Skip to content

Corel acquires Awingu, creating next-level remote access and workspace capabilities

I’m thrilled to announce that Canadian-based Corel has acquired Awingu. Awingu has experienced rapid growth over the last year as the global workforce embraces permanent remote and hybrid business models and this is a great time for the next chapter in our story. Awingu is known for its powerful simplicity, and is recognized as a Unified Workspace and Zero Trust solution by analysts such as Gartner and Forrester.

Corel is a leading provider of solutions that promote workplace creativity, productivity, and collaboration. It’s the home of Parallels, an award-winning virtualization and VDI solution that includes Parallels Remote Application Server (RAS) and Parallels Desktop. The acquisition of Awingu strengthens Corel’s ability to deliver a secure, productive remote workspace for its millions of users.

This is good news for our customers and partners! Joining forces with Corel doesn’t replace Awingu, but rather enhances its capabilities. We truly believe that Parallels and Awingu are complementary technologies that build on each other and are stronger together. The combination results in a unified product that leverages the unique strengths of both solutions and meets an urgent market need for remote access and workspace technology. It also gives Awingu technologists more access to R&D resources to further expand and enhance the Awingu offering in ways that may not have been possible before.

While the Awingu technology isn’t going anywhere, the Awingu brand will be replaced by the Parallels brand over time. As much as we loved and are proud of the Awingu brand, no longer will our Awingurus need to explain that Wingu is the Swahili word for cloud. The Awingu teams will stay in place and will gradually be combined with the Corel and Parallels teams. I am also pleased to announce that I’ll be joining the Corel team moving forward, and I’m excited about what the future holds for our combined companies.

This acquisition means that Awingu will be part of a larger organization with more scale in customer success, sales, marketing, product development and support. Our commercial leverage will grow significantly. Awingu has strong and growing coverage in EMEA, which will be extended by Parallels’ global channels and vice versa. This opens the door for even stronger proximity to customers and partners.

On behalf of the Awingu team, I want to say that I’m really looking forward to this new chapter. I wish to thank all Awingu partners and customers who have supported and trusted us. Our journey is only getting started!

We will continue to communicate to our partners and customers, as plans take more shape and operational realities start to change.

Warm Regards,

Walter Van Uytven, CEO Awingu

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Awingu
Awingu produces a browser-based Unified Workspace solution. It allows users to work and collaborate from virtually anywhere using any device compatible with HTML5 browsers. As a turnkey solution, Awingu offers businesses the ease and convenience of platform-independent mobility and offers everything you need to stay productive: legacy and cloud applications, documents and data. Awingu requires zero configuration and zero client software installation, making IT administration extremely simple.

You don’t know anything about Google Cloud monitoring

The fact that data centers have evolved a lot is undeniable. This has enabled storage evolution and the execution of online applications.

Now we often talk about hybrid clouds

*Yes, we don’t even take the time to explain what digital clouds are anymore and we even assume that everyone has their own, small but they have them.But when it comes to doing things big, it’s unavoidable to mention the giant Google Cloud®!

Pandora FMS and the famous Google Cloud monitoring

Pandora FMS® (PFMS) during the year 2020, in the midst of the pandemic, walked slowly but without any pause, their team did not stop at all

And there were great improvements in quality of use in 2020!

As it happens, that’s when we introduced Google Cloud monitoring. 

Let’s look at everything in that term!

Google Cloud Platform

Known simply as Google Cloud, this platform encompasses more than one hundred components (digital products). 

It is obvious that I will name only a few, since Pandora FMS does not monitor them all

yet.

We will classify them in several main sections:

  1. Compute Engine: To run applications and virtual machines, Kubernetes, functions as services, among others.
  2. Storage & Databases: For file storage and execution of database engines, all this integrated with the previous point.
  3. Networking: For server load balancing (CDN, DNS, etc.).
  4. Big Data: Overly speaking, analysis of large, gigantic volumes of data that are then converted into usable information.
  5. Identity & Security: Everything related to online identification for own or third parties.
  6. IoT: For the Internet of Things.
  7. API Platform: Everything necessary for third party companies to communicate with all the paraphernalia of Google services and applications. *If you don’t know what an API is, here’s what you need to know.
  8. Cloud AI: The artificial intelligence cloud with lots of resources, limited only by your wallet.

