Skip to content

Locked Shields 2024: ESET bolsters Slovak cyber defense during live-fire NATO exercise

BRATISLAVA — May 3, 2024 — Experts from ESET joined with the combined team of the Slovak Republic and Hungary militaries to participate in Locked Shields 2024 – the biggest and most complex cyber defense exercise in the world. The live-fire exercise, involving 40 countries, saw ESET contribute security solutions and more than 50 experts to a number of tactical teams, ensuring a top-flight position for the central European country which participates in the annual exercise run by NATO’s Cooperative Cyber Defense Centre of Excellence (NATO CCD COE). 

With collaboration being the focus of the 14th annual exercise (the slogan being “Cooperation Is Our Protection”), ESET supplied the Slovak-Hungarian team with defensive capabilities which particularly contributed to the team’s top three placings in cyber threat intelligence, client-side protection, forensics and strategic communications, taking home an overall 4th place position among the 18 participating teams made up of similar cross-country units.

The Slovak-Hungarian team successfully followed its strategic objectives and was built not only on expertise and state-of-the-art security technologies, but most importantly on communication and intensive cooperation between the participants, who worked together to defend the vital infrastructure of fictitious country Berylia in the face of massive cyber attacks designed to cripple the country and create public unrest.

“Locked Shields promotes the concept that collaboration is one of NATO’s greatest strengths – increasing the level of protection for all member states, their people, businesses and critical infrastructure,” said Juraj Malcho, CTO of ESET.  “ESET is proud to support the Slovak Ministry of Defense in this live fire exercise, by providing experts in cyber security, forensics, threat intelligence, legal and strategic communications, as well as our XDR cybersecurity platform ESET PROTECT. Together, we are stronger against any powerful adversary wishing to cause disruption.”

The Slovak team was led by the Cyber Defense Center of Slovak Military Intelligence. During the exercise, the Slovak government sector was represented by experts from the ministries of defense, finance, interior, transport, and foreign affairs. ESET’s experts and technologies contributed to the rapid detection and response to cyberattacks. Experts from the Slovak branch of Palo Alto Networks and Orange Slovensko a.s. also helped with both securing and management of the infrastructure. The team dealing with cyberspace legal challenges was led by an expert from SIGNUM legal s.r.o. talented students and their professors from the Slovak University of Technology in Bratislava, Comenius University in Bratislava, the Armed Forces Academy of general Milan Rastislav Štefánik, and young Slovak talents studying at foreign universities also came to support the national team.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET Threat Intelligence increases cybersecurity visibility through Elastic integration

  • ESET announces strategic integration with Elastic Security, enhancing cybersecurity analytics and visibility through advanced threat intelligence feeds.
  • The integration offers deduplicated, highly curated feeds based on proprietary ESET research and telemetry.
  • Elastic users will benefit from enhanced geographical visibility, reduced false positives, prevention of IoCs, and contextual investigations.

BRATISLAVAMay 3, 2024ESET, a global digital security company, has announced another strategic partnership and integration, thanks to its unified API gateway. This development facilitates seamless connections with various cybersecurity vendors, such as the recent integration with Elastic, a leading search AI company. This move is part of ESET’s broader strategy to support multi-vendor integrations aimed at strengthening overall cybersecurity defenses. By working with Elastic, ESET aims to provide organizations with enhanced analytics tools and greater visibility to enable more effective preventive measures against cyber threats.

Through this strategic partnership, Elastic’s users gain access to ESET’s advanced threat intelligence feeds, offering real-time data on indicators of compromise (IoCs), such as botnets, malicious domains, files, URLs, and IPs. These feeds also provide deep insights into the operations of notorious APT groups, sourced from ESET’s extensive malware and threat research. This integration enriches Elastic’s SIEM product, enabling security operators to leverage globally sourced threat data for unprecedented geographical visibility, dramatically reduced false positives – allowing for more accurate threat detection and analysis – and contextualized threat investigation.

The collaboration brings to the table ESET’s deduplicated and highly curated feeds, ensuring maximum effectiveness. Unique insights are drawn from proprietary ESET research and telemetry, not reliant on third-party sources. For optimal integration and interoperability, these feeds are delivered in the widely recognized TAXII/STIX 2.1 format.

ESET’s technological framework continuously scans for threats across various layers, from pre-boot to the resting state, providing global telemetry on emerging threats. This automation, supported by ESET’s leading cybersecurity team and 13 R&D centers worldwide, accelerates threat investigation and response. While machine learning aids in automating decisions, it’s ESET’s human expertise that underpins the evaluation and interpretation of threats, ensuring unparalleled accuracy and reliability.

“Our collaboration with Elastic not only marks a milestone in threat intelligence integration, but also represents a shared commitment to securing the digital landscape,” remarked Trent Matchett, ESET Director of Global Strategic Accounts. “By combining our unique insights and unparalleled expertise with Elastic’s analytical prowess, we’re setting a new standard in cybersecurity, empowering organizations to improve their security posture and make crucial decisions faster.”

For more information on how the ESET and Elastic integration is redefining cybersecurity threat intelligence, and to learn more about the benefits it brings to organizations, please read here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Leveling the playing field for all with MDR

One thing that every company, from the smallest business to the largest enterprise, has in common is that all of them face a world of evolving threats that periodically come knocking on their doorsteps. 

