something like “glass breaking”. In the event of any type of failure or even a cyberattack, the person responsible for data security has the autonomy to remove privileged credentials through a dedicated backup file.

Finally, the access report is essential so that the person in charge has a broad view of the actions carried out through the privileged sessions, in order to allow the identification of security gaps and possible points for improvement.

PAM As a Way to Prevent Data Theft

A PAM solution is one of the main ways to guarantee the protection of a company’s confidential information and that all activities are tracked and audited.

Privileged Access Management, also called Privileged Identity Management, enables organizations to protect their privileged credentials. In addition, PAM ensures the effectiveness of least privilege policies by reducing attack vectors and possible data leaks.

Gartner believes that a PAM solution helps organizations securely provide privileged access to critical assets and meet compliance requirements by managing and monitoring privileged access and accounts. 

Basically, a PAM solution works as a secure credential repository for devices installed in the environment. Based on the management of user privileges, one can allow users to access only the data required for them to perform their activities. Thus, the information security team can configure user access profiles, avoiding improper access to systems and data.

Learn About the senhasegura Solution

In order to avoid data theft and traceability of actions in networks, databases, servers, and devices, senhasegura works to ensure digital sovereignty for institutions in several areas.

The solution is recommended for companies in the following scenarios:

  • Companies with more than 10 users.
  • Companies that received points of attention in auditing.
  • Companies that must comply with cybersecurity rules and regulations.
  • Companies that want to implement the best security practices.
  • Companies that have suffered a security incident.
  • Companies that need to reduce operating costs.

senhasegura allows companies to implement the most strict and complex controls on access to privileged credentials in an automated and centralized manner, protecting the IT infrastructure from data breaches and potential compliance breaches.

It is also ready to meet business and market compliance requirements such as LGPD, GDPR, PCI DSS, SOX, NIST, HIPAA, ISO 27001, and ISA 62443.

Did you like our article and would like to have more details? senhasegura strives to ensure the sovereignty of companies’ actions and privileged information. To do so, we work against data theft and through traceability of administrator actions on networks, servers, databases, and a multitude of devices through a PAM solution.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

CyberLink Releases FaceMe® TimeClock and Smart Retail, Expands Its Facial Recognition Offering

Leveraging the FaceMe Platform’s APIs, this new generation of applications expands the world’s leading facial recognition engine into targeted use case- or industry-specific solutions

TAIPEI, TAIWAN — June 09, 2022 — CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, announces the introduction of its first use case-specific solutions designed to augment functionalities, improve accuracy, and boost the performance of error-prone or labor-intensive workflows. FaceMe TimeClock addresses the shortfalls of tracking time and attendance, such as the potential for card swapping or theft and bottlenecks at the beginning and end of workers’ shifts, while automatically and accurately updating attendance records. FaceMe Smart Retail can entirely automate visitor statistics collection and analysis, simultaneously preserving individuals’ anonymity and ensuring other ethical considerations are respected 100% of the time. Both leveraging the FaceMe Platform’s APIs, these ready-to-deploy and easy-to-use cloud-based solutions bring one of the world’s most advanced facial recognition technology into everyday business applications.

Each time an employee comes to work and leaves, FaceMe TimeClock matches a live view of their face to an encrypted template consisting of otherwise unusable facial vectors, accurately tracking their attendance. The solution comes with a complete set of administrative tools to enroll employees, manage databases, and monitor attendance at the group and individual levels. Administrators can check individual attendance reports to understand trends and make more informed decisions. It is a perfect fit for smart offices and factories, retail, hospitality, and more.

FaceMe Smart Retail is an analytics solution that doesn’t identify individuals but uses FaceMe’s ability to measure in-store traffic and estimate key parameters such as age, gender, and facial expression. It aggregates data and enables comprehensive analyses to derive valuable insights on visitors and how to enhance their future experiences. Store owners can access the dashboard, perform analysis, and run reports from any browser. The intuitive interface makes it easy to manage cameras from multiple locations and accommodate deployments of any scale. FaceMe Smart Retail is the ideal tool for operators who care about customer service, especially in the retail and hospitality industry, which thrives on an accurate understanding of visitors’ needs, preferences, and trends.

“Facial recognition is going mainstream. Major improvements in hardware performance and affordability, combined with more precise, AI-powered models, have enabled the technology’s deployment into more valuable use cases while driving society’s fast-growing adoption,” said Dr. Jau Huang, CEO of CyberLink. “We are proud to introduce FaceMe TimeClock and FaceMe Smart Retail, our first use case-specific solutions, to the market and expand the realm of possibilities for facial recognition technology, confirming its invaluable potential.”

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com