Skip to content

I am not sorry for wasting your time: Lessons to learn from Texonto PSYOPs targeting Ukraine

 

Since the invasion started, ESET has both investigated and prevented a significant number of attacks launched by Russia-aligned groups against Ukraine.

In 1998, one of the most annoying things IT-equipped employees needed to deal with, SPAM, made it into the New Oxford Dictionary of English. Prior to 1998, the word “spam” only referenced a variety of processed canned meat produced by the Hormel Foods Corporation.

“It’s sort of unfortunate that we’ve gotten this far,” John Mozena, then board member of the U.S.-based Coalition Against Unsolicited Commercial Email commented in the news. And that was just the beginning. More than 20 years later, spam messages accounted for over 45 percent of 333 billion emails sent and received daily around the world in 2022.

The latest ESET research about Operation Texonto highlights a scheme targeting Ukrainian citizens with a combination of spam and phishing messages. This situation reminds us that spam not only frustrates employees, but can also serve as a vehicle for disinformation, psychological operations, and data theft attempts against businesses and institutions.

These cyber incidents may look simple, but just the sheer volume of unsolicited emails coming on a daily basis can be so overwhelming that the situation begs for a professional solution. Especially now, that businesses are moving to the cloud.

After the full-scale invasion of Ukraine two years ago, all critical institutions and operators of critical infrastructure in Ukraine were offered a free upgrade to ESET’s highest-grade solution. When it comes to spam and phishing, for example, ESET Cloud Office Security (ECOS) offers broad coverage with advanced protection for Microsoft 365 and Google Workspace applications.

Constant pressure

The use of spam as a popular term for unsolicited email, comes from an episode of the 1970s TV show Monty Python’s Flying Circus. In one episode, a couple tries to order food in a cafe, but every course of the meal contains spam. To make things even more irritating, a group of Vikings sitting nearby are passionately singing about spam. The word “spam” is uttered at least 132 times.

While Monty Python was clearly trying to mock annoying things in people’s lives, their “spam” numbers were no match for the number of today’s spam emails. We are talking about a staggering 150 billion unsolicited emails sent and received daily. Well, that’s annoying, right?

With this influx of emails, it is no surprise that 2022 data showed that up to 80 person-hours a year ago in vain just with filtering spam messages.

Moreover, this problem is not only about getting rid of unwanted emails but also avoiding being caught on the hooks of phishing attacks, the most common type of cyberthreat.

According to the latest government survey in the United Kingdom, one third of businesses identified a data breach in 2022, and 79 percent of those attacks were phishing. Similarly, in the US, the FBI received more than 300,000 phishing complaints in 2022, making it to the top of the bureau’s cybercrime victim list. To compare, personal data breach was the second most reported cybercrime with almost 59,000 victims.

ESET Telemetry confirms that trend. According to the latest ESET H2 2023 Threat Report, spam has increased by 6 percent and malicious HTML files sending victims to phishing websites (HTML/Phishing.Agent trojan) are still by far the most detected email threat. Overall, these email attacks comprise almost a quarter (23.4 percent) of all cyber threats detected by ESET.

According to the latest government survey in the United Kingdom, one third of businesses identified a data breach during 2022, and 79% percent of those attacks were phishing. Similarly, in the US, the FBI received more than 300,000 phishing complaints in 2022, making it to the top of the bureau’s cybercrime victim list. To compare, personal data breach was the second most reported cybercrime with almost 59,000 victims.

ESET Telemetry confirms the trend. According to the latest ESET H2 2023 Threat Report, spam has increased by 6 percent and malicious HTML files sending victims to phishing websites (HTML/Phishing.Agent trojan) are still by far the most detected email threat. Overall, these email attacks comprise almost a quarter (23.4%) of all cyber threats detected by ESET.

Lessons from Ukraine

Operation Texonto in Ukraine shows what such a campaign combining spam emails and phishing can look like.

At the end of 2023, Russia-aligned threat actors tried to demoralize Ukrainian citizens with two waves of spam emails. Additionally, ESET detected a spear phishing campaign conducted by the same group and within the same time period.

Employees working at a major Ukrainian defense company received a phishing email in October 2023, purportedly coming from their IT department.

It was an old-fashioned but still popular phishing message claiming that the employee’s email account was about to expire and they needed to fill in their login details on a given website to keep the account alive. The attached link sent victims to a phishing website posing as a legitimate Microsoft login page, but in reality, trying to steal credentials for Microsoft Office 365 accounts.

To deal with such threats, companies need to not only focus on employee awareness training but also have reliable anti-spam and anti-phishing protection.

Mitigating the threat

If you want to know more about spotting phishing attacks, you can check this blog, but let’s now focus more on a technical solutions implemented in the ESET Cloud Office Security such as Antispam which consecutively won spam filtering tests by Virus Bulletin, a leading security testing authority, and received the VBSpam+ certification for several years.

The ECOS Antispam technology has high catch rates and being a cloud-based service, allows for prompt data updates that provide quicker reaction times when new spam emerges. This essential component filters all spam emails and keeps user mailboxes free of unsolicited or undesired messages.

ECOS Anti-Phishing prevents users from accessing web pages that are known to be phishing sites. Because phishing emails often contain links leading victims to phishing webpages, ESET Cloud Office Security searches the message body and the subject of incoming email messages to identify such links (URLs). The links are compared against the phishing database, which is being constantly updated.

Combining these powerful tools together with anti-malware scanning, ultimate zero-day threat defense, and an easy-to-use cloud management console, ECOS helps to protect companies’ communications, collaboration, and cloud applications.

Conclusion

When looking at spam and phishing data, it is clear that no one has come up with a definitive answer for these threats, but that doesn’t mean you should give up the fight. Quite the contrary. You need professional protection in order not to be overwhelmed by tons of emails both soaking up employees’ time and trying to sneak some phishing messages into corporate mailboxes.

How ESET helps:

• ESET products and threat intelligence have been protecting Ukrainian IT infrastructure for years. Since the start of the full-scale war in February 2022, ESET have prevented and investigated a significant number of attacks launched by Russia-aligned groups such as HermeticWiper and Industroyer2.

• As the leading endpoint protection platform vendor headquartered in the European Union, ESET also announced that it has stopped all sales to any individuals, businesses, and organizations in Russia and Belarus.

• ESET offered critical institutions and operators of critical infrastructure in Ukraine a free upgrade to ESET’s highest-grade solution.

• Between March and May 2022, ESET automatically extended expiring licenses for consumers in Ukraine at no cost.

• On top of that, ESET Foundation has allocated 1,277,700 euros for humanitarian relief in Ukraine.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Russian-made PSYOPs in Ukraine: Operation Texonto targets Ukrainians with war-related disinformation, ESET Research discovers

  • A Russian-aligned aligned threat actor spread war-related disinformation to Ukrainian readers via spam emails.
  • The spearphishing campaign targeted a Ukrainian defense company and an EU agency. 
  • Due to the similarities in the network infrastructure used in these PSYOPs and phishing operations, ESET research can say with high confidence that they are linked.
  • Operation Texonto loosely resembles Russia-aligned Callisto APT group activities; however, ESET Research does not have enough evidence to attribute the operations to any specific group.
  • In the first wave of disinformation emails in November 2023, the Russia-aligned threat actors tried to influence and demoralize Ukrainian citizens with disinformation messages about war-related topics. The second wave in December 2023 was even darker in tone.

BRATISLAVA, MONTREAL — February 21, 2024 — ESET Research recently discovered Operation Texonto, a disinformation/psychological operations (PSYOPs) campaign using spam emails as the main distribution method. Via messages sent in two waves of PSYOPs, the Russia-aligned threat actors tried to influence and demoralize Ukrainian citizens with disinformation messages about war-related topics. The first wave took place in November 2023 and the second one at the end of December 2023. The contents of the emails were about heating interruptions, drug shortages, and food shortages, which are typical themes of Russian propaganda. Additionally, in October 2023, ESET detected a spearphishing campaign that targeted a Ukrainian defense company, and one targeting an EU agency in November 2023 utilizing standard-looking fake Microsoft login pages. The goal of both was to steal credentials for Microsoft Office 365 accounts. Due to the similarities in the network infrastructure used in these PSYOPs and phishing operations, ESET research can say with high confidence that they are linked.

“Since the start of the war in Ukraine, Russia-aligned groups such as Sandworm have been busy disrupting Ukrainian IT infrastructure using wipers. In recent months, we have observed an uptick in cyberespionage operations, especially by the infamous Gamaredon group. Operation Texonto shows yet another use of technologies to try to influence the war,” says ESET researcher Matthieu Faou, who discovered Operation Texonto.