*The latter is important, your wallet, not artificial intelligence. Because it is necessary to direct debit a bank account,  or a good credit card, the payments of all these services.

**At the time of writing, I do not know if the new Google Pay (formerly called Google Wallet ) is accepted as a means of payment (most likely, because it is from the same company).

In the case of Pandora FMS monitoring of Google Cloud it is only available for the Enterprise version.

But erase those sad faces because you can request a 30-day free trial by accessing this link!

Again the change

If there’s one thing that characterizes Google since I saw it born, it’s the constant change.

As well as the number of products and services they have is immense, no  less small is the number of them that have been discontinued or withdrawn from the catalog. 

While I still keep my Hotmail email account (not available to new users), Google at most has come to offer some product similar to the one they withdraw, accompanied by a package of instructions for us to do the data migrations. 

When they say it’s over, it’s over.

Therefore, dear readers of the future, if this has happened again, please write it down in the comments below.

 *We read them all.

Monitoring Google Cloud

Pandora FMS is able to monitor Amazon Web Services (AWS) and Microsoft Azure, so Google Cloud monitoring shares certain similarities.

Broadly speaking, the procedure is as follows:

  1. We activated the encryption of PFMS database.
  2. If the cloud component is not installed, you may download it from PFMS Enterprise library.
  3. Now you have to manage the credentials at Google level.
  4. Generate a service user in Google Cloud, and download a file in JSON format.
  5. With this JSON file you will create the authentication account in Pandora FMS.
  6. Once this is done, go back to Discovery Cloud and use the new credentials to access Google.
  7. Select the monitoring you need and click accept and wait for all connections to be made. This link contains the metrics available from Compute Engine.
  8. You will then have the main Google Cloud agent, one for each zone in which you have machines, and another agent for each virtual machine.

*Our official documentation provides more detail of the entire procedure.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

What is HIPAA? The Scope, Purpose and How to Comply

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is the federal law that created national standards for protecting sensitive patient health information from being disclosed without the patient’s knowledge or consent. Read more about this US regulation and find out how to comply.

What is HIPAA?

The Health Insurance Portability and Accountability Act (HIPAA) was primarily about solving insurance coverage for individuals that are between jobs. Without this law, employees would have faced the risk of losing their insurance coverage for the period between jobs.

Another goal was to ensure that all data is properly secured and no unauthorized individuals can access healthcare data.

HIPAA applies in the United States and is regulated by the Department of Health and Human Services’ Office for Civil Rights (OCR).

Purpose of HIPAA

The HIPAA was created in order to modernize the flow of healthcare information and to make sure that Personally Identifiable Information gathered in healthcare and insurance companies are protected against fraud and theft, and cannot be disclosed without consent.

Patients’ healthcare information is treated more sensitively and can be quickly accessed by various healthcare providers. HIPAA regulations require that records are better secured and protected against leakage.

What is Protected Health Information?

Any company or individual that works with Protected Health Information (PHI) needs to be compliant with HIPAA. PHI is created when any health data is combined with personally identifiable information, such as the following:

  • Names 
  • Geographical identifiers 
  • Phone and fax numbers 
  • Email addresses 
  • Medical record numbers 
  • Account numbers 
  • Vehicle information 
  • Website URLs 
  • Fingerprints, retinal and voice prints 
  • Social security numbers 
  • Health insurance beneficiary numbers 
  • Certificate and license numbers 
  • Device information, IP addresses 
  • Full face photographs 

      When PHI is stored electronically, it’s called ePHI. 


      The Scope of HIPAA

      There are several entities that regularly work with Protected Health Information and therefore must follow The Health Insurance Portability and Accountability Act: 

      • Healthcare providers 
      • Health plans 
      • Healthcare clearinghouses 
      • Business associates 

        HIPAA Rules

        HIPAA consists of the following rules: 

        • Privacy Rule 
        • Security Rule 
        • Breach Notification Rule 
        • Omnibus Rule 
        • Enforcement Rule 


        HIPAA Privacy Rule 

        The Privacy Rule defines how, when and under what circumstances PHI can be used and disclosed. Without a patient’s prior consent, the use of information about the patient is limited. Patients and their representatives are allowed to obtain a copy of their health records and request corrections in case of errors.