To counter these threats early on, small and medium-sized businesses (SMBs) are looking to spice up their security postures, while enterprises find that they need to cover operations beyond what their security operations centers (SOCs) are able to address themselves. All of this can be alleviated via detection and response, which can work wonders to heighten the security status of any organization willing to utilize it comprehensively.

However, certain skills are required to realize the benefits while also keeping challenges in check. Putting budget aside for the moment, the skilled professionals needed to operate detection and response platforms successfully are hard to come by these days.

So why not employ professionals who know how to manage detection and response without having to allocate extensive resources for further hiring?

What we are talking about is Managed Detection and Response (MDR), which can address threats proactively, deliberately, and indeed, very quickly. Furthermore, management of these capabilities helps immediately address the most demanding aspects of both, deploying and deriving benefits from what can be a complex set of tools and processes.

Detection

One of the most important parts of proactive threat hunting is to have the ability to manage the attack surface just like a general would manage a battlefield — to know all the hazards, strategic points, numbers, and logistics.

While the scope and power of standard Endpoint Detection and Response (EDR) can serve the needs of businesses of a certain size and maturity, EDR’s complexity may hamper a timely response. In some cases, even with both the AI-powered automation and human skill attributed to in-house SOCs, businesses might still lack the necessary in-depth understanding of a product or the threat landscape.

Approaching the many challenges around detection and response, even with the support of AI for capacity-intense processes like assessing entities and correlation to incident assessment, SOC teams have additional burdens. These include:

  • Achieving compliance with industry regulations
  • Meeting security needs with minimum impact on business processes while still minimizing incident response times

Due to the numerosity and complexity of some of these burdens, opening a conversation about offloading portions of these responsibilities via MDR can bring into sharper focus which of these operations are mission-critical for your business.

And response

Shrinking the attack surface, covering all endpoints, cloud-first AI-powered operation — while these phrases might sound like a bunch of technobabble from a futuristic movie, they all represent actual possibilities within cybersecurity that can be handled, in most cases, through detection and response solutions such as Extended Detection and Response (XDR).

While detection can work based on automatically created incidents and the many rules in ESET Inspect, leveraging its power for a more intense and rewarding security experience can only be done by working with people who have a close connection with the creators and developers of such detection and response solutions — connecting the telemetry and product into a single experience for the business that is wary of the threats it might face. With the identified set of detection responsibilities offloaded to managing detection processes, the SOC can focus its capacity on response.

Alternatively, response processes can benefit equally from external management, especially when the provider is intimately familiar with the product. The benefits are clear for SMBs that cannot or do not want to manage their own containment and remediation. Larger businesses may want their IT staff to maintain its focus on daily functioning in the knowledge that there is a safety net capable of protecting their business 24/7/365. This is the promise of MDR, and it can supply this in spades.

Managing likely threats at every step and every level

The difficulty of covering all attack surfaces via D&R depends on a number of factors, including the security expertise a company possesses; its security environment; its budgetary constraints; and external factors such as a lack of potential security recruits, deliberate threat targeting, or even threats vectoring via a company’s supply chain.

These days, it is not only organizations that see a rising need for better protection but also government regulators and cyber insurance companies, who devise requirements to make businesses less complacent and more likely to invest in better security — since oftentimes, an attack on one business or its tool can have a cumulative effect, impacting its partners and customers. This is especially true with supply-chain attacks like SolarWinds or MOVEit. A single weak point or an underestimation of security, and poof; you have not only a single incident but a whole slew of them impacting several different companies that use the same piece of software.

Protection needs to work on every level, for any business, be it small, midsize, or enterprise. But to do so, pre-emptive proactive threat hunting has to be employed first, which MDR can offer, serving as the first step of a multilayered security posture focused on taking care of threats before they transform into incidents.

Which MDR?

To ward off any threat, security vendors have to be able to protect against threats at every level, for any business or its verticals.

ESET PROTECT MDR

ESET PROTECT MDR provides a service that can help businesses of all sizes and maturity levels achieve a better security posture 24/7/365, powered by AI and human experts, ensuring enterprise-level protection, gaining security maturity that matches the size, scale, and scope of a business. With custom support aimed at providing comprehensive protection and a rapid response time of 20 minutes, closing cybersecurity gaps, including those created by external forces such as a lack of skilled hires, has never been easier.

As a bonus, ESET PROTECT MDR includes everything in ESET PROTECT Elite, the ESET MDR service, and ESET Premium Support Essential, creating a package that offers an elite security solution coupled with human support and expertise to complete one’s security posture.

A great addition here is also the inclusion of scheduled reports, including advanced behavioral reports provided by ESET LiveGuard Advanced (ELGA), our proactive cloud-based threat defense against targeted attacks and new, never-before-seen threat types, especially ransomware. With these reports, security admins will have a better visibility into what’s happening within their systems, providing a complete overview of how ELGA analyzed a malicious sample.

ESET PROTECT MDR Ultimate

And for the enterprises that don’t want to leave any room for error, an MDR service can augment their existing security by giving additional breathing room to their SOCs, as policing a global operation takes tremendous resources that could be spent elsewhere.

