Skip to content

ESET to enhance its MDR offering portfolio: Also bringing additional updates to its existing business offering

ESET enhances its ESET MDR offering portfolio with the introduction of two new subscription tiers, ESET PROTECT MDR and ESET PROTECT MDR Ultimate.
Both subscription tiers of the newly updated ESET business offering are built on top of ESET PROTECT Elite, representing a comprehensive security package.
Additionally, ESET Mobile Threat Defense will be added as a stand-alone module to extend cybersecurity protection to business mobile devices, increasing attack vector coverage to an organization’s entire mobile fleet.
Some further updates for ESET Server Security and ESET LiveGuard Advanced round out the new business offering. 

BRATISLAVA, Slovakia — April 29, 2024 — ESET, a global leader in cybersecurity solutions, is proud to announce today the launch of two new Managed Detection and Response (MDR) subscription tiers: ESET PROTECT MDR for small and medium businesses (SMBs) and ESET PROTECT MDR Ultimate for enterprises. These tiers are built on the foundation of the ESET PROTECT Elite subscription tier, offering businesses of all sizes the most comprehensive, AI-powered threat detection and response capabilities, in combination with expert human analysis and comprehensive threat intelligence.

ESET’s updated MDR business offering is designed to cater to the specific needs of both SMBs and Enterprises. To that end, ESET PROTECT MDR delivers a comprehensive cybersecurity package, offering 24/7/365 superior protection that addresses the most common challenges of small and medium-sized businesses. This includes modern protection for endpoints, email, and cloud applications, vulnerability detection and patching, and managed threat monitoring, hunting, and response. It addresses the cybersecurity talent shortages and ensures compliance with cyber insurance and regulations, offering a remarkable 20-minute average time to detect and respond, a comprehensive MDR dedicated dashboard and regular reporting for complete peace of mind.

For enterprises, ESET PROTECT MDR Ultimate offers continuous proactive protection and enhanced visibility, coupled with customized threat hunting and remote digital forensic incident response assistance. This comprehensive service is designed to support overstretched SOC teams, providing them with 24/7 access to world-class cybersecurity expertise. It ensures enterprises stay one step ahead of all known and emerging threats, effectively closing the cybersecurity skills gap, and facilitating expert consultations for incident management and containment in a fully managed experience.

ESET also sets itself apart with its own telemetry and unique global coverage, leveraging its detections and ESET Research to gather unique data about attacks, a competitive edge not offered by many players in the market.

“With the update of our business offering, we want to make ESET products accessible to customers without the necessary skill set or resources to operate them, but to also empower organizations to navigate the digital landscape confidently, safeguarded by our expertise and continuous, comprehensive coverage,” stated Michal Jankech, Vice President of SMB and MSP segment at ESET.

Additional updates to the ESET business portfolio

Additionally, all ESET PROTECT subscription tiers starting from ESET PROTECT Advanced are enhanced with the new stand-alone module ESET Mobile Threat Defense (EMTD). It extends attack vector coverage to an organization’s entire mobile fleet, seamlessly integrating into the ESET PROTECT Platform for efficient management, ensuring comprehensive protection for mobile devices. EMTD also includes a Mobile Device Management (MDM) functionality, with added support for Microsoft Entra ID.

Moreover, ESET Server Security introduces a firewall specifically designed for Windows servers, and Vulnerability & Patch Management, offering manual patch management and a 60-second delay of application process kill.

Finally, ESET LiveGuard Advanced now also offers advanced behavioral reports for our detection and response customers, providing an in-depth look into how our cloud sandboxing technology analyzes suspicious files, offering better visibility and context for security operators like cybersecurity and threat analysts, security engineers, or threat responders.

“This significant launch underscores ESET’s unwavering dedication to delivering superior protection and services, effectively responding to the dynamic challenges faced by customers to stay one step ahead of threats,” added Michal Jankech, Vice President of SMB and MSP segment at ESET.

For more detailed information about ESET and its updated portfolio, please visit the dedicated offering pages for SMBs and Enterprises.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

24.3.6 Voyager released

Changes compared to 24.3.5

Enhancements

  • Added the ability to configure SQL timeouts for MSSQL restores
  • Improved error message output for when a Hyper-V backup fails due to Hyper-V not being installed on the endpoint
  • Added additional threading to single file downloads from Microsoft 365, and added retry logic for when the download URL has expired. Expired URLs can cause 401 errors.

Bug Fixes

  • Fixed an issue causing a crash when data from multiple disks is selected for restore during granular restore workflows
  • Fixed an issue causing logins requiring 2FA to fail on the Comet Server web interface
  • Fixed an issue with the Comet Server web interface settings page to crash when a tenant has been deleted

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Juggling security: How many passwords does the average person have in 2024?

For nearly four years, the magic number in every cybersecurity expert’s mind was 100 – the average number of passwords a person handles. During the pandemic and following a boost in hybrid work and digital communication, our usage of digital spaces has only expanded. It’s time to look at the newest numbers: How many passwords does the average person have in 2024?

A survey conducted by NordPass in 2024 revealed a rapid growth in password usage for personal purposes, with an increase of nearly 70% in just over three years. According to the latest data, the number is now 168. For the first time, the survey also recorded the average number of passwords used for business-related accounts: 87. Let’s take a closer look at the research and learn what this increased number of passwords means for our online safety.

The upward-pointing trend

NordPass has been tracking password usage statistics since 2020. The first survey was conducted in February of that year, just a month before the start of the COVID-19 pandemic. It was reported that an average user handled around 80 passwords at that time.

The follow-up survey was conducted in October of the same year. Eight months into the pandemic, the uptick in password handling was already evident. The average number of passwords handled by a person went up 25% to the number cited since – 100.