“The strange brew of espionage, information operations, and fake pharma messages can only remind us of Callisto, a well-known Russia-aligned cyberespionage group, some members of which were the subject of an indictment by the U.S. Department of Justice in December 2023. Callisto targets government officials, staff in think tanks, and military-related organizations via spearphishing websites designed to mimic common cloud providers. The group has also run disinformation operations such as a document leak just ahead of the 2019 UK general election. Finally, pivoting on its old network infrastructure leads to fake pharma domains,” continues Faou. However, he concludes: “While there are several high-level points of similarity between Operation Texonto and Callisto operations, we haven’t found any technical overlap, and we currently do not attribute Operation Texonto to a specific threat actor. However, given the TTPs, targeting, and the spread of messages, we attribute the operation with high confidence to a group that is Russia aligned.”

An email server, operated by the attackers and used to send the PSYOPs emails, was reused two weeks later to send typical Canadian pharmacy spam. This category of illegal business has been very popular within the Russian cybercrime community for a long time. A few more pivots also revealed domain names that are part of Operation Texonto and related to internal Russian topics, such as Alexei Navalny, the well-known Russian opposition leader who was in jail and died on 2024-02-16. This means that Operation Texonto probably includes spearphishing or information operations targeting Russian dissidents and supporters of the late opposition leader.

The goal of the first wave of disinformation emails was to sow doubt in the minds of Ukrainians; for instance, one email says “There may be heating interruptions this winter.” Others purportedly from the Ministry of Health talk about medicine shortages. It doesn’t seem that there were any malicious links or malware in this specific wave, only disinformation. One domain masquerading as the Ministry of Agrarian Policy and Food of Ukraine recommended replacing unavailable medicine with herbs. In yet another email “from” the Ministry, they suggest eating “pigeon risotto” a photo of a live pigeon and a cooked pigeon. Those documents were purposely created in order to rile up and demoralize the readers. Overall, these fake messages align with common Russian propaganda themes. They are trying to make Ukrainian people believe they won’t have drugs, food, and heating because of the Russia-Ukraine war.

About a month after the first wave, ESET detected a second PSYOPs email campaign targeting not only Ukrainians, but also people in other European countries. The targets are somewhat random, ranging from the Ukrainian government to an Italian shoe manufacturer. According to ESET telemetry, a few hundred people received emails in this wave. The second wave was darker in its messaging, with the attackers suggesting people amputate a leg or an arm to avoid military deployment. Overall, it has all the characteristics of PSYOPs during wartime.

ESET products and research have been protecting Ukrainian IT infrastructure for many years. And since the start of the Russian invasion in February 2022, ESET Research has prevented and investigated a significant number of attacks launched by Russia-aligned groups.

For more technical information about Operation Texonto, check out the blogpost “Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

Timeline of Operation Texonto

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

How to prevent malware attacks

You’re a well-respected American professor and consultant for government agencies, deeply involved in national security. In the middle of your packed schedule, an email arrives from what seems like a respected colleague asking for your thoughts on their article.

Flattered, you open the attached PDF, but the text is garbled. Assuming it’s a simple glitch, you ask for a clearer copy but instead get a link to a “decryption” tool. Without hesitation, you click on it, only to lose access to all your data—putting your contacts at risk, too.

This breach is the work of Cold River, tied to the Russian state, using “SPICA” malware. They’ve moved from phishing to malware via PDFs, targeting professionals like you for espionage. “SPICA” gives them deep access to steal sensitive information, showcasing the need for constant cybersecurity vigilance.

Key takeaways

  • Malware can harm computers, networks, and devices, putting your data and money at risk. 

  • Different malware types, like ransomware, Trojans, spyware, adware, and worms, each pose their unique threats. 

  • It spreads via phishing emails, malvertising, exploit kits, and social media scams, taking advantage of software flaws. 

  • To spot malware, watch for slow computers, unexpected data sends, and strange file changes. 

  • Fighting malware means using strong endpoint protection, keeping software up-to-date, and educating your team. 

  • NordLayer’s security solutions greatly lower the chance of malware attacks, helping to keep your information safe.

What is malware?

Malware is software that’s made to damage or misuse computers, networks, and devices. It sneaks into systems through weak spots or tricks, like phishing emails, to do things it shouldn’t. This includes taking private data, harming how systems work, or letting hackers in. Malware is risky because it can cause big money problems, leak private info, and interrupt important services, affecting everyone from people to governments.

Getting malware attacks is cheap, too. By March 2023, top-notch malware services were going for up to $4,500 for every 1,000 installs from dark marketplaces.

Types of malware

In 2023, we’ve seen a rise in malware that threatens both people and companies in unique ways.

Ransomware is a type of malware that locks data and asks for payment to unlock it. It got worse, also now demanding ransom in cryptocurrency. Ransomware attacks jumped 70% by September 2023 from the year before. The MOVEit software breach affected over 2,300 organizations, revealing private info like health records. The “cl0p” gang’s attack shows how advanced ransomware has become.

Trojans pretend to be safe software to steal data or take control remotely. They now target PCs, Macs, and mobile devices more than ever. Downloading risky content or ignoring updates can invite Trojans, reminding us to stay alert and keep our software fresh.

Spyware secretly collects personal details like what you type and where you go online. This risk highlights the need for safe web habits and spyware protection tools.

Adware might be less harmful but annoys you with unwanted ads and might track you online. This shows why using ad blockers and valuing privacy online matters.

Worms spread through networks by finding weak spots in software, stealing data, or hogging bandwidth. This points to the urgent need to update systems and secure networks.

To deal with these malware types, keeping network security practices sharp, educating ourselves and others, and strengthening our cyber defenses are key.

How is malicious software distributed?

Malware distribution has gotten trickier, using both tech smarts and cunning tricks to sneak into systems and trick people. Here’s a rundown of common ways it spreads:

  1. Phishing emails. Simple but effective, these emails trick people into clicking harmful links or attachments, often looking like they’re from real companies or friends.

  2. Malvertising. This method puts malware into ads on legitimate websites. Just visiting the site might infect a user; no clicks are needed.

  3. Exploit kits. These tools find and use weaknesses in software or systems to slip malware in when someone visits a compromised site.

  4. Social media scams. Fake profiles or messages on social platforms can spread malware, using tempting offers or urgent warnings to lure clicks to dangerous sites.

  5. Supply chain attacks. Here, malware is hidden in software before it even gets to the user, aiming to hit many targets at once.

  6. RDP attacks. More people working remotely means more malware attacks on the Remote Desktop Protocol, where thieves use stolen details to get into systems and plant malware.

  7. File-sharing services. Malware disguised as regular files on sharing sites can trick users into downloading harm.

  8. Spear phishing and whaling. These personalized malware attacks target specific people or companies or go after big fish with the aim of a big payoff.

  9. Zero-day vulnerabilities. Unknown flaws in software are gold for cybercriminals, letting them attack before a fix is out.

  10. Mobile malware apps. Bad apps in app stores can look legit but are really malware in disguise, aiming to infect phones and tablets.

How to recognize malware

For businesses, spotting malware quickly is key to keeping their data safe.

Look out for these signs that might suggest malware presence in your operating system.

Signs of malware infection

Strange system actions

  • Devices or networks slow down might mean malware is using up resources.

  • Systems crash or show errors, which could be malware messing with them.

  • Programs open or install by themselves might be due to malware.

Odd network use

  • Unexpected data sent out could be malware stealing sensitive information.

  • New, unauthorized network connections might be a sign of malware.

Changes in files

  • Files change or vanish without user action, pointing to malware.

  • New files or programs that users didn’t install appear, indicating malware.

Alerts from security software

  • Antivirus gives warnings; it might be spotting malware.

  • A firewall gives out unusual alerts about blocked connections or port access attempts, signaling malware.

More spam and phishing

A rise in phishing emails can show a malware attack is underway.

Weird browser behavior

Browser redirects to odd sites, home page changes, or more pop-ups can indicate malware.

To detect malware, you need:

  • Scan systems regularly with the latest antivirus and anti-malware tools, especially after installing new software.

  • Watch network traffic for any strange activity with monitoring tools.

  • Train employees to recognize and report malware signs.

  • Update all software to close off vulnerabilities.

  • Use advanced protection like ATP solutions for better defense against malware.

Spotting malware early helps businesses react fast to reduce harm. Having a clear plan for when you suspect malware is crucial.

How to prevent malware

To keep businesses safe from malware, a well-rounded cybersecurity strategy is essential. Here are the top seven steps businesses can take:

Use advanced endpoint protection

Opt for antivirus and EDR (Endpoint Detection and Response) solutions that detect and neutralize malware using machine learning. These tools scan for unusual activities and help effectively remove malware. An EDR system, for example, could prevent a ransomware attack by identifying and isolating the threat before it encrypts any files. 

Update software regularly

Ensure your operating system, applications, and network devices are always updated. Outdated software is a prime target for hackers. The WannaCry ransomware incident is a stark reminder: it exploited unpatched Windows systems worldwide. Apply updates promptly for malware prevention.

Train your employees

Educate your staff about the dangers of malware and the importance of verifying new software sources before downloading. Practical training sessions can reduce malware risks by teaching employees to recognize phishing scams, a common malware delivery method. Remind everyone to scrutinize email senders and not to click on suspicious links, which can prevent many potential breaches.