And that’s why adding MDR to the mix makes sense, as it both adds more expertise and enables an enterprise to enjoy superior cyber risk protection, with access to world-leading threat hunters whose job is to do exactly that — to know how to find and act against threats with a service tailor fit for the enterprise’s whole operation.

All of this is present within ESET PROTECT MDR Ultimate, a service that provides top-notch proactive prevention with superior cybersecurity protection, enabling granular visibility into a company’s whole environment through a tailored security service, to stay one step ahead of all emerging threats. The Ultimate tier also includes remote digital forensic incident response assistance, which helps businesses by overseeing the collection and analysis of incident logs for a better understanding of how an incident happened and how future occurrences can be prevented.

Cybersecurity – a top priority

In today’s world, data breaches and security interruptions are not just possibilities, they are inevitable. Customers want partners that can assure them of sound security, and that is where our MDR services come in. We guarantee unparalleled security that can make all the difference between being a successful and an unsuccessful business.
To conclude, cybersecurity should never be taken for granted, it must be given the utmost importance to protect your business and customers from harm. So, focus on cybersecurity, and do it proactively so that threats never breach your doorstep.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET announces integration of its ESET PROTECT Platform with Elastic Security

  • ESET integrates its ESET PROTECT Platform telemetry into Elastic Security for SIEM to offer enhanced detection and response for businesses.
  • The integration, based on ESET PROTECT Platform APIs, offers high-quality threat detection with low false positives and minimal system impact, ensuring efficient prevention and system integrity.
  • Customers of ESET and Elastic will benefit from enhanced and automated alert verification processes, access to global telemetry in real time, and actionable insights to defend against increasingly complex threats. 

BRATISLAVA – May 1, 2024 — ESET, a leading cybersecurity company, today announced the integration of its ESET PROTECT Platform with Elastic Security enhancing business security through cutting-edge detection and response capabilities. Elastic is the leading search AI company.  The integration is set to transform security operations by providing unparalleled insights and facilitating swift action on cyber threats through the streamlined ingestion and analysis of telemetry data from ESET’s endpoint products and XDR.

Elastic Security allows organizations to gather, analyze and visualize security data from a range of sources in real-time, offering a complete perspective of their security posture. ESET PROTECT Platform offers businesses of all sizes the most comprehensive, AI-native threat prevention and response capabilities, in combination with expert human analysis and comprehensive threat intelligence. The combination of ESET PROTECT and Elastic’s security platform enables the collection of telemetry from ESET endpoint products and XDR, ensuring a proactive security stance.

By integrating Elastic Security with the ESET PROTECT Platform, organizations can significantly improve their threat detection and incident response processes. This integration automates the analysis of alerts, reducing the time and resources required to identify genuine threats. It filters out false positives efficiently, ensuring that security teams can focus on addressing real vulnerabilities and threats, enhancing the overall security posture. Threat hunters gain access to more comprehensive data and advanced analytics, and they are equipped with insights to operate at scale. Once a threat is detected, the integrated system can initiate predefined response protocols, minimizing the response time to incidents. This capability not only reduces the potential impact of security breaches, but also streamlines and automates the overall incident response process, ensuring a swift and efficient resolution to threats.

“In the current digital environment, organizations are confronted with an increasing array of advanced cyber threats. There’s a critical need for robust solutions that facilitate the real-time monitoring and detection of security incidents, empowering organizations to react swiftly and efficiently,” stated Trent Matchett, ESET Director of Global Strategic Accounts. “Our joint customers now have at their disposal a powerful combination of ESET’s advanced prevention and detection capabilities, and Elastic’s analytical strengths, setting a new standard for proactive security operations.”

ESET Inspect acts as the XDR-enabling module of the ESET PROTECT platform, delivering breach prevention, enhanced visibility, and remediation. ESET Inspect is a comprehensive detection and response with rich features such as: incident detection, incident management and response, data collection, indicators of compromise detection, anomaly detection, behavior detection, and policy violations. For more information on ESET Inspect, visit here.

To discover more about how ESET PROTECT’s integration with Elastic is redefining security operations, visit our corporate website, or make a direct inquiry.

For more information on ESET’s investment in API integrations and opportunities to partner, visit here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET to Present on UEFI Security Threats and Cybersecurity Breakthroughs at RSA 2024

Booth visitors try their hand at “PREVENT,” ESET’s custom VR game, while learning about AI-native prevention for tomorrow’s threats

San Diego, BratislavaApril 30, 2024ESET, a global leader in cybersecurity solutions, today announced its participation in the upcoming RSA Conference in San Francisco from May 6–9, 2024. At the event, which brings together IT experts from around the world, ESET Malware Researcher Martin Smolár will present on critical vulnerabilities and long-lasting problems in Unified Extensible Firmware Interface (UEFI) security, which resulted into the discovery of the BlackLotus UEFI bootkit. Details about the session, which takes place on May 7 at 1:15pm PT in Moscone West, Room 3002, are available here.

“Although UEFI firmware is widely deployed, and number of the real UEFI threats is increasing every year, most organizations overlook the security risks in this critical computing layer. UEFI bootkits are very powerful threats, having full control over the OS boot process and thus capable of operating stealthily and disabling various security mechanisms. Martin’s presentation discloses the latest tactics being used by adversaries and how organizations can ramp up their own security posture,” said Michal Jankech, Vice President of SMB and MSP segments at ESET.