As stated by Tomas Smalakys, CTO at NordPass, COVID was perceived as the main cause at the time, as people were staying indoors and handling all processes – from shopping to medical appointments – online.

However, a lot has changed in four years, and the rapid increase in digital accounts we handle now goes beyond the life rhythm of lockdowns. According to Smalakys, “the amount of accounts that people hold gets higher every year. Multiple factors come into play – new services get launched, new shops are opened.”

As the scope of digital services increases, so does the number of accounts users handle. Naturally, the latest password statistics reflect this. It’s important to note that the numbers don’t just consider active or frequently used accounts. In fact, many accounts remain dormant as users forget about them and don’t delete them even if the accounts are no longer needed.

First insights into business password handling

For the first time, the 2024 NordPass password survey also researched work-related password usage. It was revealed that the average number of passwords per person in the workplace is 87.

While this is a new index for the NordPass survey, we can assume that the number of accounts required for work has seen a similar upward trend in recent years as remote and hybrid work opportunities have become increasingly popular.

Adding the number of personal and business passwords together brings the total to 255. Juggling that many passwords can be problematic in terms of both security and convenience.

Methodology: The new quantitative research by NordPass was conducted on March 4-15, 2024, and surveyed 1,509 NordPass users.

What happens when you have too many passwords to remember?

The problem with handling so many accounts on average is that they aren’t equally important to a person. In fact, many accounts are abandoned or forgotten after a handful of visits. This can pose a serious security risk, as users may overlook data breaches and not realize their accounts have been compromised.

Managing hundreds of accounts can be a tedious job that not all users are willing or able to do. The trend points toward people hoarding their online accounts and forgetting to review and close accounts they don’t use as frequently or no longer require. In many cases, breaches are overlooked, as the users simply forget they have accounts on breached platforms.

Another issue concerns the reuse of passwords. With nearly 200 accounts to manage, creating and then remembering a unique password for each one can seem impossible. This leads to people reusing the same or similar passwords for different accounts to simplify logging in. For example, they may reuse the same word or phrase, adding a single number, capital letter, or special symbol if required for security purposes.

This opens up multiple accounts to vulnerabilities. For example, if one account is breached, all accounts using the same password and owned by that user are at risk. Abandoned accounts on rarely visited platforms with weaker security measures can become the prime target for cybercriminals.

The threat increases if people reuse the same credentials for both personal and work accounts. A breach of a personal account could potentially affect the company’s security as well. According to the 2023 Data Breach Investigations Report, stolen credentials were among the top three main methods of accessing an organization, followed by phishing and vulnerability exploitation. Password mismanagement and vulnerabilities pose risks ranging from loss of access to financial damages or identity theft.

What can you do to handle passwords easier?

You might be thinking about how many accounts you currently have and how many may use insecure passwords. To make your credentials management less overwhelming, here are some best practices you can follow to reduce the number of passwords used in your daily life:

  • Deactivate unused accounts. Considering how many passwords the average person has, tracking down every unused account you’ve created may be difficult. However, if you know for certain that you no longer need an account, deactivate it to reduce your password load.

  • Set up a password manager. As you work to reduce the number of accounts you own, you will encounter many that remain necessary. NordPass helps individuals and businesses manage their passwords with ease and security in mind. Its built-in features support generating unique and secure passwords, simplifying logging in with autofill, and accessing all sensitive data on desktop and mobile devices as well as major browsers.

  • Regularly update your credentials. The longer you use a password, the higher the chances of it being breached. If you regularly change your passwords, you keep your accounts safer. Password Health lets you see which of your login credentials are weak, old, or reused.

  • Make sure all passwords are strong. We recommend passwords be at least 20 characters long and contain a combination of letters, numbers, and special symbols. A password generator helps quickly create passwords that meet this criteria. For more tips on creating strong passwords, visit our dedicated blog post.

  • Stay ahead of breaches. Use the Data Breach Scanner to get real-time alerts if your passwords, email addresses, or credit card details have appeared on the dark web.

  • Enable multi-factor authentication (MFA). Add an extra layer of protection to your accounts and ensure that even if your password is compromised, cybercriminals cannot access the affected account.

  • Switch to a passwordless solution where possible. Passkeys are a new, more secure way of logging in to your accounts. They use a combination of biometric verification with cryptographic keys, offering a safer and more convenient alternative to passwords. NordPass lets you easily store and manage passkeys on different devices.

Whether you have 18 or 168 passwords, NordPass makes password management simple and convenient. Your passwords, passkeys, credit card details, and other sensitive information are protected in the xChaCha20-encrypted vault, which only you can access.

NordPass offers a range of features tailored for personal and business use, including Email Masking, passkey support, secure item sharing, centralized policies for companies, and an Activity Log. You can try NordPass Free and Premium for your personal use or sign up for one of the Business plans based on your organization’s needs.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Prevention-first security begins with data-enhanced insight: Meet ESET Threat Intelligence

Supporting threat hunters and incident response teams with hands-on data is crucial, as it not only safeguards organizations but provides the basis for a proactive prevention-first security strategy.

In recent years, a significant number of cyberattacks have been ransomware related and, despite fluctuations in frequency and intensity, they remain one of the most prevalent and feared security threats.

Ransomware attacks are highly orchestrated, but what makes them particularly insidious is that they are not merely automated programs running rampant through systems without direction but are often controlled minute-by-minute by human attackers. Once attackers utilize various Trojans to deploy the necessary tools, they meticulously navigate dozens of steps in search of valuable information within the compromised network. From there the options left open to defenders narrow, then increasingly become measures focused on mitigation — or worse, remediation.