        HIPAA Security Rule 

        The Security Rule sets standards to protect ePHI. The Security Rule must be followed by anyone who works with ePHI. Security Officers and Privacy Officers must perform risk assessments and audits to identify any threats to PHI integrity.

        Breach Notification Rule 

        The Department of Health and Human Services must be notified in case of a data breach, as must the affected individuals. If more than five hundred patients in a particular jurisdiction are affected, a press release must be issued in a news outlet covering the area.

        Omnibus Rule 

        The Omnibus Rule is a part of the HITECH Act (Health Information Technology for Economic and Clinical Health Act) that came into force in 2009 and was created to encourage the use of electronic health records by healthcare providers.

        The Omnibus Rule prohibits the use of PHI for marketing or fundraising purposes without authorization.

        Enforcement Rule 

        The Enforcement Rule is about determining the appropriate fine when a breach occurs. A fine can be lower in case of negligence, however if the violation happens due to willful neglect it can be much higher. 

          The Rights of Individuals

          Within the HIPAA Privacy Rule, individuals have the legal right to see and receive copies of medical information.  

          Individuals have the right to: 

          • Access PHI 
          • Amend PHI 
          • Request restriction on who uses PHI and how it is disclosed
          • Request confidential communications 
          • Request accounting of disclosures 
          • File a complaint 

          Even though patients have the right to access their records, some types of information are excluded from the Right to Access. The following information is excluded:

          Excluded information is the following: 

          • Quality assessment or improvement records 
          • Safety activity records
          • Business and management records 
          • Psychotherapy notes 
          • Information compiled for use in civil, criminal, or administrative action or proceedings 

            HIPAA Violations

            A HIPAA violation occurs when a HIPAA entity or a business associate fails to comply with any of the HIPAA Rules. Penalties for HIPAA violations are issued by the Department of Health and Human Services’ Office for Civil Rights (OCR) and state attorneys general. HIPAA uses four categories of penalties:

            • Tier 1: Lack of Knowledge 

            The entity was not aware of the violation; therefore, it could not have been avoided. The penalty per such violation is $120—$30,113.

            • Tier 2: Reasonable Cause 

            The entity should have been aware of the violation, however, could not have avoided it. The penalty per such violation is $1,205—$60,226. 

            • Tier 3: Willful Neglect 

            The entity willfully neglected HIPAA Rules, but tried to correct the violation. The penalty per such violation is $12,045—$60,226.

            • Tier 4: Willful Neglect and not corrected 

            The entity willfully neglected HIPAA Rules and didn’t make any attempt to correct the violation. The penalty per such violation is $60,226—$1,806,757. 

            The Most Common HIPAA Risks


            verified_user 

            Keeping unsecured records 

            Employees leave sensitive documents at their desks or don’t use passwords to access digital data. Make sure that the workspace is secured, and passwords are used at your company.

            no_encryption 

            Unencrypted data 

            Encryption of your data is not mandatory by HIPAA, but it is highly recommended. Even if data is leaked, when it is encrypted it can’t be accessed without authorization.

            phishing 

            Hacking or phishing campaigns 

            Keep your anti-virus software up to date, regularly change passwords and use a DLP solution to protect your data against leakage.

            laptop_mac 

            Loss or Theft of Devices 

            Valuable devices can be lost in the blink of an eye. Encrypt your data, so even if a device is lost, no one unauthorized can access it.

            group 

            Sharing PHI 

            Always keep in mind that people like to talk. Very often employees don’t even realize that they have been sharing sensitive information with each other. Educate them about sensitive data handling, and make sure that only authorized individuals can access the data. 

            school 

            Lack of employee training 

            Employees might not even realize that they have been working with PHI and the violation can be harmful to both the company and patients. Educate them regularly and make sure they understand what PHI and HIPAA are, as well as the consequences of violation.

            login 

            Unauthorized Access 

            Employees who are not authorized to process sensitive information can still access it and go through the documents. Set the proper security policies and make sure your employees are aware of them.