Set up secure email gateways

Deploy email security solutions that filter phishing scams and dangerous links in advance. Use sandboxing technologies that safely analyze dubious email attachments. This step helps stop malware at the entry point.

Segment your network

Divide your network into segments to better manage and contain potential malware spread to other computers. Implementing strict access controls ensures that users have access only to necessary resources. That limits the impact if data is compromised. 

Network segmentation proved effective during the NotPetya malware outbreak, as it helped contain the spread within segmented parts of the network, minimizing overall damage.

Back up data and plan for incidents

Back up your data and have a plan ready for any incidents. Always keep important resources backed up in places separate from your main network, and keep updating your plan for dealing with cyber threats.

Having backups means you can get back on track without paying off ransomware, keeping your data and money safe.

Implement Multi-Factor Authentication (MFA)

Add MFA for better security. It helps keep your operating system safe, even if someone guesses your password. Using MFA makes it much harder for hackers to break in, as they can’t easily bypass this extra security step.

How NordLayer can help

NordLayer offers strong tools for businesses to fight malware with advanced threat prevention and Zero Trust Network Access (ZTNA).

Zero Trust best practices

NordLayer proactively fights threats to keep your data safe. It uses tools and rules that protect every part of your network.

This includes:

  • Stopping advanced threats. NordLayer uses multiple security layers to protect against complex malicious software and phishing.

  • Protecting the network. It keeps your network safe, guarding against threats from outside, no matter where your devices are.

  • Quick incident response. If there’s a breach, NordLayer acts fast to limit damage and keep your data safe.

NordLayer’s ZTNA means not trusting any connection by default. This method checks every access attempt carefully, offering:

  • Secure access and segmentation. NordLayer makes sure users can only reach what they need to, keeping your data safer.

  • Lower insider threat risk. By controlling access tightly, NordLayer reduces the chance of data breaches.

  • Remote work security. NordLayer’s ZTNA protects remote workers, giving them secure access to what they need quickly.

  • A better alternative to VPNs. NordLayer’s ZTNA is a safer option, allowing remote users access only to necessary apps that protect your internal resources.

Using NordLayer’s strategies, businesses can protect themselves against malicious software, keeping their operations secure and running smoothly.

Contact our sales for further assistance.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

NOSQL vs SQL. Key differences and when to choose each

Until recently, the default model for application development was SQL. However, in recent years NoSQL has become a popular alternative.

The wide variety of data that is stored today and the workload that servers must support force developers to consider other more flexible and scalable options. NoSQL databases provide agile development and ease of adapting to changes. Even so, they cannot be considered as a replacement for SQL nor are they the most successful choice for all types of projects.

Choosing between NoSQL vs SQL is an important decision, if you wish to avoid technical difficulties during the development of an application. In this article we aim to explore the differences between these two database management systems and guide readers on the use of each of them, taking into account the needs of the project and the type of data to be handled.

Content:

What is NoSQL?

The term NoSQL is short for “Not only SQL” and refers to a category of DBMSs that do not use SQL as their primary query language.

The NoSQL database boom began in 2000, matching the arrival of web 2.0. From then on, applications became more interactive and began to handle large volumes of data, often unstructured. Soon traditional databases fell short in terms of performance and scalability.

Big tech companies at the time decided to look for solutions to address their specific needs. Google was the first to launch a distributed and highly scalable DBMS: BigTable, in 2005. Two years later, Amazon announced the release of Dynamo DB (2007). These databases (and others that were appearing) did not use tables or a structured language, so they were much faster in data processing.

Currently, the NoSQL approach has become very popular due to the rise of Big Data and IoT devices, that generate huge amounts of data, both structured and unstructured.

Thanks to its performance and ability to handle different types of data, NoSQL managed to overcome many limitations present in the relational model. Netflix, Meta, Amazon or LinkedIn are examples of modern applications that use NoSQL database to manage structured information (transactions and payments) as well as unstructured information (comments, content recommendations and user profiles).

Difference between NoSQL and SQL

NoSQL and SQL are two database management systems (DBMS) that differ in the way they store, access and modify information.

The SQL system

SQL follows the relational model, formulated by E.F. Codd in 1970. This English scientist proposed replacing the hierarchical system used by the programmers of the time with a model in which data are stored in tables and related to each other through a common attribute known as “primary key”. Based on their ideas, IBM created SQL (Structured Query Language), the first language designed specifically for relational databases. The company tried unsuccessfully to develop its own RDBMS, so it had to wait until 1979, the year of the release of Oracle DB.

Relational databases turned out to be much more flexible than hierarchical systems and solved the issue of redundancy, following a process known as “normalization” that allows developers to expand or modify databases without having to change their whole structure. For example, an important function in SQL is JOIN, which allows developers to perform complex queries and combine data from different tables for analysis.

The NoSQL system

NoSQL databases are even more flexible than relational databases since they do not have a fixed structure. Instead, they employ a wide variety of models optimized for the specific requirements of the data they store: spreadsheets, text documents, emails, social media posts, etc.

Some data models that NoSQL uses are:

  • Key-value: Redis, Amazon DynamoDB, Riak. They organize data into key and value pairs. They are very fast and scalable.
  • Documentaries: MongoDB, Couchbase, CouchDB. They organize data into documents, usually in JSON format.
  • Graph-oriented: Amazon Neptune, InfiniteGraph. They use graph structures to perform semantic queries and represent data such as nodes, edges, and properties.
  • Column-oriented: Apache Cassandra. They are designed to store data in columns instead of rows as in SQL. Columns are arranged contiguously to improve read speed and allow efficient retrieval of the data subset.
  • Databases in memory: They get rid of the need to access disks. They are used in applications that require microsecond response times or that have high traffic spikes.

In summary, to work with SQL databases, developers must first declare the structure and types of data they will use. In contrast, NoSQL is an open storage model that allows new types of data to be incorporated without this implying project restructuring.

Relational vs. non-relational database

To choose between an SQL or NoSQL database management system, you must carefully study the advantages and disadvantages of each of them.

Advantages of relational databases

  • Data integrity: SQL databases apply a wide variety of restrictions in order to ensure that the information stored is accurate, complete and reliable at all times.
  • Ability to perform complex queries: SQL offers programmers a variety of functions that allow them to perform complex queries involving multiple conditions or subqueries.
  • Support: RDBMS have been around for decades; they have been extensively tested and have detailed and comprehensive documentation describing their functions.

Disadvantages of relational databases

  • Difficulty handling unstructured data: SQL databases have been designed to store structured data in a relational table. This means they may have difficulties handling unstructured or semi-structured data such as JSON or XML documents.
  • Limited performance: They are not optimized for complex and fast queries on large datasets. This can result in long response times and latency periods.
  • Major investment: Working with SQL means taking on the cost of licenses. In addition, relational databases scale vertically, which implies that as a project grows, it is necessary to invest in more powerful servers with more RAM to increase the workload.

Advantages of non-relational databases

  • Flexibility: NoSQL databases allow you to store and manage structured, semi-structured and unstructured data. Developers can change the data model in an agile way or work with different schemas according to the needs of the project.
  • High performance: They are optimized to perform fast queries and work with large volumes of data in contexts where relational databases find limitations. A widely used programming paradigm in NoSQL databases such as MongoDB is “MapReduce” which allows developers to process huge amounts of data in batches, breaking them up into smaller chunks on different nodes in the cluster for later analysis.
  • Availability: NoSQL uses a distributed architecture. The information is replicated on different remote or local servers to ensure that it will always be available.
  • They avoid bottlenecks: In relational databases, each statement needs to be analyzed and optimized before being executed. If there are many requests at once, a bottleneck may take place, limiting the system’s ability to continue processing new requests. Instead, NoSQL databases distribute the workload across multiple nodes in the cluster. As there is no single point of entry for enquiries, the potential for bottlenecks is very low.
  • Higher profitability: NoSQL offers fast and horizontal scalability thanks to its distributed architecture. Instead of investing in expensive servers, more nodes are added to the cluster to expand data processing capacity. In addition, many NoSQL databases are open source, which saves on licensing costs.

Disadvantages of NoSQL databases

  • Restriction on complex queries: NoSQL databases lack a standard query language and may experience difficulties performing complex queries or require combining multiple datasets.
  • Less coherence: NoSQL relaxes some of the consistency constraints of relational databases for greater performance and scalability.
  • Less resources and documentation: Although NoSQL is constantly growing, the documentation available is little compared to that of relational databases that have been in operation for more years.
  • Complex maintenance: Some NoSQL systems may require complex maintenance due to their distributed architecture and variety of configurations. This involves optimizing data distribution, load balancing, or troubleshooting network issues.

When to use SQL databases and when to use NoSQL?

The decision to use a relational or non-relational database will depend on the context. First, study the technical requirements of the application such as the amount and type of data to be used.

In general, it is recommended to use SQL databases in the following cases:

  • If you are going to work with well-defined data structures, for example, a CRM or an inventory management system.
  • If you are developing business applications, where data integrity is the most important: accounting programs, banking systems, etc.