The selection of “measures” is very much based on a keen understanding of the threats faced and any associated peculiarities, whether they be unique processes around privilege escalation or credential access techniques that enable cybercriminals to retrieve sensitive information until they can exfiltrate what they deem valuable. Every day, ESET Threat Intelligence (ETI) processes hundreds of millions of indicators of compromise (IOCs), akin to a database of clues left by cyber-intruders while they crawl through a victim’s network.

Preventing these chains of attacks is crucial since they can have long-lasting consequences, going beyond mere financial loss or data breach. They can provide leverage for future attacks and can sap the capacity and impact of defenders’ work across an organization’s entire threat surface. Working to avoid the narrowing of options means taking a prevention-first approach, putting in place preventive measures that stop ransomware payloads from reaching the endpoints. This process starts with insight and intelligence.

Putting threat intelligence to work

Researchers, SOC teams, threat hunters, and even curious prevention-minded admins can benefit from the types of threat intelligence that inform everything from replicated attack scenarios that aid red and blue team network defenders to security strategies, prevention measures, and detection and response incident triage.

ESET Threat Intelligence comes to users in highly accurate, curated, and actionable formats that amount to an up-to-date technical manual that enables customers to logically pursue a prevention-first approach to security.  Specifically, both (wider) industry and ESET Threat Intelligence data are compiled and ready to be paired with observations made via other tools, including XDR, SIEM, and/or SOAR, to prevent damages from (for example) ransomware and any subsequent extortion from taking place.

Users employing data/intel gathered in ETI for their inspection and/or monitoring of security incidents is just one way to create better-informed operators. In this use case, operators, increasingly supported by automation, can more consciously interact with incidents from an XDR’s triage system, for example, executables, malicious processes, computers, and threat indicators. From there, various forms of mitigation can be conducted in an informed, systematic, and prioritized manner. Specifically, an ESET user might employ ETI to cross-reference relevant data to better understand the actions necessary to perform in ESET INSPECT* (the XDR-enabling module of the ESET PROTECT platform).

The ransomware case here puts into focus why ESET Threat Intelligence, with its APT reports, unique data feeds, dashboard, and portal, has grown in popularity.

*ESET Threat Intelligence and ESET INSPECT (detection & response module) are not currently integrated via the ESET PROTECT platform.

Threat Intelligence – the tricks & trade of ransomware

In late 2023, ESET observed the SmokeLoader malware family, a generic backdoor with a range of capabilities that depend on the modules included in any given build of the malware, being utilized as one of the multiple variants packed by AceCryptor, a crypto service used worldwide by cybercriminals to obfuscate malware. SmokeLoader is deployed to download and execute the final payload of an attack discreetly, to evade security measures, making it crucial to rely on robust cyber defense mechanisms.

Defenders can specifically utilize ETI’s backend tracking systems to support an improved understanding of threats and apply their learnings to both prevention and proactive defense processes. ETI assembles all the clues needed to deploy prevention mechanisms and, when necessary, effectively mitigate against malware like SmokeLoader. Importantly, ETI’s benefits are vendor agnostic, so businesses already running alternate SIEM/SOAR products, including Microsoft Azure Sentinel, OpenCTI, IBM QRadar, Anomali and ThreatQuotient (outside of the ESET PROTECT ecosystem) can also gain from ETI’s unique data stream via our API.

This means that a wider spectrum of curious, prevention-minded admins can now turn to the main ESET research findings and other relevant data. These are published in regular reports on the ETI platform and portal and are accessible in specific territories, with ESET continuously working to expand their availability.

Delivering data to stop an attack before it happens

As with the SmokeLoader data, ETI clusters data on a wide spectrum of malware, finds similarities or particularities, highlights what stands out, and monitors attack chains and any changes in TTPs. This automation occurs in real time, continuously updating all feeds to provide end customers with the most important and immediately actionable intel on threats targeting them. These outputs are also synthesized into specific APT reports, which ensures customers receive pertinent information without being overwhelmed by excessive data.

ESET Threat Intelligence provides its data feeds to customers through the TAXII server, integrating it directly into their current systems, for example, Microsoft Sentinel or the OpenCTI Threat Intelligence Platform. The feeds cover various aspects of cybersecurity, including tracking malicious files, botnets, and APTs; identifying potentially harmful domains or URLs and IPs considered malicious; and tracking the associated data. To ensure compatibility and easy integration, the feeds are provided in widely used formats, such as JSON and STIX 2.1.

Fighting malicious activity

Preventing multifaceted threats from impacting your network, business continuity, and/or reputation requires a comprehensive and always up-to-date knowledge base. Thus, moving beyond the technical defenses against ransomware and other malware, security operators at organizations must adopt a knowledge-based security culture that puts learning on level with action.

The cornerstones of security are particularly essential at public and private institutions that depend on well-developed SOC teams, threat hunters, and security operators that have both technical skills and access to the ever-growing body of work on threat actors, system configuration, and an understanding of what is and isn’t working.

These cornerstones are where ESET Research employs its long history of collaboration with law enforcement agencies, the Joint Cyber Defense Collaborative, and even its work with “No More Ransom” to communicate our views on ransomware, fight threats at large, and inform how and why we’ve built our threat intelligence platform, ETI.

Explore your use case for ETI via ESET API, ESET APT reports, the ETI data feed, or a comprehensive toolset for an ESET-powered prevention-first approach.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Should the cybersecurity world prepare for AI-based critical infrastructure attacks?

Imagining a future, in which anyone could be attacked by an intelligence beyond the means of  humans is rather scary. Perhaps that’s why AI is better imagined as another tool to support people’s work. Again, however, the combined capability of such a human actor is also of concern, especially if said actor does not have their community’s best interests in mind.