Visitors to ESET’s Booth 1761 in the South Expo Hall will hear about AI-native prevention for tomorrow’s threats while getting the chance to play ESET’s immersive VR game “PREVENT,” developed for RSA attendees. Demos at the booth include:

  • Next-Gen Endpoint and XDR – Learn about ESET’s cloud-delivered XDR-enabling solution, ESET Inspect, and how it facilitates unparalleled threat and system visibility. Now integrated with the ESET AI Advisor, this solution leverages generative AI to enhance incident response and interactive risk analysis, thus answering the wish of many companies to be able to utilize the advantages of XDR solutions even with limited IT resources.
  • ESET Threat Intelligence – As organizations look to mitigate risk and extend their security intelligence, ESET Threat Intelligence feeds and premium APT reports leverage real-time, globally sourced curated data insights on cyber threats ranging from targeted attacks to zero-days and botnet activities. This global visibility enables businesses, governments, and channel companies to make critical decisions faster, giving them a strategic advantage and competitive edge in the fight against cybercrime.
  • Managed Detection and Response (MDR) – Attendees will learn how ESET MDR provides 24/7 threat monitoring, hunting, and remediation. ESET’s blend of AI technologies and human expertise delivers rapid responses within a 20-minute window. This rapid action minimizes damage and ensures the safety of organizations. With ESET MDR, businesses can focus on core objectives, knowing that their defenses are actively safeguarded.
  • Managed Service Provider (MSP) Program – ESET’s flexible and profitable model features tier-based volume pricing and real-time license usage tracking for efficiency in security management, optimizing resource allocation and elevating service quality. Whether MSPs serve a few clients or manage a large portfolio, ESET’s pricing structure adapts to their growth.
  • ESET Integrations – ESET has kickstarted its API integration program by partnering with industry leading security providers. Discover how we are supercharging our partners’ solutions with ESET telemetry thanks to globally sourced data from ESET Inspect and our collected research in the form of ESET Threat Intelligence feeds. 

“This year’s theme at RSA is ‘The Art of Possible’ – showcasing the importance of creativity and innovation to battle dynamic cyber threats. Following significant investments, we look forward to meeting with ESET partners, business customers, and prospective users from around the world at RSA who are looking to battle tomorrow’s toughest adversaries with next-generation AI-native solutions,” added Michal Jankech.

In addition to the live demos, ESET is hosting expert talks at its booth as well as specialized briefings at the Press Club SF, a few steps away from the Moscone Center. Register online to meet ESET technology and research experts at the show or attend private briefings, including sessions on Threat Intelligence and Corporate Solutions. Separately, visitors to the booth can hear a range of presentations, including Robert Lipovský highlighting how the ESET Threat Intelligence portal is enhanced with AI for quick responses, James Rodewald on the proactive capabilities of ESET’s Managed Detection and Response service, and presentations from ESET partners.

For more information on ESET’s presence at RSA and how to register for special events, visit RSCA2024 I ESET.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Imagine vacationing without a smartphone — cybercriminals can’t

With all of the fake websites and apps out there, critical cybersecurity for travelers begins at home before the trip even starts.

In the past, when travelers prepared for a long trip, they worried about getting lost, so they packed, among other things, a map, a compass, a radio, a dictionary, and a flashlight. Now it´s all more compact — all integrated into a smartphone. Thus, it is no surprise that many of us can’t imagine a trip without this little assistant.

But, just as travelers in history needed to be wary of pirates and highwaymen, so modern tourists preparing for the upcoming summer must also protect themselves from criminals operating in cyberspace.

The stakes can be quite high. Threat actors can not only abuse smartphones to steal identities or money from their owners but also make an entrance into their employers’ business systems. Let’s be honest: how many of us use personal smartphones for work or vice versa? They say don’t mix business with pleasure, but nowadays it is hard to avoid.

Cybersecurity begins at home

As of April 2024, AV-TEST, the Independent IT-Security Institute, has shown that smartphones have faced nearly 35 million instances of Android malware. The increasing greed shown by cybercriminals is also displayed in the latest ESET H2 2023 Threat Report noticing a rise of Android threats by 22%.

As cybercriminals become more creative, mobile device safety needs to be far more sophisticated than just keeping the device close and not accessing free Wi-Fi at coffee shops.

As this ESET research blog shows, the dangers begin as soon as an eager traveler begins checking visitor/tourist recommendations about a destination.

Threat actors can abuse legitimate festival, traveling, or accommodation websites to steal victims’ personal data, and money, and deliver malware or create impersonation websites to do the same. Another threat can come from abused apps such as fake translation apps or trojanized legitimate chat apps.

Moreover, some of those attacks do not truly take aim at smartphone users, but rather seek to abuse compromised mobile devices to access employers’ internal systems via hijacked corporate accounts, for example.

Staying safe

If you want to learn more about travel scams, check out this blog. Here are a few tips on how to protect yourself:

  • If possible, do not take corporate devices on vacation, and do not use your personal devices for work.
  • Update your software and back up your device data regularly.
  • Set up anti-theft tools to help you find a lost or stolen device.
  • Stop auto-connecting and think twice before connecting to any public wireless hotspot.
  • If forced to connect to a public wireless hotspot, use a VPN. Think twice before conducting sensitive operations such as online banking or online shopping.
  • Be cautious when downloading apps, especially from websites and third-party app stores.
  • Always check a developer’s background and app reviews before downloading a new app.
  • If the new app starts to behave strangely, delete it immediately.
  • Only buy tickets from an event organizer or an official and trusted third-party vendor.