In contrast, NoSQL is the most interesting option in these situations:

  • If you are going to work with unstructured or semi-structured data such as JSON or XML documents.
  • If you need to create applications that process data in real time and require low latency, for example, online games.
  • When you want to store, manage and analyze large volumes of data in Big Data environments. In these cases, NoSQL databases offer horizontal scalability and the possibility of distributing the workload on multiple servers.
  • When you launch a prototype of a NoSQL application, it provides you with fast and agile development.

In most cases, back-end developers decide to use a relational database, unless it is not feasible because the application handles a large amount of denormalized data or has very high performance needs.

In some cases it is possible to adopt a hybrid approach and use both types of databases.

SQL vs NoSQL Comparison

CTO Mark Smallcombe published an article titled “SQL vs NoSQL: 5 Critical Differences” where he details the differences between these two DBMS.

Below is a summary of the essentials of your article, along with other important considerations in comparing SQL vs NoSQL.

How data is stored

In relational databases, data are organized into a set of formally described tables and are related to each other through common identifiers that provide access, consultation and modification.
NoSQL databases store data in its original format. They do not have a predefined structure and can use documents, columns, graphs or a key-value schema.

Language

Relational databases use the SQL structured query language.
Non-relational databases have their own query languages and APIs. For example, MongoDB uses MongoDB Query Language (MQL) which is similar to JSON and Cassandra uses Cassandra Query Language (CQL) which looks like SQL, but is optimized for working with data in columns.

Compliance with ACID properties

Relational databases follow the ACID guidelines (atomicity, consistency, isolation, durability) that guarantee the integrity and validity of the data, even if unexpected errors occur. Adopting the ACID approach is a priority in applications that handle critical data, but it comes at a cost in terms of performance, since data must be written to disk before it is accessible.
NoSQL databases opt instead for the BASE model (basic availability, soft state, eventual consistency), which prioritizes performance over data integrity. A key concept is that of “eventual consistency”. Instead of waiting for the data to be written to disk, some degree of temporal inconsistency is tolerated, assuming that, although there may be a delay in change propagation, once the write operation is finished, all the nodes will have the same version of the data. This approach ensures faster data processing and is ideal in applications where performance is more important than consistency.

Vertical or horizontal scalability

Relational databases scale vertically by increasing server power.
Non-relational databases have a distributed architecture and scale horizontally by adding servers to the cluster. This feature makes NoSQL a more sustainable option for developing applications that handle a large volume of data.

Flexibility and adaptability to change

SQL databases follow strict programming schemes and require detailed planning as subsequent changes are often difficult to implement.
NoSQL databases provide a more flexible development model, allowing easy adaptation to changes without having to perform complex migrations. They are a practical option in agile environments where requirements change frequently.

Role of Pandora FMS in database management

Pandora FMS provides IT teams with advanced capabilities to monitor SQL and NoSQL databases, including MySQL, PostgreSQL, Oracle, and MongoDB, among others. In addition, it supports virtualization and cloud computing environments (e.g., Azure) to effectively manage cloud services and applications.

Some practical examples of the use of Pandora FMS in SQL and NoSQL databases:

  • Optimize data distribution in NoSQL: It monitors performance and workload on cluster nodes avoiding overloads on individual nodes.
  • Ensure data availability: It replicates the information in different nodes thus minimizing the risk of losses.
  • Send Performance Alerts: It monitors server resources and sends alerts to administrators when it detects query errors or slow response times. This is especially useful in SQL databases whose performance depends on the power of the server where the data is stored.
  • Encourage scalability: It allows you to add or remove nodes from the cluster and adjust the system requirements to the workload in applications that work with NoSQL database.
  • Reduce Latency: It helps administrators identify and troubleshoot latency issues in applications that work with real-time data. For example, it allows you to adjust NoSQL database settings, such as the number of simultaneous connections or the size of the network buffer, thus improving query speed.

Conclusion

Making a correct choice of the type of database is key so that no setbacks arise during the development of a project and expand the possibilities of growth in the future.

Historically, SQL databases were the cornerstone of application programming, but the evolution of the Internet and the need to store large amounts of structured and unstructured data pushed developers to look for alternatives outside the relational model. NoSQL databases stand out for their flexibility and performance, although they are not a good alternative in environments where data integrity is paramount.

It is important to take some time to study the advantages and disadvantages of these two DBMSs. In addition, we must understand that both SQL and NoSQL databases require continuous maintenance to optimize their performance.

Pandora FMS provides administrators with the tools necessary to improve the operation of any type of database, making applications faster and more secure, which translates into a good experience for users.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Meet the Team: solution and industry forecast with the Head of Product

Product is the epicenter of any company, and NordLayer is no exception. Its performance, development, and promise to customers are the staples that help us grow as a service provider. The driving force behind it belongs to the product team led by the Head of Product Andrius Buinovskis

Although his time is always in high demand, he spared us a few moments to answer some questions about the product roadmap and the future of network security. Andrius shares his perspective on evolving threats such as phishing and the rise of ransomware syndicates exploiting human vulnerabilities through social engineering. 

Let’s dive into an insightful interview with Andrius to gain perspectives on projected challenges and how NordLayer is advancing solutions to stay ahead of rapidly evolving cyber threats.

Andrius, as an industry expert, what projections do you see for the future of network security? Will it bring something new, or will the industry continue in the previous years’ direction?

From what we can observe in the market, the future of network security is on a trajectory of rapid advancement, much in line with recent years but accelerated significantly by artificial intelligence (AI). This acceleration will not necessarily introduce wholly new directions but will enhance the speed and sophistication of developments within existing trends. Here are a few projections:

Projections of persistent threats

  1. Phishing attacks (Voice, SMS, email). Phishing remains the cornerstone of cyber threats, continually evolving and targeting countless victims every second. Its persistence and evolution make it a primary concern. As technologies advance, so do the methods of phishing attacks, becoming more sophisticated and harder to detect.

  2. Ransomware and malware. The ease with which bad actors can now access ransomware and malware “as a service” underscores the growing threat landscape. These tools have democratized cyber attacks, making it easier for attackers to launch sophisticated attacks without needing extensive technical know-how.

  3. Misconfigurations and low awareness. In third place, the human element—misconfigurations and a general lack of awareness about potential threats—remains a significant vulnerability. Social engineering exploits these weaknesses, tricking individuals into compromising security through seemingly harmless interactions.

How do these projections relate to cyber threats? What security strategies/practices could best help prevent them?

The tendencies observed in the cyber threat landscape confirm that cyber threats are evolving and becoming more sophisticated and widespread. 

The consistency of fundamental challenges like phishing, ransomware, malware, and human error vulnerabilities underscores the dynamic nature of cyber threats. Integrating AI into security strategies signifies a significant shift, suggesting that while the core types of threats may remain stable, their complexity and the methods to combat them must rapidly evolve.

To effectively counter these threats, a two-way approach is necessary:

  • Reducing misconfigurations and enhancing awareness. The first line of defense is to address the human element. 

    This involves dedicating time and resources to minimize misconfigurations through rigorous system checks and enhancing the cybersecurity awareness of all individuals within an organization. 

    Educating users on the potential threats and how to avoid them can significantly reduce the risk of successful attacks.

  • Adding additional layers of security. Implementing solutions like NordLayer adds an essential layer of security. 

    Products that provide secure network access, data encryption, and threat monitoring can greatly enhance an organization’s defense mechanisms against evolving cyber threats.

While cyber threats continue to grow in sophistication, focusing on foundational security practices—eliminating misconfigurations, raising awareness, and layering security solutions—remains key to preventing them. This approach addresses the current threat landscape and prepares organizations to adapt to future developments in cybersecurity.

How do NordLayer’s plans align with industry trends?

NordLayer’s strategy aligns directly with industry trends while also carving out a unique niche in the cybersecurity landscape. 

It’s critical for us to stay up-to-date on trends and understand where the industry is heading. This knowledge informs our product development, ensuring we’re keeping pace and anticipating future needs.

However, to truly stand out and add value for our clients, we recognize the importance of offering something more—something different

This is where innovations like the NordLynx protocol come into play. NordLynx is a prime example of how we differentiate our offerings. As potentially the fastest protocol available, it underscores our commitment to meet industry standards and set the new ones, providing our clients with superior speed, security, and reliability.

Our plans are twofold: align with industry trends to ensure relevance and forward-thinking, and innovate beyond the expected to deliver unique value propositions like NordLynx. This approach allows us to address current market needs while also setting new benchmarks in cybersecurity excellence.

Tell us about your typical workday here at NordLayer.

My workday combines leadership, exploration, and strategic planning to drive NordLayer forward. Thus, the days are primarily centered around meetings, which means that each morning I’m going over my calendar to prepare. This preparation involves clearly understanding the day’s topics and what I aim to achieve in each meeting.

My main focus areas are:

  • Supporting my team’s growth and helping them achieve our goals. This involves guidance, problem-solving, and ensuring everyone has the necessary resources.

  • Engaging in market discovery activities to understand our industry better, identify opportunities, and anticipate challenges.