With AI becoming increasingly important, just like companies, people race to figure out how it could be used to serve their own purposes, supporting their endeavors. Specifically in the field of cybersecurity, AI can serve both a constructive, but also a destructive role, with the former meaning the support of better cyber defense, and the latter attempting to cripple said cyber defenses.

Of specific concern is the potential for cyberattacks on critical infrastructure to become more widespread. Critical infrastructure, usually considered to include power generation and electrical grid, hospitals and healthcare systems, and the global supply chain, could also include digital supply chains and the internet itself. Depending on the specific needs, resources, and development level of a nation, critical infrastructure represents all the systems, networks, and assets that are essential, with their continued operation required to ensure the security of a given state, its economy, and the public’s health or safety. As the idea behind the attacks is to weaken adversaries by crippling their day-to-day business, an effective AI tool could, hypothetically, help bad actors commit attacks, or even increase the pool of potential attackers, by making malware coding easier. However, not everyone shares the same opinion.

The role of AI – can hacking become easier?

According to an interview with ESET security researcher Cameron Camp, we are not really close to “full AI-generated malware,” though ChatGPT is quite good at code suggestion, he says, generating code examples and snippets, debugging, and optimizing code, and even automating documentation.

He agreed that ChatGPT could be used as a handy tool to assist programmers, one that could serve as a first step toward building malware, but not yet, as it is currently rather shallow, makes errors, creates bogus answers and is not very reliable for anything serious.

Nonetheless, Mr. Camp highlighted three areas, which might be interesting from the perspective of language models: 

More convincing phishing – From probing more data sources and combining them seamlessly to create specifically crafted emails where clues to their malicious intentions would be very difficult to detect, readers will be hard-pressed not to fall for social engineering. Nor will people be able to spot phishing attempts simply due to sloppy language mistakes, as they could have convincing grammar.

More specifically, spear-phishing could become even more convincing, as tailor-made emails or messages, even including personalized emotional triggers, could become easier to construct thanks to AI help. These abilities will be further supported by with multilingual text-generating options, such methods might work on a wider, global scale, which in case the targeting of critical infrastructure of several states at once would serve a useful purpose.

Ransom negotiation automation – Smooth-talking ransomware operators are rare, but adding a little ChatGPT shine to the communications could lower the workload of attackers seeming legit during negotiations. This will also mean fewer mistakes that might enable defenders to home in on the true identities and locations of the operators.

Furthermore, thanks to easier video and voice generation with AI (see example here), malicious actors could become anyone, hiding their identities more efficiently. In fact, concerns about AI have become so widespread in this area that many professionals want to stipulate in their contracts a ban on the use of their work for AI purposes.

And if you don’t believe this, check out this video of President Biden, Trump and Obama discussing a videogame, all AI-generated, of course. Imagine how, during a ransomware attack, an online intruder could imitate a highly placed official to ask for access to a network or a system remotely…

Better phone scams – With natural language generation getting more natural, scammers will sound like they are from your area and have your best interests in mind. This is one of the first onboarding steps in a confidence scam: sounding more confident by sounding like they’re one of your people.

As long as scammers generate the right natural cadence to a person’s voice, they can easily fool their victims, but the problem with any AI-generated content today is that there is an inherent, let’s say, ‘artificiality’ to it, meaning that despite these voices, videos or text looking legit, they still harbor some specific mistakes or issues that are easy to spot, like how ChatGPT makes false statements or how its responses might seem like it is just regurgitating a Wikipedia page.

However, all of this does not mean that generative AI cannot be used for brainstorming, to create a base for some work, however, the correctness of the information one is provided should still be checked. The legal ramifications of using AI-generated content (sourced from the net) might also be something to consider.

Critical Infrastructure vs. AI – emerging legislation

As AI starts to play an increasingly important role in cybersecurity, businesses and governments will need to accommodate and use AI to their own advantage – as crooks will definitely try to do the same. From a July 2022 report by Acumen Research and Consulting, the global AI market was $14.9 billion in 2021 and is estimated to reach $133.8 billion by 2030.

Thanks to the growing use of the Internet of Things and other connected devices, cloud-based security services could provide new opportunities for the use of AI. Antivirus, data loss prevention, fraud detection, identity and access management, intrusion detection/prevention systems, and risk and compliance management services already use tools like Machine learning to create more resilient protection.

On the flip side, bad actors could also use AI to their advantage. With a large enough market of smart AI, crooks could easily use it to identify patterns in computer systems to reveal weaknesses in software or security programs, enabling them to exploit those newly discovered weaknesses.

So, critical infrastructure could become one of the targets. With AI attacking and defending it, going for a tit-for-tat, security actors and governments will have to remain smart. The European Union is already trying to assess the risks by proposing the EU AI Act, to govern its use in Europe, classifying different AI tools according to their perceived level of risk, from low to unacceptable. Governments and companies using these tools will have different obligations, depending on the risk level.

Some of these AI tools may be considered high risk, such as those used in critical infrastructure. Those using high-risk AIs will likely be obliged to complete rigorous risk assessments, log their activities, and make data available to authorities to scrutinize to increase compliance costs for companies.  In case a company breaks the rules, the fine would likely be around 30 million euros or up to 6% of their global profits.

Similar rules and ideas are included within the recently proposed EU Cyber Solidarity Act, as government officials try to stay ahead of critical infrastructure attacks.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET Announces Integration with Arctic Wolf to Deliver Next-Gen Detection and Response for Businesses

  • ESET Inspect has been integrated into Arctic Wolf’s Managed Detection and Response solution to provide proactive defense via their cloud-native platform and human expertise
  • Arctic Wolf customers will gain access to real-time global telemetry, detailed reports and actionable insights that arm them against more diverse and sophisticated attacks
  • The integration marks an important milestone for ESET as it expands its integrations platform and collaborates with best-in-class technology companies 

BRATISLAVAApril 24, 2024ESET, a global leader in next-gen digital security for business, today announced a new integration with Arctic Wolf, a global leader in security operations, to ensure increased visibility and protection against modern threats. By integrating ESET Inspect into Arctic Wolf’s Security Operations Platform, Arctic Wolf customers are able to enhance their security posture – aggregating vast amounts of data from diverse, global sources.