            Insider Threats in the Healthcare

            As you can see above, violations often stem from mistakes made by employees, whether they lose a device, click on a phishing campaign, or just talk with their colleagues about patients. HIPAA violations can happen easily. Insider threats can be either unintentional or malicious. However, 56% of insider threat incidents are caused by negligent employees.

            And according to Ponemon Institute, the average total cost of a data breach for healthcare companies jumped 29% to $9.23 million. Health and pharmaceuticals are among the industries with the highest annual insider threat costs, at over $10M per year (Ponemon Institute, 2022). 

            Read more about insider threats here.

            How to Secure Data For HIPAA Compliance?

              1. Encrypt your data 
              2. Adopt security policies and define authorized employees to access your PHI 
              3. Use a DLP solution to protect your data against insider threats and to enforce security policies. 
              4. Educate your employees on a regular basis 
              5. Secure your workplace, adopt policies on how to work with sensitive documents 

              How Safetica Secures Your Data For HIPAA Compliance?

              1. Safetica encrypts your data and keeps it protected in case of device loss or theft. 
              2. Safetica is a DLP solution that protects your data against insider threats. Define which operations can be risky and block them or make Safetica notify you and your employees about potential risks.
              3. With Safetica it is easy to adopt security policies and define authorized employees that can work with PHI. You can set your security policies and monitor whether your company’s sensitive data is being misused, and only allow authorized individuals to access it.
              4. Educate your employees on a regular basis. Safetica notifies your employees in the event of risky operations, so they are more aware of data security.
              5. Secure your workplace, and adopt policies on how to work with sensitive documents. Safetica performs security audits and provides you with regular reports that allow you to adjust your security policies.

              Customer Stories:
              How Safetica Helps in Healthcare

              Gyncentrum Clinic protects their clients’ sensitive data with Safetica. Read more here.

              Our staff, both administrative and medical, has access to our patients’ sensitive data on a daily basis. These are personal and medical information, examination results and psychological evaluations. Thanks to Safetica, I can, as the person responsible for data protection in the clinic, decide who has access, how data is processed and whether it can be shared with third parties or not. Employees’ activities are reported, and patients’ data protected.

              Says Paweł Czerwiński, Owner of Gyncentrum.

              Top 3 HIPAA Violations

              #1 Tricare 

              Number of records leaked: 5 million 

              Tricare is a healthcare program for active-duty troops, their family members, and military retirees. In September 2011, the company experienced a data breach. Backup tapes of electronic health records were stolen from the car of the person who was responsible for transporting these records.

              Types of data exposed:  

              • Social security numbers 
              • Names 
              • Addresses 
              • Phone numbers 
              • Personal health data 
              • Clinical notes 
              • Lab tests 
              • Prescription information 

                #2 Community Health Systems Data Breach 

                Number of records leaked: 4.5 million 

                In 2014, malware software was deployed and sensitive patient data was stolen. Patients who received treatment from the company in the previous 5 years were impacted.

                Types of data exposed: 

                • Names 
                • Birth dates 
                • Social security numbers 
                • Phone numbers 
                • Addresses 

                  #3 UCLA Health Data Breach 

                  Number of records leaked: 4.5 million 

                  In October 2014, UCLA experienced a cyberattack in which sensitive patient information was stolen.

                  Types of data exposed: 

                  • Names 
                  • Birth dates 
                  • Social security numbers 
                  • Medicaid 
                  • Health plan identification numbers 
                  • Medical data 

                    About Version 2 Limited
                    Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

                    About Safetica
                    Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

                    Cloud-Native TACACS+: Modern Network Device Administration

                    What is TACACS+?

                    TACACS+ is a remote authentication protocol that allows a remote access server to communicate with an authentication server in order to validate a user’s access to a network device such as a wireless access point or wired switch (i.e. network device administration).