  • Developing strategies to bring our plans to realization. This means turning insights and objectives into actionable steps and ensuring we move in the right direction.

Andrius, you and your team seem well-positioned to help organizations layer up advanced security solutions. What work experience have you brought? Compared to previous roles, how is NordLayer unique to work at?

I’ve navigated various industries and roles throughout my career, from banking and telecommunications to health insurance, e-commerce, and cybersecurity. I’ve worn many hats, starting as a programmer and eventually moving up to high-level managerial positions, but the common thread has always been my focus on IT.

Its comprehensive approach to cybersecurity sets NordLayer apart from my previous experiences. It feels like a culmination of my diverse background, where every aspect of my past work converges. 

Here at NordLayer, our services aren’t just another product on the market. They’re essential tools that any company, regardless of size, will need to safeguard their data and protect their employees. 

NordLayer stands out because it intersects necessity and simplicity, making it a unique and compelling workplace. It’s not just about responding to the market’s current demands but anticipating future cybersecurity needs, making our work both challenging and incredibly rewarding.

Provide an overview of your product team and its dynamics: structure, roles, and responsibilities.

If we look at the market, it’s typical that the product team stands between business and engineering. However, at NordLayer, the product team is the one that shows the direction and encourages all others to follow.

This team, consisting of product managers and product owners who are well aware of UX/UI trends, market research, and engineering perks, is critical in defining and advocating for our vision. 

The essence of our team dynamics revolves around a strong belief in our products and the ability to make them appealing and useful to our clients and even our team so they feel confident about the product. It’s about creating technically proficient products that resonate well with our users and employees, ensuring that our offerings are attractive and beneficial.

You and your team are responsible for the product and its further development. How do you define which direction to choose?

Choosing the right direction for product development involves a blend of analytical and strategic considerations. Here’s how we approach it:

  1. Historical demand analysis. We start by looking back at what our existing clients have requested. Understanding the needs and feedback of those who already use our services gives us a direct line to what’s working and what could be improved or expanded.

  2. Market projections. We then shift our gaze forward, analyzing market trends and projections. This helps us anticipate where the industry is headed and what needs might arise in the future, ensuring our product remains relevant.

  3. Competitor portfolio analysis. Knowing what’s out there is crucial. We meticulously examine our competitors’ offerings to identify gaps in the market we can fill and to understand how our product can offer unique value.

  4. Current technical and capacity capabilities. It’s essential to match our aspirations with our abilities. We assess our current technical resources and capacity to ensure that our chosen direction is feasible and sustainable with our available resources.

  5. Internal insights and expertise. Finally, we tap into our team’s wealth of knowledge and experience. Leveraging our internal insights and expertise ensures that our decisions are not just data-driven but also infused with the practical wisdom of our seasoned team members.

By integrating these factors, we aim to make informed, strategic decisions that steer our product development in a direction that meets current demands, anticipates future needs, and capitalizes on our unique strengths.

You most recently released Cloud Firewall and Device Posture Monitoring features, a massive improvement in network security offering. So, what’s next? How does NordLayer’s roadmap look for 2024?

For 2024, NordLayer is set on a path of continuous improvement and innovation. Our recent launches, Cloud Firewall and Device Posture Monitoring, significantly enhanced network security. But we’re not stopping there. Our focus for the upcoming year includes two main areas:

NordLayer near-future focus

  1. Enhancing existing services. We’re committed to refining and enhancing our current offerings. This means looking into how we can make our existing services more robust, user-friendly, and effective in addressing the evolving needs of our clients.

  2. Advancing network visibility tools. Recognizing the critical importance of visibility within network environments, we’re doubling down on developing tools that offer deeper insights into network activities. Visibility is key to making informed decisions, securing networks, and mitigating both internal and external threats efficiently.

In addition to these focal points, we’re also eyeing expansions into the upmarket with several strategic implementations:

  • Public API for service control. We plan to introduce a public API that allows for the automated control of our services. This move aims to cater to more sophisticated needs, enabling seamless integration and automation for our clients.

  • Other integrations. Recognizing the diverse ecosystem in which our clients operate, we’re working on developing additional integrations. These efforts are intended to ensure NordLayer fits smoothly into our clients’ existing workflows and systems, enhancing security without compromising efficiency.

In essence, NordLayer’s roadmap for 2024 is about deepening the value we provide to our clients through improving existing services and strategic advancements. Our goal is to remain at the forefront of network security, offering solutions that are not just cutting-edge but also tailored to the complex needs of modern organizations.

Thank you.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Apply network management protocols to your organization for better results

To address this issue, first understand that, in the digitization we are experiencing, there are multiple resources and devices that coexist in the same network and that require a set of rules, formats, policies and standards to be able to recognize each other, exchange data and, if possible, identify if there is a problem to communicate, regardless of the difference in design, hardware or infrastructure, using the same language to send and receive information. This is what we call network protocols (network protocols), which we can classify as: 

    • Network communication protocols for communication between network devices, whether in file transfer between computers or over the Internet, up to text message exchange and communication between routers and external devices or the Internet of Things (IoT). For example: Bluetooth, FTP, TCP/IP and HTTP.
    • Network security protocols to implement security in network communications so that unauthorized users cannot access data transferred over a network, whether through passwords, authentication, or data encryption. For example: HTTPS, SSL, SSH and SFTP.
    • Network administration protocols that allow network management and maintenance to be implemented by defining the procedures necessary to operate a network. These protocols are responsible for ensuring that each device is connected to others and to the network itself, as well as monitoring the stability of these connections. They are also resources for troubleshooting and assessing network connection quality.

Content:

Importance and Context in Network Management

Network management ranges from initial configuration to permanent monitoring of resources and devices, in order to ensure connectivity, security and proper maintenance of the network. This efficient communication and data flow have an impact on the business to achieve its objectives in stable, reliable, safe, efficient environments, better user experience and, consequently, the best experience of partners and customers.
Something important is the knowledge of the network context (topology and design), since there is an impact on its scalability, security and complexity. Through network diagrams, maps and documentation to visualize and understand the topology and design of the network, it is possible to perform analyses to identify potential bottlenecks, vulnerabilities and inefficiencies where action must be taken to correct or optimize it.
Another important aspect is the shared resources not only in the network but in increasingly widespread infrastructures in the cloud, in Edge Computing and even in the Internet of Things that demand monitoring of the state of the network, network configuration and diagnosis to promote efficiency, establish priorities and also anticipate or solve connection problems in the network and on the internet.
We’ll talk about the benefits of Network Management later.

Network protocols vs network management protocols

As explained above, network management protocols are part of network protocols. Although they may seem the same, there are differences: network protocols, as a rule, allow data transfer between two or more devices and are not intended to manage or administer such devices, while network administration protocols do not aim at the transfer of information, but the transfer of administrative data (definition of processes, procedures and policies), which allow to manage, monitor and maintain a computer network.
The key issue is to understand the following:

  • Within the same network, network communication protocols will have to coexist with network management protocols.
  • Network management protocols also have an impact on the overall performance of the platforms, so it is essential to know and control them.
  • The adoption of cloud and emerging technologies, such as Edge Computing and the Internet of Things, make it clear that reliable and efficient connectivity is critical.

Deep Network Management Protocols

Network management protocols make it possible to know the status of resources, equipment and devices on the network (routers, computers, servers, sensors, etc.), and provide information on their availability, possible network latency or data loss, failures, among others. The most common network management protocols are: Simple Network Management Protocol (SNMP), Internet Control Message Protocol (ICMP) and Windows Management Instrumentation (WMI), as seen in the diagram below and explained below:

Simple Network Management Protocol (SNMP)

SNMP is a set of protocols for managing and monitoring the network, which are compatible with most devices (switches, workstations, printers, modems and others) and brands (most manufacturers make sure their product includes SNMP support) to detect conditions. SNMP standards include an application layer protocol, a set of data objects, and a methodology for storing, manipulating, and using data objects in a database schema. These protocols are defined by the Internet Architecture Board (Internet Architecture Board, IAB) and have evolved since their first implementation:

  • SNMPv1: first version operating within the structure management information specification and described in RFC 1157
  • SNMPv2: Improved support for efficiency and error handling, described in RFC 1901.
  • SNMPv3: This version improves security and privacy, introduced in RFC 3410.

SNMP Architecture Breakdown: Agents and Administrators

All network management protocols propose an architecture and procedures to retrieve, collect, transfer, store and report management information from the managed elements. It is important to understand this architecture and its procedures to implement a solution based on said protocol.
The SNMP architecture is based on two basic components: Agents and Administrators or Managers, as we presented in the following diagram of a basic schema of the SNMP architecture:
Where:

    • SNMP agents are pieces of software that run on the elements to be managed. They are responsible for collecting information on the device itself. Then, when SNMP administrators request such information through queries, the agent will send the corresponding. SNMP agents can also send the SNMP Manager information that does not correspond to a query but that comes from an event that takes place in the device and that requires to be notified. Then, it is said that the SNMP agent proactively sends a notification TRAP.
    • SNMP Administrators are found as part of a management or monitoring tool and are designed to work as consoles where all the information captured and sent by the SNMP agents is centralized.
  • OIDs (Object Identifier) are the items used to identify the items you want to manage. OIDs follow a format of numbers such as: .1.3.6.1.4.1.9.9.276.1.1.1.1.11. These numbers are retrieved from a hierarchical organization system that allows to identify the device manufacturer, to later identify the device and finally the item. In the following image we see an example of this OID tree outline.
  • MIBs (Management Information Base) are the formats that the data sent from the SNMP agents to the SNMP managers will comply with. In practice, we have a general template with what we need to manage any device and then have individualized MIBs for each device, with their particular parameters and the values that these parameters can reach.