“Businesses today and the channel community are demanding technology ecosystems that simplify cybersecurity management, offer complete visibility across a variety of attack surfaces, and bring industry leaders together under one architecture,” said Trent Matchett, Director of Direct Channel
Global Sales at ESET. “We have invested significantly in the ESET PROTECT Platform and an open API gateway to empower an impressive catalogue of integration partners moving forward. Arctic Wolf is one of the most trusted MDR vendors in the world, and an exciting milestone for our integrations program.”

Arctic Wolf helps organizations end cyber risk by providing a cloud-native security operations platform, with solutions that include Managed Detection and Response, Managed Risk, Managed Security Awareness, and Incident Responses, each delivered through the industry-pioneering Concierge Delivery Model. Arctic Wolf’s Concierge Delivery Model provides tailored risk mitigation guidance and security insights based on the telemetry of the customer’s tech stack, like ESET Inspect, to keep an organization’s environment safe.

“Arctic Wolf and ESET share the common belief that embracing openness and interoperability are essential for helping to deliver the positive cybersecurity outcomes that organizations demand,” said Ian McShane, VP of Managed Detection and Response at Arctic Wolf.  “The new ESET PROTECT Platform API allows ESET Inspect data to seamlessly integrate with the Arctic Wolf Platform, that when combined with the telemetry from other security tools, ensure Arctic Wolf customers get holistic protection against an ever-evolving threat landscape.”

As a result of this integration, Arctic Wolf customers will gain access to:

  • Real-time Incident Response, including Post-Incident Analysis and Remediation:
    ESET Inspect will enable the detection of suspicious activity on a client’s endpoint, sending alerts to Arctic Wolf, who can then conduct a security investigation, confirming the threat and then employing immediate response followed by an analysis of the acquired data to assess the damage and prepare for future threats.
  • Regulatory Compliance:
    Because clients must comply with several regulatory standards that can require detailed logs of all activity on their endpoints, ESET Inspect will provide these logs so that Arctic Wolf can help their customers ensure compliance.
  • Managed Security for Resource Constrained Organizations :
    Many organizations often lack the resources to house internal security teams, so they contract an outside partner like Arctic Wolf to assist with their cyber defenses. Thanks to ESET Inspect and its data, Arctic Wolf customers will be better equipped to provide a high level of security to organizations of almost any size without them having to hire and train their own security personnel.

ESET Inspect acts as the XDR-enabling module of the ESET PROTECT platform, delivering breach prevention, enhanced visibility and remediation. ESET Inspect is a comprehensive detection and response with rich features such as: incident detection, incident management and response, data collection, indicators of compromise detection, anomaly detection, behavior detection and policy violations. For more information on ESET Inspect, visit here.

For more information on ESET’s investment on API integrations and opportunities to partner, visit here.

Find more information about how Arctic Wolf can help organizations end cyber risk here.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

A Brief Look at the Cyber Risk Institute’s Profile Version 2.0

The pressures on financial cybersecurity programs to maintain pace with both threats and regulatory changes is perhaps second to none (well, maybe the healthcare industry). Recognizing this, the Cyber Risk Institute (CRI) has recently unveiled Version 2.0 of its Cybersecurity Profile (CRI Profile), marking a significant step forward in the standardization and strengthening of cybersecurity measures across the financial sector.

The Evolution to Version 2.0 

Originally developed as a comprehensive framework tailored to the financial industry, the CRI Profile harmonizes a myriad of regulatory requirements into a single, streamlined set of guidelines. Its latest iteration, Version 2.0, builds on this foundation with extensive updates that reflect the latest cybersecurity trends and regulatory insights. The CRI, a not-for-profit coalition of financial institutions and trade associations, has engineered these changes to foster a more resilient financial infrastructure globally.

What’s New in Version 2.0?

The CRI Profile Version 2.0 introduces several key enhancements aimed at increasing its usability and effectiveness for financial institutions navigating the complex landscape of cybersecurity threats and regulatory pressures.

Enhanced Clarity and Usability

The new version has refined its control objectives and diagnostic statements, making them clearer and more actionable. This change helps institutions of all sizes more effectively implement the necessary cybersecurity measures and ensures that the guidelines are accessible to a broader range of professionals within the industry.

Expanded Coverage of Emerging Threats

Recognizing the dynamic nature of cyber threats, Version 2.0 includes updated guidelines that address recent security challenges, such as ransomware and supply chain attacks. These updates are critical as financial institutions increasingly rely on digital technologies that expose them to new vulnerabilities.

Streamlined Compliance

One of the standout features of the CRI Profile has always been its ability to simplify compliance by integrating various regulatory expectations into a single framework. Version 2.0 takes this further by enhancing the alignment with global standards such as ISO and NIST, thus reducing the compliance burden on institutions and allowing them to focus more on fortifying their defenses.

Focus on Cloud Security

With the financial sector’s growing dependence on cloud technologies, the new Profile version places a significant emphasis on cloud security. It provides detailed guidance on managing relationships with cloud service providers (CSPs) and ensuring that security measures are robust throughout the lifecycle of cloud services.