Reliable cybersecurity

The last but arguably most important tip is to download reputable mobile security software emphasizing prevention. Without us going into much technical detail, be aware that there are sophisticated cybercampaigns that cannot be spotted by the human eye or caught by basic antivirus software.

This means that mobile users should have a reliable cybersecurity solution installed to protect them from these advanced threats, ideally before they execute. 

ESET Mobile Security takes a proactive approach and can detect and block threats during the download process, even before installation occurs. This means that the threat never reaches the user. EMS scans all files in download folders and can also be used to scan already existing apps to double-check that you haven’t let in the devil in disguise.

ESET Mobile Security Premium also comes with handy tools such as Anti-Phishing, Anti-Theft, Payment Protection, and App Lock. These protect travelers’ data in case they mistakenly visit a known phishing website, their mobile devices are stolen, or when someone wants to intercept their communications with a bank or an online shop.   

Enjoy your trip without looking over your shoulder

None of this should discourage you from enjoying your trip. Quite the opposite, having a vacation should be a relaxing experience!

With the right cybersecurity solution (and a bit of awareness), you can have a great time without constantly looking over your shoulder in cyberspace knowing that your device is safe and your digital progress is protected. Have a great summer!

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET to enhance its MDR offering portfolio: Also bringing additional updates to its existing business offering

ESET enhances its ESET MDR offering portfolio with the introduction of two new subscription tiers, ESET PROTECT MDR and ESET PROTECT MDR Ultimate.
Both subscription tiers of the newly updated ESET business offering are built on top of ESET PROTECT Elite, representing a comprehensive security package.
Additionally, ESET Mobile Threat Defense will be added as a stand-alone module to extend cybersecurity protection to business mobile devices, increasing attack vector coverage to an organization’s entire mobile fleet.
Some further updates for ESET Server Security and ESET LiveGuard Advanced round out the new business offering. 

BRATISLAVA, Slovakia — April 29, 2024 — ESET, a global leader in cybersecurity solutions, is proud to announce today the launch of two new Managed Detection and Response (MDR) subscription tiers: ESET PROTECT MDR for small and medium businesses (SMBs) and ESET PROTECT MDR Ultimate for enterprises. These tiers are built on the foundation of the ESET PROTECT Elite subscription tier, offering businesses of all sizes the most comprehensive, AI-powered threat detection and response capabilities, in combination with expert human analysis and comprehensive threat intelligence.

ESET’s updated MDR business offering is designed to cater to the specific needs of both SMBs and Enterprises. To that end, ESET PROTECT MDR delivers a comprehensive cybersecurity package, offering 24/7/365 superior protection that addresses the most common challenges of small and medium-sized businesses. This includes modern protection for endpoints, email, and cloud applications, vulnerability detection and patching, and managed threat monitoring, hunting, and response. It addresses the cybersecurity talent shortages and ensures compliance with cyber insurance and regulations, offering a remarkable 20-minute average time to detect and respond, a comprehensive MDR dedicated dashboard and regular reporting for complete peace of mind.

For enterprises, ESET PROTECT MDR Ultimate offers continuous proactive protection and enhanced visibility, coupled with customized threat hunting and remote digital forensic incident response assistance. This comprehensive service is designed to support overstretched SOC teams, providing them with 24/7 access to world-class cybersecurity expertise. It ensures enterprises stay one step ahead of all known and emerging threats, effectively closing the cybersecurity skills gap, and facilitating expert consultations for incident management and containment in a fully managed experience.

ESET also sets itself apart with its own telemetry and unique global coverage, leveraging its detections and ESET Research to gather unique data about attacks, a competitive edge not offered by many players in the market.

“With the update of our business offering, we want to make ESET products accessible to customers without the necessary skill set or resources to operate them, but to also empower organizations to navigate the digital landscape confidently, safeguarded by our expertise and continuous, comprehensive coverage,” stated Michal Jankech, Vice President of SMB and MSP segment at ESET.

Additional updates to the ESET business portfolio

Additionally, all ESET PROTECT subscription tiers starting from ESET PROTECT Advanced are enhanced with the new stand-alone module ESET Mobile Threat Defense (EMTD). It extends attack vector coverage to an organization’s entire mobile fleet, seamlessly integrating into the ESET PROTECT Platform for efficient management, ensuring comprehensive protection for mobile devices. EMTD also includes a Mobile Device Management (MDM) functionality, with added support for Microsoft Entra ID.

Moreover, ESET Server Security introduces a firewall specifically designed for Windows servers, and Vulnerability & Patch Management, offering manual patch management and a 60-second delay of application process kill.

Finally, ESET LiveGuard Advanced now also offers advanced behavioral reports for our detection and response customers, providing an in-depth look into how our cloud sandboxing technology analyzes suspicious files, offering better visibility and context for security operators like cybersecurity and threat analysts, security engineers, or threat responders.

“This significant launch underscores ESET’s unwavering dedication to delivering superior protection and services, effectively responding to the dynamic challenges faced by customers to stay one step ahead of threats,” added Michal Jankech, Vice President of SMB and MSP segment at ESET.