                    Cloud-Native TACACS+ by Portnox

                    Portnox TACACS+-as-a-Service is the first and only cloud-native solution for network device administration – authentication, authorization, and accounting (AAA). TACACS+ by Portnox enables organizations to maintain transparent and secure administration of network devices by centralizing user authentication, access control policy enforcement, activity audit trails, and more – all from the cloud.

                    Authentication for Network Devices

                    Strengthen network device administration and improve organizational efficiency by authenticating users via Open LDAP, or Active Directory integration. Portnox supports Azure AD, Google Workspace, Microsoft AD, and OKTA.

                    Authorization & Access Control

                    Easily enforce network device access control policies that limit configuration changes to maintain administrative security. Dictate privilege levels, allowed services, the use of specific autocommands, custom attributes, and more.

                    Audit Trails & Accounting

                    Track user activity and attributes across network devices such as identities, start and stop times, executed commands, packet transfers, and much more to help maintain administrative transparency and streamline security audits.

                    Key TACACS+ Features from Portnox

                    System ArchitectureAuthentication MethodsAuthorization PoliciesAccounting RecordsIntegrations
                    Cloud-nativeAzure ADPrivilege levelsUser identitiesSIEM
                    MS Azure-hostedGoogle WorkspaceSession timeout valueStart / stop timesActive Directory
                    No upgradesMicrosoft ADAutocommandsExecuted commandsRESTful API
                    No patchesOKTAAllowed servicesPacket transfers 
                    Hardware agnosticOpenLDAPCustom attributesUS-ACII strings 
                    …and more

                    Network Device Administration with Portnox

                    About Version 2 Limited
                    Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

                    About Portnox
                    Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

                    Something IT professionals need to know and miss

                    At PAndora FMS we have IT professionals on an altar. Literally, one next to the water dispenser in the office. I’m serious! It even has its blessed liturgical cloth, its flattering parsley, its candles and the incense! But there are still things that these people miss. Here’s a hint: it’s related to ITOM.

                    IT Operations Management (ITOM) and automation

                    We all agree in the industry that IT professionals waste too much time every day, struggling with minor tasks within IT Operations Management (ITOM). 

                    And it is that ITOM covers everything necessary to support the network infrastructure that provides IT services. 

                    This includes both the hardware (switches, servers, data center firewalls…) as well as the company’s network and the tools needed to make sure everything works properly.

                    According to the latest surveys, 78% of IT professionals say they spend at least 10% of their time proactively optimizing their environments. 

                    This extra time spent on maintenance and conservation obviously takes time from proactive optimization. 

                    And this is where automation comes in. 

                    Automation is that miracle from heaven that sets IT professionals free to stop wasting time and focus on things that really matter, and not on boring tasks!

                    Of course, most IT professionals know firsthand the value of automation. 

                    That’s why they have their altar. *Visitable during working hours, and donations are accepted.

                    But automation has not yet reached ubiquity regarding ITOM. 

                    And it’s time for that to change!

                    That’s why we want you to start considering automating the following types of tasks:

                    • Complex tasks with multiple steps
                    • Repetitive routine tasks or tasks triggered by a recurring event
                    • Tasks where a large amount of data needs to be filtered based on specific, predefined criteria

                    As we said, in these cases, automation can help the incredible intellects of IT professionals, and their almost intrinsic creativity to focus on other needs.
                    Perhaps, even with automation, you will minimize the possibility of human error in tasks.

                    What is the next step?

                    Certainly the next step is to consider which are the most relevant ITOM tools. 

                    If your megalomaniac goal is, for example, to optimize a large government network, look for the products best designed to scale and then make sure the vendor and product are approved for use in government networks. 

                    Here, for example, the most relevant ITOM tools could be:

                    • Performance monitoring
                    • Configuration management
                    • Security and intrusion detection and prevention
                    • Troubleshooting

                    If you then relax and have a tea and take enough time to consider specific processes that can benefit from automation, such as automating network configurations, you may help out your IT professionals do more efficiently tasks like: 

                    Meeting compliance requirements, implementing configuration changes quickly and efficiently, or reducing downtime caused by faulty devices.

                    And network configuration automation is only one area from among them all. 

                    Think about the possibility of automating workflows and your IT staff crying dramatically when finally getting their lives back! 