Benefits of Adopting CRI Profile Version 2.0

The adoption of the CRI Profile Version 2.0 offers numerous benefits for financial institutions:

  • Reduced Regulatory Complexity: By consolidating and clarifying regulatory expectations, the Profile simplifies the compliance landscape, making it easier for institutions to meet their obligations without excessive administrative burden.
  • Enhanced Cyber Resilience: The Profile’s comprehensive approach to cybersecurity, encompassing current threats and best practices, helps institutions strengthen their defenses against a broad spectrum of cyber risks.
  • Streamlined Communication: The common framework and language provided by the Profile facilitate clearer communication about cybersecurity expectations and practices between financial institutions and their regulators, partners, and service providers.
  • Cost Efficiency: By reducing redundancy in compliance efforts and focusing on effective risk management practices, institutions can optimize their cybersecurity investments and achieve better outcomes with fewer resources.

Looking Forward

The CRI’s continuous efforts to update and refine the Cybersecurity Profile underscore its commitment to keeping the financial sector secure and compliant in an age of digital transformation. As cyber threats evolve and new technologies emerge, the Profile serves as a living document, adapting to meet the needs of the industry. For financial institutions, embracing the CRI Profile Version 2.0 represents not just compliance, but a strategic advantage in the ongoing effort to protect their operations and customer data from cyber threats. As we look to the future, the role of standardized frameworks like the CRI Profile in promoting cybersecurity resilience cannot be overstated.

With its latest update, the CRI Profile continues to set the standard for cybersecurity in the financial sector. Version 2.0 of the Profile is a testament to the industry’s collective commitment to advancing cybersecurity standards and practices. For institutions ready to take their cybersecurity to the next level, the CRI Profile Version 2.0 offers a robust, tested, and comprehensive toolkit for achieving cyber resilience and regulatory compliance.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Portnox and Bugcrowd to Launch Private Bug Bounty Program to Provide Best-In-Class Unified Access Control

Austin, TX – April 23, 2024 – Portnox, a leading provider of cloud-native, zero trust access control solutions, today announced it will soon launch a private bug bounty program with Bugcrowd, the leader in crowdsourced security. The Portnox bug bounty program will offer a bounty for ethical hackers, also known as “white hat hackers,” to uncover and report software security vulnerabilities within Portnox’s production services. Bugcrowd will manage the submission and reward process, which is designed to ensure a streamlined experience for all participants. 

“This bug bounty program is part of our ongoing efforts to ensure that we provide customers with best-in-class security for their enterprise networks and applications,” said Denny LeCompte, CEO of Portnox. “Bugcrowd helps close the gap between security and development, so that we can continue to safely innovate.”

Participants can earn a range of payments, depending on the criticality of the submitted vulnerability. Ethical hackers that are already active on Bugcrowd are invited to participate in private bug bounty programs once they become active on the platform through hacking public bug bounties. Companies that currently participate in public bug bounty programs with Bugcrowd include Atlassian, ExpressVPN, Rapyd, T-Mobile, USAA, Viator, and more.

While aspects of hacking are being automated, and threat actors are using generative AI to increase the speed and number of enterprise attacks, the good guys have the same access to this technology. According to a 2023 Bugcrowd research report, 94% of ethical hackers plan to start using AI. By continuing to empower hackers on crowdsourced security platforms, Portnox starts to level the playing field, ultimately helping organizations keep their systems and data secure.

“Crowdsourced security provides companies like Portnox with an army of allies to take back control and outpace threat actors,” said Dave Gerry, CEO of Bugcrowd. “We are happy to work with Portnox to ensure that their customers have every reassurance that they are taking an aggressive and proactive approach to securing all potential attack surfaces.”.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

After the Click: The Inner Workings of Application Access

After the Click: The Inner Workings of Application Access

From social media and cloud-based services to anything and everything requiring an app, we spend a lot of time logging into applications. Have you ever stopped to wonder what happens after you click that login button? The inner workings of application access involve a complex interplay of authentication, authorization, APIs (application programming interfaces), security measures, and network conditions. Let’s take a closer look at what happens behind the scenes after the click.

The Initial Handshake – Understanding Authentication

The journey into an application begins with a crucial step known as authentication. This process is fundamentally about ensuring you are who you claim to be. A variety of methods can be employed for this purpose, each offering various levels of security and user convenience. Passwords, though widely used, represent just the tip of the iceberg. In recent years, more secure and sophisticated options like biometric verification — think fingerprint or facial recognition — have gained popularity. As it has become evident that passwords are not particularly secure, extra measures like multi-factor authentication and certificate-based authentication have become commonplace.  A digital handshake occurs between the user and the application upon successful authentication, establishing a trust relationship. This moment is critical; its where digital doors open, allowing access into the application’s ecosystem. However, it’s important to understand that this step doesn’t determine what you can do or see within the app. That’s governed by a subsequent process known as authorization.

Authorization and Access Control

Following successful authentication, the user’s journey within an application transitions to a critical phase known as authorization. This stage is instrumental in defining the scope of the user’s privileges and interactions within the app. Unlike authentication, which verifies identity, authorization delves into the specifics of what authenticated users are permitted to do. For instance, in a corporate setting, all employees can log onto the network, but only certain employees can see data specific to HR or Finance. This is known as role-based access control, a key part of zero trust where each employee has access only to what they need to do their job in order to defend against both external threats and potential internal misuse. This not only enhances the security posture of the application but also tailors the user experience by filtering accessible content and functionalities to meet the user’s needs and privileges. In essence, authorization acts as a sophisticated filter, carefully curating the user’s access to ensure it aligns with their rights and the organization’s policies, thereby maintaining the integrity and confidentiality of the application’s resources.