For more detailed information about ESET and its updated portfolio, please visit the dedicated offering pages for SMBs and Enterprises.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Prevention-first security begins with data-enhanced insight: Meet ESET Threat Intelligence

Supporting threat hunters and incident response teams with hands-on data is crucial, as it not only safeguards organizations but provides the basis for a proactive prevention-first security strategy.

In recent years, a significant number of cyberattacks have been ransomware related and, despite fluctuations in frequency and intensity, they remain one of the most prevalent and feared security threats.

Ransomware attacks are highly orchestrated, but what makes them particularly insidious is that they are not merely automated programs running rampant through systems without direction but are often controlled minute-by-minute by human attackers. Once attackers utilize various Trojans to deploy the necessary tools, they meticulously navigate dozens of steps in search of valuable information within the compromised network. From there the options left open to defenders narrow, then increasingly become measures focused on mitigation — or worse, remediation.

The selection of “measures” is very much based on a keen understanding of the threats faced and any associated peculiarities, whether they be unique processes around privilege escalation or credential access techniques that enable cybercriminals to retrieve sensitive information until they can exfiltrate what they deem valuable. Every day, ESET Threat Intelligence (ETI) processes hundreds of millions of indicators of compromise (IOCs), akin to a database of clues left by cyber-intruders while they crawl through a victim’s network.

Preventing these chains of attacks is crucial since they can have long-lasting consequences, going beyond mere financial loss or data breach. They can provide leverage for future attacks and can sap the capacity and impact of defenders’ work across an organization’s entire threat surface. Working to avoid the narrowing of options means taking a prevention-first approach, putting in place preventive measures that stop ransomware payloads from reaching the endpoints. This process starts with insight and intelligence.

Putting threat intelligence to work

Researchers, SOC teams, threat hunters, and even curious prevention-minded admins can benefit from the types of threat intelligence that inform everything from replicated attack scenarios that aid red and blue team network defenders to security strategies, prevention measures, and detection and response incident triage.

ESET Threat Intelligence comes to users in highly accurate, curated, and actionable formats that amount to an up-to-date technical manual that enables customers to logically pursue a prevention-first approach to security.  Specifically, both (wider) industry and ESET Threat Intelligence data are compiled and ready to be paired with observations made via other tools, including XDR, SIEM, and/or SOAR, to prevent damages from (for example) ransomware and any subsequent extortion from taking place.

Users employing data/intel gathered in ETI for their inspection and/or monitoring of security incidents is just one way to create better-informed operators. In this use case, operators, increasingly supported by automation, can more consciously interact with incidents from an XDR’s triage system, for example, executables, malicious processes, computers, and threat indicators. From there, various forms of mitigation can be conducted in an informed, systematic, and prioritized manner. Specifically, an ESET user might employ ETI to cross-reference relevant data to better understand the actions necessary to perform in ESET INSPECT* (the XDR-enabling module of the ESET PROTECT platform).

The ransomware case here puts into focus why ESET Threat Intelligence, with its APT reports, unique data feeds, dashboard, and portal, has grown in popularity.

*ESET Threat Intelligence and ESET INSPECT (detection & response module) are not currently integrated via the ESET PROTECT platform.

Threat Intelligence – the tricks & trade of ransomware

In late 2023, ESET observed the SmokeLoader malware family, a generic backdoor with a range of capabilities that depend on the modules included in any given build of the malware, being utilized as one of the multiple variants packed by AceCryptor, a crypto service used worldwide by cybercriminals to obfuscate malware. SmokeLoader is deployed to download and execute the final payload of an attack discreetly, to evade security measures, making it crucial to rely on robust cyber defense mechanisms.

Defenders can specifically utilize ETI’s backend tracking systems to support an improved understanding of threats and apply their learnings to both prevention and proactive defense processes. ETI assembles all the clues needed to deploy prevention mechanisms and, when necessary, effectively mitigate against malware like SmokeLoader. Importantly, ETI’s benefits are vendor agnostic, so businesses already running alternate SIEM/SOAR products, including Microsoft Azure Sentinel, OpenCTI, IBM QRadar, Anomali and ThreatQuotient (outside of the ESET PROTECT ecosystem) can also gain from ETI’s unique data stream via our API.

This means that a wider spectrum of curious, prevention-minded admins can now turn to the main ESET research findings and other relevant data. These are published in regular reports on the ETI platform and portal and are accessible in specific territories, with ESET continuously working to expand their availability.

Delivering data to stop an attack before it happens

As with the SmokeLoader data, ETI clusters data on a wide spectrum of malware, finds similarities or particularities, highlights what stands out, and monitors attack chains and any changes in TTPs. This automation occurs in real time, continuously updating all feeds to provide end customers with the most important and immediately actionable intel on threats targeting them. These outputs are also synthesized into specific APT reports, which ensures customers receive pertinent information without being overwhelmed by excessive data.

ESET Threat Intelligence provides its data feeds to customers through the TAXII server, integrating it directly into their current systems, for example, Microsoft Sentinel or the OpenCTI Threat Intelligence Platform. The feeds cover various aspects of cybersecurity, including tracking malicious files, botnets, and APTs; identifying potentially harmful domains or URLs and IPs considered malicious; and tracking the associated data. To ensure compatibility and easy integration, the feeds are provided in widely used formats, such as JSON and STIX 2.1.