SNMP’s crucial functions are:

  • Fault Validation: for detection, isolation and correction of network problems. With the SNMP trap operation, you may get the problem report from the SNMP agent running on that machine. The network administrator can then decide how, testing it, correcting or isolating that problematic entity. The OpManager SNMP monitor has an alert system that ensures you are notified well in advance of network issues such as faults and performance slowdowns.
  • Performance Metrics Network: performance monitoring is a process for tracking and analyzing network events and activities to make necessary adjustments that improve network performance. With SNMP get and set operations, network administrators can track network performance. OpManager, an SNMP network monitoring tool, comes with powerful and detailed reports to help you analyze key performance metrics such as network availability, response times, throughput, and resource usage, making SNMP Management easier.

To learn more about SNMP, we recommend reading Blog SNMP Monitoring: keys to learn how to use the Simple Network Administration Protocol

Internet Control Message Protocol (ICMP)

This is a network layer protocol used by network devices to diagnose communication problems and perform management queries. This allows ICMP to be used to determine whether or not data reaches the intended destination in a timely manner and its causes, as well as to analyze performance metrics such as latency levels, response time or packet loss. ICMP contemplated messages typically fall into two categories:

  • Error Messages: Used to report an error in packet transmission.
  • Control messages: Used to report on device status.

The architecture that ICMP works with is very flexible, since any device on the network can send, receive or process ICMP messages about errors and necessary controls on network systems informing the original source so that the problem detected is avoided or corrected. The most common types of ICMP menssages are key in fault detection and performance metric calculations:

  • Time-Out: Sent by a router to indicate that a packet has been discarded because it exceeded its time-to-live (TTL) value.
  • Echo Request and Echo Response: Used to test network connectivity and determine round-trip time for packets sent between two devices.
  • Unreachable Destination: Sent by a router to indicate that a packet cannot be delivered to its destination.
  • Redirect: Sent by a router to inform a host that it should send packets to a different router.
  • Parameter issue: Sent by a router to indicate that a packet contains an error in one of its fields.

For example, each router that forwards an IP datagram has to decrease the IP header time-to-live (TTL) field by one unit; if the TTL reaches zero, an ICMP type 11 message (“Time Exceeded”) is sent to the datagram originator.
It should be noted that sometimes it is necessary to analyze the content of the ICMP message to determine the type of error that should be sent to the application responsible for transmitting the IP packet that will ICMP message forwarding.
For more detail, it is recommended to access Pandora Discussion Forums FMS, with tips and experiences of users and colleagues in Network Management using this protocol.

Windows Management Instrumentation (WMI)

With WMI (Windows Management Instrumentation) we will move in the universe composed of computers running a Windows operating system and the applications that depend on this operating system. In fact, WMI proposes a model for us to represent, obtain, store and share management information about Windows-based hardware and software, both local and remote. Also, WMI allows the execution of certain actions. For example, IT developers and administrators can use WMI scripts or applications to automate administrative tasks on remotely located computers, as well as fetch data from WMI in multiple programming languages.

Architecture WMI

WMI architecture is made up of WMI Providers, WMI Infrastructure and Applications, Services or Scripts as exemplified in this diagram:

Where:

  • A WMI provider is a piece responsible for obtaining management information for one or more items.
  • The WMI infrastructure works as an intermediary between the providers and the administration tools. Among its responsibilities are the following:
    • Obtaining in a scheduled way the data generated by the suppliers.
    • Maintaining a repository with all the data obtained in a scheduled manner.
    • Dynamically finding the data requested by administration tools, for which a search will be made in the repository and, if the requested data is not found, a search will be made among the appropriate providers.
  • Administration applications correspond to applications, services or scripts that use and process information about managed items. WMI manages to offer a consistent interface through which you may have applications, services and scripts requesting data and executing the actions proposed by WMI providers about the items that you wish to manage.

CIM usage and WMI Class Breakdown

WMI is based on CIM (Common Information Model), which is a model that uses item-based techniques to describe different parts of a company. It is a very widespread model in Microsoft products; In fact, when Microsoft Office or an Exchange server is installed, for example, the extension of the model corresponding to the product is installed automatically.
Precisely that extension that comes with each product is what is known as WMI CLASS, which describes the item to be managed and everything that can be done with it. This description starts from the attributes that the class handles, such as:

  • Properties: Properties that refer to item features, such as their name, for example.
  • Methods: Actions that refer to the actions that can be performed on the object, such as “hold” in the case of an item that is a service.
  • Associations: They refer to possible associations between items.

Now, once WMI providers use the classes of the items to collect administration information and this information goes to the WMI infrastructure, it is required to organize data in some way. This organization is achieved through logical containers called namespaces, which are defined by administration area and contain the data that comes from related objects.
Namespaces are defined under a hierarchical scheme that recalls the outline that folders follow on a disk. An analogy many authors use to explain data sorting in WMI is to compare WMI to databases, where the classes correspond to the tables, the namespaces to the databases, and the WMI infrastructure to the database handler.
To learn more about WMI, we recommend reading our blog post What is WMI? Windows Management Instrumentation, do you know it?

Key Insights for Network Management Protocol Analysis:

It is easy to understand that the more complex and heterogeneous the platform you want to manage, the greater its difficulty from three angles:

  • Faults: have fault detection procedures and a scheme for reporting them.
  • Performance: Information about platform performance to understand and optimize its performance.
  • Actions: Many administration protocols include the possibility of executing actions on network devices (updating, changes, setting up alerts, reconfigurations, among others).

It is important to understand which of the three angles each of the protocols tackels and, therefore, what it will allow you to do. A fundamental pillar is Data Organization, which we will explain below.

Effective data organization: a fundamental pillar in network management protocols

A fundamental aspect of Network Management Protocols is the way in which the elements to be managed are defined and identified, making approaches on:

  • What element can I administer with this protocol?
  • Should it just be the hardware or should applications be considered too, for example?
  • What format should be used to handle data? And how is it stored, if so?
  • What are the options you have to access this information?

In that sense, effective data sorting allows the successful information exchange between devices and network resources. In network monitoring, data is required from routers, switches, firewalls, load balancers, and even endpoints, such as servers and workstations. The data obtained is filtered and analyzed to identify possible network problems such as configuration changes or device failures, link interruptions, interface errors, lost packets, latency or response time of applications or services on the network. Data also makes it possible to implement resource planning due to traffic growth or the incorporation of new users or services.

Challenges, Benefits and Key Tasks in Network Management Protocols

For those in charge of operating and managing enterprise networks, it is important to know five common challenges:

  • Mixed environments, in which resources and devices exist in local and remote networks (including Edge Computing and IoT), which makes it necessary to adapt to the demands of hybrid networks.
  • Understand network needs and perform strategic planning, not only in physical environments but also in the cloud.
  • Reinforcing the security and reliability of increasingly dynamic networks, more so when business ecosystems are engaging interconnecting customers, suppliers, and business partners.
  • Achieve observability that gets rid of network blind spots and provide a comprehensive view of IT infrastructure.
  • Establish a network management strategy that can be connected, integrated, and even automated, especially when IT teams are doing more and more tasks in their day-to-day lives.

As we have seen throughout this Blog, understanding how network management protocols work is essential for communication, business continuity and security, which together have a great impact on organizations to:

  • Establish and maintain stable connections between devices on the same network, which in turn results in less latency and a better experience for network users.
  • Manage and combine multiple network connections, even from a single link, which can strengthen the connection and prevent potential failures.
  • Identify and solve errors that affect the network, evaluating the quality of the connection and solving problems (lower latency, communication reestablishment, risk prevention in operations, etc.)
  • Establish strategies to protect the network and the data transmitted through it, relying on encryption, entity authentication (of devices or users), transport security (between one device and another).
  • Implementing performance metrics that ensure quality service levels.