The Role of APIs in Application Access

APIs, or Application Programming Interfaces, are the unsung heroes of digital connectivity, seamlessly bridging the gap between disparate software systems. They serve as the essential conduits for data exchange, enabling your device to communicate with an application’s backend servers. Think of APIs as the linguistic experts of the digital world, translating requests and responses between your device and the app in a language they both can understand. This linguistic dexterity allows for the dynamic delivery of content and functionality, making your interactions with the app smooth and efficient.  In the context of application access, APIs are critical for executing a myriad of tasks behind the scenes. From the moment you authenticate, APIs are at work, fetching your profile information and preferences and customizing your in-app experience based on your permissions. They facilitate real-time data synchronization, ensuring the information you see is current and accurate. Additionally, APIs enable third-party integrations, allowing apps to offer enhanced features and capabilities by leveraging external services and data.  Moreover, APIs are pivotal in maintaining the security of the application access process. They enforce strict data access protocols, ensuring that only authenticated and authorized requests are processed. This layer of security is crucial in protecting sensitive user information and preventing unauthorized access to the application.

Ensuring Security Throughout the Access Process

When it comes to application access, safeguarding against threats and vulnerabilities is a top priority for developers and IT professionals alike. Integral to maintaining this security are state-of-the-art encryption methods, which play a crucial role in protecting data as it travels across the internet. Encryption ensures that even if data is intercepted, it remains indecipherable to unauthorized parties.   To further bolster security, conditional access products are implemented to enforce security policies that prevent potentially compromised devices from gaining access. These systems are vital in identifying potential threats, allowing immediate action to mitigate risks.  Equally important is the process of rolling out timely updates and patches. This not only addresses known security flaws but also adapts to the continually evolving landscape of cyber threats. By staying ahead with these updates, applications can shield themselves against the latest exploits and attack vectors.  Together, these multifaceted security measures form a comprehensive approach to protecting the integrity of application access. Through diligent implementation and ongoing vigilance, developers and security teams work hand in hand to create a secure environment for users to connect and interact with applications.

The Impact of Network Conditions on Application Access

The quality of network connectivity is pivotal in determining the efficacy of accessing applications. Variabilities such as bandwidth availability, latency levels, and overall network congestion can significantly influence the ease with which users can connect to and interact with apps. Poor network connections can lead to frustrations like slow loading times, interrupted sessions, or even the inability to access certain functionalities within the application.  To address these challenges, developers implement various strategies aimed at optimizing the user experience under diverse network conditions. Techniques such as load balancing are utilized to distribute incoming application traffic across multiple servers, thereby preventing any single server from becoming a bottleneck. Content caching is another critical strategy, where frequently accessed data is temporarily stored closer to the user, reducing the need to fetch data from the application’s primary servers and thus speeding up access times. Additionally, network optimization efforts focus on streamlining data transmission paths and protocols to ensure efficient data flow even in less-than-ideal network environments.  These efforts are essential in ensuring that application access remains robust and user-centric, minimizing the impact of fluctuating network conditions on the overall digital experience. By proactively addressing these challenges, developers can ensure that applications remain accessible and performant, regardless of the underlying network state.

The Future of Application Access – Trends and Innovations

The trajectory of application access is being significantly influenced by emerging trends and technological breakthroughs. Among the most noteworthy is the shift towards Zero Trust security models, which assume no entity is trustworthy by default, whether inside or outside the network, dramatically altering traditional access paradigms. A key part of Zero Trust is the push towards passwordless authentication, which provides security beyond the simple password and even beyond multi-factor authentication methods which are increasingly falling prey to sophisticated hacks (and less sophisticated but no less effective social engineering techniques.)  Artificial intelligence and machine learning are playing increasingly crucial roles, enabling more personalized and adaptive access experiences. These technologies enhance security and make application access more intuitive and responsive to user behavior and environmental contexts.  As these trends converge, they herald a new era of application access, characterized by heightened security, improved efficiency, and a more seamless user experience. The ongoing innovations in this space promise to redefine our digital interactions, making the way we connect to applications more secure, efficient, and tailored to individual needs.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

10 best VPN books to update your online privacy knowledge

This is the age of the Virtual Private Network (VPN). More than 1.5 billion people worldwide rely on VPNs, and organizations of every type routinely use Virtual Private Networks to protect their privacy. 

Those statistics aren’t surprising. Using the internet would be much more dangerous without the protection offered by VPNs.

What is a VPN?

VPNs use encryption to create tunnels between digital locations. They shield information from external attackers, cutting the risk of data breaches. They allow streamers to work around geo-blockers, and they guard individual liberty against surveillance states.

However, VPN solutions come in many varieties, and effective privacy systems adapt to different network architectures or data flows. Integrating VPNs into your setup requires in-depth knowledge of the latest techniques.

If that sounds daunting, help is at hand. The digital privacy community hosts many articulate writers with in-depth VPN and general privacy knowledge. We’ve selected the best VPN books from 2024’s crop. Check out a few titles to boost your VPN awareness and find the perfect privacy solution.

Top 10 VPN books

  • The Art of Invisibility: The World’s Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

  • Extreme Privacy: What It Takes to Disappear in America

  • CCNP Security Virtual Private Networks SVPN 300-730 Official Cert Guide

  • Build Your Own VPN Server: A Step-by-Step Guide

  • Business VPNs: Digital Privacy for Businesses and Teams

  • Network Security Assessment 3e: Know Your Network

  • Implementing Always On VPN: Modern Mobility with Microsoft Windows 10 and Windows Server 2022

  • Zero Trust Security: An Enterprise Guide

  • Beginner’s Introduction To Privacy

  • The Watchman Guide to Privacy: Reclaim Your Digital, Financial, and Lifestyle Freedom

The Art of Invisibility

The best VPN books The Art of InvisibilityNobody understands privacy threats like an experienced hacker. Luckily, a few people have crossed over from the dark side to share their experiences.