Fighting malicious activity

Preventing multifaceted threats from impacting your network, business continuity, and/or reputation requires a comprehensive and always up-to-date knowledge base. Thus, moving beyond the technical defenses against ransomware and other malware, security operators at organizations must adopt a knowledge-based security culture that puts learning on level with action.

The cornerstones of security are particularly essential at public and private institutions that depend on well-developed SOC teams, threat hunters, and security operators that have both technical skills and access to the ever-growing body of work on threat actors, system configuration, and an understanding of what is and isn’t working.

These cornerstones are where ESET Research employs its long history of collaboration with law enforcement agencies, the Joint Cyber Defense Collaborative, and even its work with “No More Ransom” to communicate our views on ransomware, fight threats at large, and inform how and why we’ve built our threat intelligence platform, ETI.

Explore your use case for ETI via ESET API, ESET APT reports, the ETI data feed, or a comprehensive toolset for an ESET-powered prevention-first approach.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Should the cybersecurity world prepare for AI-based critical infrastructure attacks?

Imagining a future, in which anyone could be attacked by an intelligence beyond the means of  humans is rather scary. Perhaps that’s why AI is better imagined as another tool to support people’s work. Again, however, the combined capability of such a human actor is also of concern, especially if said actor does not have their community’s best interests in mind.

With AI becoming increasingly important, just like companies, people race to figure out how it could be used to serve their own purposes, supporting their endeavors. Specifically in the field of cybersecurity, AI can serve both a constructive, but also a destructive role, with the former meaning the support of better cyber defense, and the latter attempting to cripple said cyber defenses.

Of specific concern is the potential for cyberattacks on critical infrastructure to become more widespread. Critical infrastructure, usually considered to include power generation and electrical grid, hospitals and healthcare systems, and the global supply chain, could also include digital supply chains and the internet itself. Depending on the specific needs, resources, and development level of a nation, critical infrastructure represents all the systems, networks, and assets that are essential, with their continued operation required to ensure the security of a given state, its economy, and the public’s health or safety. As the idea behind the attacks is to weaken adversaries by crippling their day-to-day business, an effective AI tool could, hypothetically, help bad actors commit attacks, or even increase the pool of potential attackers, by making malware coding easier. However, not everyone shares the same opinion.

The role of AI – can hacking become easier?

According to an interview with ESET security researcher Cameron Camp, we are not really close to “full AI-generated malware,” though ChatGPT is quite good at code suggestion, he says, generating code examples and snippets, debugging, and optimizing code, and even automating documentation.

He agreed that ChatGPT could be used as a handy tool to assist programmers, one that could serve as a first step toward building malware, but not yet, as it is currently rather shallow, makes errors, creates bogus answers and is not very reliable for anything serious.

Nonetheless, Mr. Camp highlighted three areas, which might be interesting from the perspective of language models: 

More convincing phishing – From probing more data sources and combining them seamlessly to create specifically crafted emails where clues to their malicious intentions would be very difficult to detect, readers will be hard-pressed not to fall for social engineering. Nor will people be able to spot phishing attempts simply due to sloppy language mistakes, as they could have convincing grammar.

More specifically, spear-phishing could become even more convincing, as tailor-made emails or messages, even including personalized emotional triggers, could become easier to construct thanks to AI help. These abilities will be further supported by with multilingual text-generating options, such methods might work on a wider, global scale, which in case the targeting of critical infrastructure of several states at once would serve a useful purpose.

Ransom negotiation automation – Smooth-talking ransomware operators are rare, but adding a little ChatGPT shine to the communications could lower the workload of attackers seeming legit during negotiations. This will also mean fewer mistakes that might enable defenders to home in on the true identities and locations of the operators.

Furthermore, thanks to easier video and voice generation with AI (see example here), malicious actors could become anyone, hiding their identities more efficiently. In fact, concerns about AI have become so widespread in this area that many professionals want to stipulate in their contracts a ban on the use of their work for AI purposes.

And if you don’t believe this, check out this video of President Biden, Trump and Obama discussing a videogame, all AI-generated, of course. Imagine how, during a ransomware attack, an online intruder could imitate a highly placed official to ask for access to a network or a system remotely…

Better phone scams – With natural language generation getting more natural, scammers will sound like they are from your area and have your best interests in mind. This is one of the first onboarding steps in a confidence scam: sounding more confident by sounding like they’re one of your people.

As long as scammers generate the right natural cadence to a person’s voice, they can easily fool their victims, but the problem with any AI-generated content today is that there is an inherent, let’s say, ‘artificiality’ to it, meaning that despite these voices, videos or text looking legit, they still harbor some specific mistakes or issues that are easy to spot, like how ChatGPT makes false statements or how its responses might seem like it is just regurgitating a Wikipedia page.

However, all of this does not mean that generative AI cannot be used for brainstorming, to create a base for some work, however, the correctness of the information one is provided should still be checked. The legal ramifications of using AI-generated content (sourced from the net) might also be something to consider.