Key Tasks and Benefits in Network Management

Efficient network administration involves device connectivity, access systems, network automation, server connectivity, switch management and network security, so it is recommended to carry out the following tasks:

  • Strategies for Upgrades and Effective Maintenance: One of the big challenges is achieving end-to-end network visibility in an increasingly complex business environment. Most IT professionals have an incomplete understanding of how their network is set up, as new components, hardware, switches, devices, etc. are constantly being added, so it is vital to maintain an up-to-date catalog of your network and provide proper maintenance to guide network management principles and enforce the correct policies. You also have to consider that there are resource changes in your IT team. It is possible that the original administrator who defined the network topology and required protocols may no longer be available, which could result in having to undergo a full network administration review and incur additional costs. This can be avoided by detailed documentation of configurations, security policies, and architectures to ensure that management practices remain reusable over time.
  • Rigorous Performance Monitoring: Network management demands performance monitoring (e.g. with a dashboard with performance indicators) consistently and rigorously with defined standards to provide the best service and a satisfactory usage experience without latency and as stable as possible. Previously this was a greater challenge when traditional network environments relied primarily on hardware for multiple devices, computers, and managed servers; today, advances in software-defined networking technology make it possible to standardize processes and minimize human effort to monitor performance in real time. It is also recommended to ensure that network management software is not biased towards one or a few original equipment manufacturers (OEMs) to avoid dependence on one or a few vendors in the long run. The impact would also be seen in the difficulty in diversifying IT investments over time.
  • Downtime Prevention: A team designated for network failure management allows you to anticipate, detect and resolve network incidents to minimize downtime. On top of that, the team is responsible for logging information about failures, performing logs, analyzing, and assisting in periodic audits. This implies that the network failure management team has the ability to report to the network administrator to maintain transparency, and to be in close collaboration with the end user in case failures need to be reported. Also, it is recommended to rely on a Managed Service Provider (MSP) as an external partner that can assist in the design and implementation of the network and in routine maintenance, security controls and configuration changes, in addition to being able to support on-site management and support.
  • Network Security Threat and Protection Management: Business processes are increasingly moving online, so network security is vital to achieving resilience, alongside risk management.
    A regular stream of logs is generated in an enterprise network and analyzed by the network security management team to find digital fingerprints of threats. Depending on the business and the size of the organization, it is possible to have equipment or personnel assigned for each type of network management. Although it is also recommended to rely on services managed by experts in the industry in which the organization operates, with a clear knowledge of common risks, best security practices and with experts in the field of security that constantly evolves and becomes more sophisticated.
  • Agile IP Address Management and Efficient Provisioning: Network protocols are the backbone of digital communication with rules and procedures on how data is transmitted between devices within a network, regardless of the hardware or software involved. Provisioning must contemplate the IT infrastructure in the company and the flow and transit of data at different levels from the network, including servers, applications and users to provide connectivity and security (also managing devices and user identities).
    Another important task in network management is transparency about usage, anomalies and usage trends for different functions or business units and even individual users. This is of particular value for large companies in that they must make transparent the use of shared services that rent network resources to different branches and subsidiaries to maintain an internal profit margin.

Summary and conclusions

In business digitization, Network Management Protocols aims to take actions and standardize processes to achieve a secure, reliable and high-performance network for end users (employees, partners, suppliers and end customers). Companies distributed in different geographies depend on Network Management Protocols to keep the different business areas, functions and business teams connected, allowing the flow of data inside and outside the company, whether on local servers, private clouds or public clouds.
As technology continues to evolve, so do network protocols. The IT strategist and the teams assigned to network management must prepare for the future of network protocols and the integration of emerging technologies, to take advantage of advances in speed, reliability and security. For example, 5G is a technology that is expected to have a significant impact on networks, driven by the need for greater connectivity and lower latency. People’s daily lives also involve connecting objects (vehicles, appliances, sensors, etc.), revolutionizing networks to meet the Internet of Things. In Security, more robust network protocols are being developed, such as Transport Layer Security (TLS), which encrypts transmitted data to prevent access or manipulation by third parties.
All this tells us that the development of network protocols will not slow down in the short term as we move towards an increasingly connected world.
Pandora FMS works with the three main protocols for network management to offer a comprehensive and flexible monitoring solution. Check with Pandora FMS sales team for a free trial of the most flexible monitoring software on the market: https://pandorafms.com/en/free-trial/
Also, remember that if your monitoring needs are more limited, you have at your disposal the OpenSource version of Pandora FMS. Find out more here: http://pandorafms.com/community
Do not hesitate to send us your queries. Our Pandora FMS team will be glad to assist you!

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Microsoft 365 Backup: What it means for SaaS data protection

At the Microsoft Ignite conference back in November 2023, Microsoft announced their release plans for their Microsoft 365 Backup service. Now that they’re in a paid public preview, with general availability being slated for basically now (first quarter, calendar year 2024), I thought “what better time than now?” to share my takeaways and what I believe this milestone means for SaaS data protection now and going forward. Here are three main points I’ll cover:

  • Welcome Microsoft to the backup space; 
  • What Microsoft’s backup service means for the SaaS data protection world; 
  • The Keepit promise.

Welcome to Microsoft into the backup space

First off, let’s give a warm welcome to Microsoft on their entrance to the backup space. As a long-time Microsoft community member, twenty-year Microsoft MVP, and Senior Director of Product Management at an industry-leading data protection vendor, I’d say Microsoft’s entry into the market validates what all the SaaS data protection vendors have long been saying about the strong need for Microsoft 365 data protection.

Ultimately, our mission is to protect critical SaaS data to help companies keep their business-critical data backed up, thereby ensuring continuity and compliance in face of rising ransomware threats. As long-time Microsoft partners — part of the ISV Partner Program — we at Keepit see this as an opportunity to have an even greater impact on the market. How’s that?

Well, we know that an overwhelming percentage of Microsoft’s enterprise customers have no backup. So, naturally, we want to bring that number down to boost cyber resilience of, say, critical infrastructure and critical services, and of course the market in general. So, how does Microsoft releasing their own backup help drive us forward?

Well, for one, it validates what we’ve been doing for more than 20 years. We’re built in the cloud, for the cloud, to protect cloud SaaS data. I guess a bit more practically speaking, another change is that we can now probably drop the top objection we faced from customers over that time: That cloud SaaS data doesn’t need backup.

What does Microsoft 365 Backup change? 

Now, let’s get into point two: What does Microsoft 365 Backup mean for SaaS data backup? Well, all the vendors in this space have long had to challenge the popular notion that data being in the cloud was, by default, automatically and perfectly protected. And many of us have talked at length about Microsoft’s shared responsibility model where Microsoft themselves clearly state that you, the customer, are responsible for backup of information and data, including your devices and accounts and identities.

Microsoft has built an amazing record of service quality and resilience, but their primary focus has been on protecting your data against Microsoft losing it. The Microsoft 365 Backup offering is the start of Microsoft’s journey into protecting your data against other threats, including malicious attacks, mistakes, misbehaving automations, and other misfortunes.

The optimist in me hopes that now, with Microsoft themselves developing their own backup service, we can finally put the shared responsibility model into its proper perspective. Of course you need to back up your Entra ID, M365, and other SaaS application data because clearly you are responsible for your data. Why else would Microsoft release a backup service if you weren’t responsible for it all along?

Now, aside from that original objection that perhaps can be laid to rest, at this point, not that much has actually changed with Microsoft’s announcement. That said, there sure is a newly awakened interest in data protection because of this release. This is how I see the typical train of thought playing out in response to the news:

  • We clearly need to back up our Microsoft SaaS app data. Why else would Microsoft be offering a backup service themselves?
  • Protecting our data is important because it helps us meet our business continuity and compliance requirements, but
  • To meet those requirements, we need our data available 24/7.

Let’s dive down a bit more into that last point there. How does a business guarantee access to their data no matter what happens, be it mistakes, mishap, or malice (like ransomware)? The answer is true backup.

The Keepit promise: True backup for cyber resilience 

To get to the Keepit promise, we first need to consider what the meaning of backup is. You might come across the term true backup (we use it ourselves from time to time) because ‘backup’ alone has been misused to cover things that it shouldn’t.

The canonical meaning of backup refers to storing instances of your data on an infrastructure separate from your primary data. If something should happen to your production data, your backups won’t be affected since they are separated by a physical or logical air gap.

In cloud computing, a lot of what’s being called backup is actually storing data on the same cloud as the primary data. What this means is that whatever risks you’re exposed to in your production environment would also impact your ‘backup’ data since there’s no separation. For example, an attacker who can penetrate your Entra ID tenant and can pivot into your Azure tenant holds all your Azure-based storage — including, and especially, backups — at risk.

The Keepit promise is to always offer the ultimate in data protection for multi-workload SaaS application data. By building our solution from the ground up for SaaS data protection only, we were able to create an optimized data protection solution in line with best practices like the 321 backup rule. Air gapping, immutability, and a fully redundant independent cloud are all things we’re already offering now in our service. So, it’s more the Keepit reality rather than the promise of adding in things later.

Protecting SaaS data is the Keepit mission and has always been — it’s not a feature we’re tacking on. As specialists in data protection, we provide confidence to thousands of customers that their data is here today and will be here tomorrow via our vendor-independent cloud. We look forward to working with Microsoft now and into the future to continue to lead the way in protecting SaaS data.