                    Or automating tasks initiated by mobile devices, etc.

                    Prepare for change!

                    Naturally, automation leads us to the development of a new type of skills within IT staff. 

                    The more tasks are automated, the more IT professionals become automation supervisors instead of performing those tasks themselves.

                    That is, while before more specialized staff needed to understand perfectly what the inner workings of each piece of hardware were like, with automation, these people need to be much more aware of how the software works. 

                    They need to understand application programming interfaces and how they can dictate things like policies, rules, and user access.

                    Conclusions

                    ITOM and automation together are virtually the panacea for IT professionals. 

                    The secret of a successful transition is to go little by little, in a gradual and logical progression. 

                    Securing tasks, processes, and skill sets so that they move together toward a better future filled with altars in the office for IT professionals!

                    About Version 2 Limited
                    Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

                    About PandoraFMS
                    Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
                    Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

                    Awingu wins Data News’ “Digital Workplace Innovator of the Year” Award for Excellence

                    June 2nd 2022, Ghent/Brussels – Awingu is proud to have received the Data News “Digital Workplace Innovator of the Year” Award at yesterday’s Data News “Awards for Excellence 2022” event in Brussels Expo. The awards are the results of a solid selection process by the editorial staff of Data News, its readers and a jury of ICT professionals and thought leaders.

                    datanews-awards-digital-workplace-innovator-2
                    Proud Awingu CEO Walter Van Uytven received the award on stage

                    Back in 2016, Awingu won the Data News “Startup of the Year” Award. Hence, we see last night’s honor as a sign of recognition of our maturity and growth within the industry in the past 6 years. Given the fact that we were running against household names such as Delaware and Dell Technologies in the “Digital Workplace Innovator” category, we are all the more inspired to continue our mission to aid companies with their workspace transformation by making secure remote work available anywhere, on any device.

                    About Version 2 Limited
                    Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

                    About Awingu
                    Awingu produces a browser-based Unified Workspace solution. It allows users to work and collaborate from virtually anywhere using any device compatible with HTML5 browsers. As a turnkey solution, Awingu offers businesses the ease and convenience of platform-independent mobility and offers everything you need to stay productive: legacy and cloud applications, documents and data. Awingu requires zero configuration and zero client software installation, making IT administration extremely simple.

                    Why does Pandora FMS Open Source exist?

                    My name is Sancho and I am the person who started developing Pandora FMS in 2004. I want to tell you why Pandora FMS Open Source exists and why the community is so important to me.

                    We tell you why Pandora FMS Open Source exists

                    I always liked computers, I started with a ZX Spectrum and my first game was a hacked one. 

                    I had to teach myself how to peel a cable to plug the RCA video output into my father’s little TV. In fact, I think I’ve spent more time learning how to solder cables, copy games, and trick them than playing them themselves. 

                    In the 80s, technical knowledge was what someone could teach you, there was no Internet. And, as a child, I also didn’t have the resources to talk to expert adults. 

                    When the BBS (Bulletin Board Systems) arrived in Europe I was 14 years old. I still remember, with pristine clarity, the article from a computer magazine that filled my head with wonders: 

                    “Thousands of apps and games, access to information around the globe, messaging with users around the world…” 

                    I could learn anything!

                    And there were even many softwares that I could use without having to hack them!

                    When I connected to Fidonet in 1990 a world of possibilities opened up. 

                    I started talking to university students, set up a Fidonet node at home and had the need to do my first programs for my own BBS. It used RemoteAccess and FrontDoor, applications to give access to users and to connect to Fidonet through a modem over the telephone line.

                    I learned TurboPascal by reading documentation online and with photocopied books in English that other users lent me. 

                    A student at the University of Zaragoza lent me his credentials and I accessed the Internet for the first time through a RAS built on an HP-UX. 

                    I didn’t know what Unix was, but I had some commands written down to download things through FTP and then through Kermit to my computer. 

                    Along the way I had to stick with the AT commands and run head-on with the problem of being a 15-year-old boy who hires two phone lines for a BBS in a room of five square meters.