Critical Infrastructure vs. AI – emerging legislation

As AI starts to play an increasingly important role in cybersecurity, businesses and governments will need to accommodate and use AI to their own advantage – as crooks will definitely try to do the same. From a July 2022 report by Acumen Research and Consulting, the global AI market was $14.9 billion in 2021 and is estimated to reach $133.8 billion by 2030.

Thanks to the growing use of the Internet of Things and other connected devices, cloud-based security services could provide new opportunities for the use of AI. Antivirus, data loss prevention, fraud detection, identity and access management, intrusion detection/prevention systems, and risk and compliance management services already use tools like Machine learning to create more resilient protection.

On the flip side, bad actors could also use AI to their advantage. With a large enough market of smart AI, crooks could easily use it to identify patterns in computer systems to reveal weaknesses in software or security programs, enabling them to exploit those newly discovered weaknesses.

So, critical infrastructure could become one of the targets. With AI attacking and defending it, going for a tit-for-tat, security actors and governments will have to remain smart. The European Union is already trying to assess the risks by proposing the EU AI Act, to govern its use in Europe, classifying different AI tools according to their perceived level of risk, from low to unacceptable. Governments and companies using these tools will have different obligations, depending on the risk level.

Some of these AI tools may be considered high risk, such as those used in critical infrastructure. Those using high-risk AIs will likely be obliged to complete rigorous risk assessments, log their activities, and make data available to authorities to scrutinize to increase compliance costs for companies.  In case a company breaks the rules, the fine would likely be around 30 million euros or up to 6% of their global profits.

Similar rules and ideas are included within the recently proposed EU Cyber Solidarity Act, as government officials try to stay ahead of critical infrastructure attacks.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET Announces Integration with Arctic Wolf to Deliver Next-Gen Detection and Response for Businesses

  • ESET Inspect has been integrated into Arctic Wolf’s Managed Detection and Response solution to provide proactive defense via their cloud-native platform and human expertise
  • Arctic Wolf customers will gain access to real-time global telemetry, detailed reports and actionable insights that arm them against more diverse and sophisticated attacks
  • The integration marks an important milestone for ESET as it expands its integrations platform and collaborates with best-in-class technology companies 

BRATISLAVAApril 24, 2024ESET, a global leader in next-gen digital security for business, today announced a new integration with Arctic Wolf, a global leader in security operations, to ensure increased visibility and protection against modern threats. By integrating ESET Inspect into Arctic Wolf’s Security Operations Platform, Arctic Wolf customers are able to enhance their security posture – aggregating vast amounts of data from diverse, global sources.

“Businesses today and the channel community are demanding technology ecosystems that simplify cybersecurity management, offer complete visibility across a variety of attack surfaces, and bring industry leaders together under one architecture,” said Trent Matchett, Director of Direct Channel
Global Sales at ESET. “We have invested significantly in the ESET PROTECT Platform and an open API gateway to empower an impressive catalogue of integration partners moving forward. Arctic Wolf is one of the most trusted MDR vendors in the world, and an exciting milestone for our integrations program.”

Arctic Wolf helps organizations end cyber risk by providing a cloud-native security operations platform, with solutions that include Managed Detection and Response, Managed Risk, Managed Security Awareness, and Incident Responses, each delivered through the industry-pioneering Concierge Delivery Model. Arctic Wolf’s Concierge Delivery Model provides tailored risk mitigation guidance and security insights based on the telemetry of the customer’s tech stack, like ESET Inspect, to keep an organization’s environment safe.

“Arctic Wolf and ESET share the common belief that embracing openness and interoperability are essential for helping to deliver the positive cybersecurity outcomes that organizations demand,” said Ian McShane, VP of Managed Detection and Response at Arctic Wolf.  “The new ESET PROTECT Platform API allows ESET Inspect data to seamlessly integrate with the Arctic Wolf Platform, that when combined with the telemetry from other security tools, ensure Arctic Wolf customers get holistic protection against an ever-evolving threat landscape.”

As a result of this integration, Arctic Wolf customers will gain access to:

  • Real-time Incident Response, including Post-Incident Analysis and Remediation:
    ESET Inspect will enable the detection of suspicious activity on a client’s endpoint, sending alerts to Arctic Wolf, who can then conduct a security investigation, confirming the threat and then employing immediate response followed by an analysis of the acquired data to assess the damage and prepare for future threats.
  • Regulatory Compliance:
    Because clients must comply with several regulatory standards that can require detailed logs of all activity on their endpoints, ESET Inspect will provide these logs so that Arctic Wolf can help their customers ensure compliance.
  • Managed Security for Resource Constrained Organizations :
    Many organizations often lack the resources to house internal security teams, so they contract an outside partner like Arctic Wolf to assist with their cyber defenses. Thanks to ESET Inspect and its data, Arctic Wolf customers will be better equipped to provide a high level of security to organizations of almost any size without them having to hire and train their own security personnel.

ESET Inspect acts as the XDR-enabling module of the ESET PROTECT platform, delivering breach prevention, enhanced visibility and remediation. ESET Inspect is a comprehensive detection and response with rich features such as: incident detection, incident management and response, data collection, indicators of compromise detection, anomaly detection, behavior detection and policy violations. For more information on ESET Inspect, visit here.

For more information on ESET’s investment on API integrations and opportunities to partner, visit here.

Find more information about how Arctic Wolf can help organizations end cyber risk here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.