Kevin Mitnick (who sadly passed away in 2023) was once enemy number one for the cybersecurity authorities. Years of breaching government and corporate networks gave him insider knowledge that few people can match.

Before he died, Mitnick left this fascinating book about what digital freedom means and how we can protect it. Mitnick shows the limitations of traditional security tools like firewalls and anti-virus scanners. Insider tips about evading hackers and clear-eyed analysis of digital surveillance make this a must-read for VPN users.

Extreme Privacy: What It Takes to Disappear in America

Michael Bazzell makes a living helping celebrities to avoid data breaches and unwanted disclosures. This background makes him well-placed to advise the general public about how to protect online privacy.

“Extreme Privacy” works well because Bazzell outlines a comprehensive blueprint for designing privacy solutions. Bazzell wrote the book with individuals in mind. However, businesses will also benefit from his experience and ideas.

CCNP Security Virtual Private Networks SVPN 300-730

Moving on to something more technical, this standard guide provides everything candidates need to know when seeking a Cisco VPN certificate. The guide also includes quizzes and sample tests to prepare readers, and the three authors are all seasoned Cisco experts.

Cisco serves around 50% of business VPN service users in the United States, and certification proves that organizations understand how to build secure electronic systems. However, the expertise included in this textbook makes it a valuable read for all VPN engineers.

Build Your Own VPN Server: A Step-by-Step Guide

The best VPN books Build Your Own VPN Server

Building a VPN server is a tricky task. One configuration mistake can expose an entire network. Lin Song’s guide to open-source servers is the perfect starting point for companies developing independent privacy infrastructure.

Step-by-step instructions lead readers through configuration procedures for popular VPN protocols. Song covers Wireguard, IPSec, and OpenVPN. He also pitches advice at all major operating systems, always using accessible language.

Business VPNs: Digital Privacy for Businesses and Teams

The best VPN books Business VPNs

Gargiulo and Myers have helped hundreds of businesses implement site-to-site and single-site VPN coverage. This concise guide summarizes their expertise, providing practical ways to balance privacy and business efficiency.

“Business VPNs” will help companies select VPN solutions that suit their networks. However, it goes further than that, offering case studies about managing and maintaining VPNs to block malicious threats. Guidance covers access management, deploying firewalls, and secure configuration policies. Every section connects with everyday business users via case studies and real-world tips.

Network Security Assessment 3e: Know Your Network

This classic from O’Reilly explains how to carry out aggressive secure electronic network testing, including assessments of VPN protection. McNab’s textbook defines network testing best practices, with sections for email servers, VPN protocols, general network protocols, and operating systems.

Note: This book has various editions. The most recent was published in 2016 and is much more useful than earlier versions.

Implementing Always On VPN

The best VPN books Implementing Always On VPN

Microsoft’s Always On VPN is a popular way to secure cloud assets, protect remote devices, and integrate security systems with Active Directory. However, setting up an enterprise-wide Always On VPN can be tricky.

Richard Hicks cuts through the complexity, explaining VPN basics and core Always On features. If you want to connect VPN coverage to Azure deployments, his guide will show the way.

Zero Trust Security: An Enterprise Guide

Zero Trust is a critical security concept that treats all network users with suspicion unless they can supply proper credentials. VPNs play a central role in Zero Trust architecture by concealing sensitive data behind a wall of encryption.

This explainer covers more than just virtual private networks. Garbis and Chapman discuss firewalls, access management, public key infrastructure, and intrusion detection systems. The authors cover every component of Zero Trust network security.

However, we’ve included it in our VPN books list because the Zero Trust framework enables companies to make their VPNs more effective. And if you are interested in privacy, Zero Trust is something you need to know about — making this an essential read.

Beginner’s Introduction To Privacy

Sometimes, it helps to take a step back from VPN technology and assess the general privacy landscape. Brockwell’s short guide to privacy does just that. She explores what privacy means in the digital world and how we can protect our data against malicious threats.

Don’t expect in-depth technical specifications or excessive jargon. The strength of this book is how Brockwell makes complex ideas accessible and readable. It’s the ideal volume to skim through to remind yourself why privacy matters so much.

The Watchman Guide to Privacy

Better known as “the Watchman” in the privacy podcast world, Gabriel Custodiet is among the most creative privacy commentators. This general guide acts as a manual for modern businesses and individuals as they secure network assets against an endless stream of threats and snoopers.

While Custodiet ranges well beyond VPNs, digital privacy is his core focus. The book features plenty of nuggets of information about how to use encryption and choose the right VPN services. And the rest of the book is crammed with eye-opening material, from smartphone security to protecting financial assets.

Go beyond books to expand your VPN learning horizon

Books are indispensable tools to access knowledge and learn new skills. The publications above offer real-world advice and technical guidance for many critical VPN challenges. However, they aren’t the last word in building cybersecurity expertise.

The digital world offers security teams plenty of additional routes to VPN mastery. Wise organizations leverage as many information sources as possible to stay informed about security developments.

For example, VPN companies are often keen to provide information to potential customers. They realize that privacy protection is a grey area for many non-specialists. Educating customers helps them grow their client base while encouraging safer online behavior.

Some companies maintain learning centers that collate expert guidance in an easily searchable format. The NordLayer Learning Center is a great example, covering vast ground across every conceivable security topic.

Privacy podcasts provide regular updates from the coal face. Check out the IEEE’s Digital Privacy Podcasts for expert perspectives. Bookmark CPO Magazine as well for executive-level privacy insights and product reviews.

Sometimes, despite all the reading in the world, expert assistance is the only solution. NordLayer can help you navigate the complexities of VPN configuration. Explore Business VPN solutions that combine watertight security with flexible access and efficient performance. Get in touch with our team to discover more.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.