                    Antes de Pandora FMS Open Source

                    Thanks to other users I learned how to connect with the pair of tests in the phonebox of my house to call the US for free and download the McAfee antivirus updates, which I made available to everyone. 

                    I later learned how to connect to the internet through Compuserve using trial accounts that lasted 15 days. 

                    In short, I had an insatiable craving for knowledge

                    I loved to try, combine and dig

                    I used a lot of software that is now forgotten, such as Desqview or OS/2 Warp, to try to make my PC, made with second-hand parts, have the power to work in what became one of the largest BBS in Madrid (Edison BBS).  

                    All the software I developed (online games, time banks and things like that) I shared with other BBS Sysop, although my code was terrible. 

                    *Although no one cared much about the code because everything was to be done and the important thing was that it worked. 

                    Most of the programs I used had to be compiled by other people with more powerful PCs, my machine took days to compile and link the binaries.

                    Open Source Software Time

                    When I was in college, the Internet and ADSL came, as well as stacks of photocopied books. 

                    I tried programming video games and then my first job came. 

                    There I discovered that the Internet was a much, much bigger world than I had thought. Where there were servers and networks full of computers that people plugged into the web without notifying anyone, and lots of other stuff that appeared little by little… 

                    That’s when I discovered that it was necessary to bring order to so much chaos

                    I needed to know what was happening around me and monitor it. 

                    In each new work, that sense of chaos and lack of control grew. 

                    There did not seem to be a universal system to collect information and unify it, each had its applications, incompatible with the rest. Unlike the world of Star Trek where everything was compatible and universal.

                    That craving for knowledge and that habit of sharing at that time was not circumscribed to a philosophy, it did not have a name. It was a pure necessity: to share, learn, test, copy and modify.  

                    Some years later I discovered what the term Open Source meant. 

                    But it was just a name, the habit has been in me since I copied my first Game of Spectrum. 

                    *I once met in an interview an English developer older than me who had programmed one of those games, but that’s another story.

                    I spent many years learning thanks to others

                    Now I have to give back everything I have learned since my childhood. 

                    For me Open Source is not a license, it is not a political doctrine, it is not a fashion, it is a way of understanding life.

                    Sharing knowledge makes us better as individuals, as a society, and as professionals.

                    That is why Pandora FMS Open Source is not a “limited” version of the Enterprise version, no, the Open Source version has infinite documentation, in several languages, a changing documentation that includes everything, without secrets. 

                    The Open Source version not only has code, it has people who answer questions, guides and tutorials and has no limitations. 

                    It is made for that purpose, to bring order to chaos and allow anyone, programmer or not, to expand and improve it. Without having to share what you do, just let them use it however they want and for whatever they see fit.

                    There are many users, and companies, that like me when I was younger, cannot afford what an Enterprise license costs. 

                    I encourage them to use the Open Source version of Pandora FMS, not because it is free, but because you can learn without limit and can make Pandora FMS go far beyond what you think. 

                    Moreover, if they want, they can share their knowledge back and improve Pandora FMS. 

                    A code patch has the same value as a collection of icons or a Russian translation.

                    Where do we get the money?

                    Easy, not everyone has that craving for knowledge, to learn, to share. 

                    There are people who have their focus on managing problems, quickly and with professional help. 

                    They prefer an out-of-the-box tool that solves problems in hypercomplex and very specific environments. 

                    They still really want to learn and try, but they don’t have the time. Literally, their time is worth much more to their companies than Pandora FMS’s Enterprise license. 

                    Some Pandora FMS tools, such as policies, can be easily implemented using additional tools (or even your own scripts), but it takes time and knowledge. 

                    In the Enterprise version it is solved with a couple of mouse clicks.

                    The same goes for scalability. 

                    In the Enterprise version we support an active/passive HA system based on MySQL, any user can implement the same system as us, they can also build a Galley cluster to have almost infinite scalability, without the need to mount a Metaconsole (Enterprise). 

                    In fact we have some users who have been using Pandora FMS for many years with much larger environments than most of our Enterprise customers. 

                    I encourage you to see for yourself that the free spirit is still there! 

                    Call it OpenSource, free software, enter the license (GPL2), but above all: 

                    Learn, share and enjoy the process!