As we embark on this new chapter in SaaS data backup, I’d like to leave you with a question: What steps are you taking today to protect your control plane (Entra ID and Power Platform)? If you want to learn a bit more about control plane data protection, read my previous article on why you should back up Entra ID (Azure AD) in the cloud.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

23.12.9 Voyager released

Changes compared to 23.12.8

New Features

  • Added support for Dark Mode to the Comet Server web interface

Bug Fixes

  • Fixed an issue preventing files from being backed up when stored in a OneDrive folder on MacOS
  • Fixed an issue in new Microsoft 365 SharePoint incremental backups referencing an invalid location in older snapshot formats
  • Fixed an issue with the Comet Server failing to start after deleting a tenant

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Introducing GREYCORTEX Mendel 4.3

We are happy to introduce the new version of GREYCORTEX Mendel. Version 4.3 enhances operational efficiency, security, and data management. This update strengthens OT capabilities and significantly improves IT security.

New version 4.3 includes these features:

  • Real-Time OT Metrics
  • Enhanced OT Capabilities
  • PCAP Recorder 2.0
  • NetFlow Processing Improvements
  • Expanded API Support
  • Improved User Experience

Explore more about GREYCORTEX Mendel 4.3

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

Head of SafeDNS’s Customer Support: “People lack a human touch – SafeDNS still provides it”

Today effective customer support is the backbone of any successful tech company. Joining us today is Leo Nagano, the Head of Customer Support at SafeDNS, who has climbed the ranks from a technical support agent to one of the key leaders in the company. He shares insights on his career path, team dynamics, and the unique approaches that set SafeDNS apart in the realm of customer service.

Background


Leo, I know that you have had quite an interesting journey in the world of customer support, starting as a technical support agent. Can you share with our followers how you transitioned from that role to your current position?

Absolutely. My journey began in a local telecom company, where my passion for technology propelled me rapidly from a regular technical support agent to a senior engineer. In this role, I juggled numerous responsibilities, including managing departmental tasks. My curiosity did not stop there. After mastering the telecom sector, I explored various IT niches in different companies, progressing through roles like team lead and senior engineer. This exploration led me to network operation companies and, eventually, to my current role at SafeDNS.


That is quite a trajectory! And speaking of your current role, could you give us a glimpse into the structure of your support team?

Certainly. Our team at SafeDNS consists of highly qualified technical support agents, operating around the clock. The majority are seasoned professionals, having been with us for over two years. This experience has fostered a robust technical team.

Support Philosophy & Strategy


What is the core philosophy that drives your approach to customer support?

Our ethos is simple yet powerful: do everything possible to aid our customers. We aim for a support process that is not just high-quality but also fast, accurate, and courteous. There is no room for irrelevant responses in our playbook.


How do you balance efficiency with the need for a personal touch in customer interactions?

It all boils down to passion. Loving your job naturally leads to a balance between efficiency and personal care in handling customer needs.

Challenges & Solutions


Every team faces challenges. What are the most common ones for your team, and how do you tackle them?

Our primary challenges include managing a seamless ticket workflow and providing dual support – both to end users and internally. The key is our team’s professionalism, which allows us to navigate these challenges effectively.


How do you handle situations where a customer might not be right?

These situations are less about proving someone wrong and more about guidance. We rely on our technical documentation to provide clear, standardized solutions.


And in moments of high pressure, like peak times, how do you prioritize issues?

Prioritizing critical issues swiftly is essential. When a major issue arises, we quickly assess and focus our collective efforts on resolving it.

Training & Development


Could you walk us through how you onboard new members into your support team?

Onboarding at SafeDNS is a meticulous process. We only seek candidates who excel in both customer service and technical skills. Effective communication with customers is sometimes even more crucial than technical expertise, yet we are dedicated to excelling in both areas. As a result, only a select few candidates can begin their probationary period. Once onboard, new agents are supported by a comprehensive knowledge base, senior agents, and a collaborative work environment, ensuring a smooth transition into their roles.

Tools & Technology


What tools does your team rely on, and why?

Our toolkit includes platforms like Freshworks, Intercom, Whatsapp Business, and an internal CRM manager, alongside various minor integrations. For example, Freshworks gives us extensive support solutions, and Intercom allows for smooth communication with our clients. WhatsApp Business offers an easy-to-use interface for quick and cost-effective interactions. Our internal CRM helps keep customer data organized, and other small integrations we use to make our processes more efficient. These tools are chosen for their convenience, reliability, and comprehensive features, enhancing our team’s productivity and support quality.


How do you incorporate technology, like AI or chatbots, into enhancing support experiences?

AI and chatbots are invaluable in improving our support services. This technology quickly handles simple, frequent questions, freeing our agents to deal with more intricate and tailored customer needs. It makes our support process more efficient and ensures prompt, precise help for our customers. AI and chatbots can also provide round-the-clock support for complex issues. Blending AI and chatbot capabilities with our skilled support team, we offer comprehensive support that caters to our customers’ varied needs.

Metrics & Feedback


What key metrics do you track and how do they guide your decision-making?

We monitor customer satisfaction scores (CSAT), first response and resolution times, and customer effort scores (CES). Reviewing CSAT scores helps us pinpoint where we can improve our services. Tracking how quickly we respond and resolve issues allows us to gauge our efficiency and manage our resources better, leading to a smoother support experience. Additionally, the customer effort score helps us assess how easily our customers can use our support and interact with our products or services.


How do you integrate customer feedback into improving your services?

We collect feedback through surveys, our website, social media, and emails. This data managed via our CRM and sentiment analysis tools, informs product and service enhancements through regular cross-functional reviews and agile methodologies.


What would you say about negative feedback? How do you turn it into an opportunity for improvement?

This may sound cliché but we do view it constructively. Our approach involves acknowledging the feedback, investigating the issue, and communicating transparently with the customer. I would like to underline that transparent communication is a key element, where we keep the customer informed about the steps, we are taking to address their concerns. Long story short, we always use negative feedback as a learning tool for internal improvements and to enhance our support services.

Employee Wellbeing


Given the demanding nature of support roles, how do you ensure the well-being and morale of your team members?

Our focus is on creating a positive work environment. For example, we conduct regular team building activities, organized both online and offline, with the aim of enhancing camaraderie among team members and getting rid of the tedious daily routine. Flexible working hours, remote work options, and accommodating special personal needs are some of the ways we ensure a good work-life balance. We also maintain open lines of communication by ensuring that all team members are free to voice their views, concerns, or positive feedback, ensuring that every opinion matters. Our team members set goals together, discussing career opportunities so that everybody can clearly see relevant growth opportunities within the company. What I am listing now is not just about our department, it is SafeDNS’ philosophy on how to interact with employees.


How do you address burnout within the team?

We actively monitor for signs of burnout. Flexible scheduling, workload rotation, emphasis on breaks, recognition, well-being programs, and vacation usage are among our key strategies to combat burnout. But I guess the main thing that helps prevent burnout is to discuss concerns. At SafeDNS every single person is open to discussing any problems.

Unique Approach at SafeDNS:


We have already talked about the technical aspects and philosophy behind SafeDNS support. Can you tell me what makes SafeDNS customer support different from other companies?

I would say it is our proactive approach and personalized support with human touch. For sure we are proud of our truly rapid response times, dedicated account management, and customer feedback integration but in the era of bots and artificial intelligence, people lack a human touch – SafeDNS still provides it. This sets us apart in the industry.


How is this unique approach developed and maintained?

Developing and maintaining our unique approach involves analyzing customer expectations, investing in team training, and establishing a customer-centric company culture. We try to combine a conservative but much-desired human approach with adaptation to technological trends in the industry.

Looking Ahead


Let’s look into the future. How do you envision the future of customer support with evolving technology? What emerging trends are you noticing in tech support, and how are you preparing for them?

Obviously the future of customer support lies in the seamless use of AI. I would add that sophisticated omnichannel experiences, advanced analytics for personalized support, and the use of AR and VR technologies will be an integral part of quality customer support as well. I personally believe that proactive communication and environmental sustainability will also be key aspects.

Since I have been asked about new trends, well, I can say that we are seeing the ubiquitous integration of artificial intelligence, an attempt to strengthen cyber defenses, and a remote work trend, which increases the volume of work. We do our best to keep up with trends and educate our staff, reinforce cybersecurity, leverage collaboration tools, and adopt eco-friendly practices.


What are your future plans?

We do plan to grow as professionals. The sky is the limit, you know. To put it into practice, we are going to develop our mentorship programs which will include more cross-trainings. And, of course, we are embracing the industry advancements to stay at the forefront.

Tips & Recommendations


Leo, could you share your top three tips for enhancing customer support?

Absolutely. First, prioritize clear customer communication. Second, invest in the training and development of your team. And third, wisely embrace technology to streamline processes and improve customer experiences.


And last but not least: are there any resources that have significantly influenced your approach to customer support?

Well, there are a few of them. I would list the following ones: “Delivering Happiness” by Tony Hsieh, “The Customer Support Handbook” by Sarah Hatter, a must-read no matter what sector you work in, and probably the courses on customer support from HubSpot Academy and Coursera. Blogs like Help Scout and Zendesk also provide regular industry insights.


Thanks a lot for your detailed answers and useful tips. Good luck to you and your team!

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.