                    About Version 2 Limited
                    Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

                    About PandoraFMS
                    Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
                    Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

                    SCADAfence Named Winner of Three Prestigious InfoSec Awards During RSA Conference, 2022

                    SCADAfence Wins 3 Awards at RSA 2022 – 1. Most Innovative Governance, Risk and Compliance (GRC) 2. Next Gen ICS/SCADA Security  3. Most Innovative Internet of Things (IoT) Security  

                    San Francisco, California June 6, 2022 – SCADAfence, the global technology leader in OT & IoT cyber security, is proud to announce we have won the following awards from Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine:

                    • Most Innovative Governance, Risk and Compliance (GRC)
                    • Next Gen ICS/SCADA Security
                    • Most Innovative Internet of Things (IoT) Security

                    SCADAfence has won the award for Most Innovative Governance, Risk and Compliance (GRC) in recognition of the governance portal, which provides a multi-site regulatory and policy compliance framework. The portal provides companies with OT networks increased readiness and compliance for organizational policies and regulations. The SCADAfence governance portal is unique in the marketplace, that allows organizations to audit compliance based on real traffic data across multiple sites, and provides ready-to-use compliance dashboard and reports. SCADAfence is currently the only vendor who offers this technology.

                    Additionally, SCADAfence has won the award for Next Gen Next Gen ICS/SCADA Security since they have a unique Micro Granular Baseline technology. This technology learns every device granularly, per asset and per traffic characteristics. This unique technology provides the most accurate detection mechanism, and dramatically reduces false-positives without the need to reconfigure the baseline upon any changes. Customers get baselining results in hours vs weeks and it keeps getting smarter with advanced AI capabilities.

                    SCADAfence has also won the award for Most Innovative Internet of Things (IoT) Security, for their ability to provide comprehensive protection to complex industrial IIoT networks comprising thousands of devices from various manufacturers with multiple vulnerabilities.

                    “We’re thrilled to receive one of the most prestigious and coveted cybersecurity awards in the world from Cyber Defense Magazine” said Elad Ben-Meir, CEO of SCADAfence. “We knew the competition would be tough and fierce. We couldn’t be more pleased to be recognized as Innovators and leaders in the OT security industry.”

                    “SCADAfence embodies three major features the judges look for to become winners: understanding tomorrow’s threats, today, providing a cost-effective solution and innovating in unexpected ways that can help stop the next breach,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

                    We’re thrilled to be a part of  this coveted group of winners, located here: www.cyberdefenseawards.com/

                    About SCADAfence

                    SCADAfence is the global technology leader in OT & IoT cyber security. The SCADAfence platform enables organizations with complex OT networks to embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. The non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and governance with minimal false-positives. SCADAfence delivers proactive security and visibility to some of the world’s most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in manufacturing, building management and critical infrastructure industries to operate securely, reliably and efficiently. To learn more, go to http://www.scadafence.com

                    About CDM InfoSec Awards

                    This is Cyber Defense Magazine’s eighth year of honoring InfoSec innovators. Our submission requirements are for any startup, early stage, later stage or public companies in the INFORMATION SECURITY (INFOSEC) space who believe they have a unique and compelling value proposition for their product or service. Learn more at http://www.cyberdefenseawards.com

                    About the Judging

                    The judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company submitted materials on the website of each submission including but not limited to data sheets, white papers, product literature and other market variables. CDM has a flexible philosophy to find more innovative players with new and unique technologies, than the one with the most customers or money in the bank. CDM is always asking “What’s Next?” so we are looking for Next Generation InfoSec Solutions.

                    About Cyber Defense Magazine

                    With over 5 Million monthly readers and growing, and over 17,000 pages of searchable online infosec content, Cyber Defense Magazine and our sister magazine being announced after the show is the premier source of IT Security information. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry. We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conference. CDM is a proud member of the Cyber Defense Media Group, a division of Ingersoll Lockwood. Learn more about us at http://www.cyberdefensemagazine.com and visit http://www.cyberdefensetv.com and http://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives.

                    About Version 2 Limited
                    Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.