Skip to content

ESET Launches AI-Powered MDR Service in APAC with Industry-Leading 6-Minute Response Time

ESET MDR delivers industry-leading real-time detection and a mean-time-to-respond (MTTR) of 6 minutes to keep businesses secure 

Hong Kong, 1 April 2026 – ESET, a global leader in cybersecurity solutions, today announced the launch of two Managed Detection and Response (MDR) subscription tiers: ESET PROTECT MDR for small and medium businesses (SMBs) and ESET PROTECT MDR Ultimate for enterprises across Asia Pacific (APAC) including Hong Kong, Malaysia, New Zealand, Philippines, South Korea, Taiwan and Thailand. The MDR subscription tiers were previously launched in Australia, India, and Singapore.

Bridging the gap with MDR

ESET PROTECT MDR delivers a comprehensive cybersecurity package, offering 24/7/365 superior protection. This includes modern protection for endpoints, email, and cloud applications, vulnerability detection and patching, and managed threat monitoring, hunting, and response. For enterprises, ESET PROTECT MDR Ultimate offers continuous proactive protection and enhanced visibility, coupled with customised threat hunting and remote digital forensic incident response assistance.

ESET’s latest APAC SMB Cybersecurity Report revealed that 70% of respondents are targets of cyberattacks despite high confidence in cybersecurity. 50% rate lacking a dedicated cybersecurity team and keeping up with the latest threats as one of the top three cybersecurity challenges. APAC also faces the largest shortage of cybersecurity experts in the world. These highlight the urgent need for skilled
cybersecurity professionals and managed services that can help bridge the country’s growing talent gap. ESET’s MDR services ensure organisations of all sizes and cybersecurity maturity to stay one step ahead of all known and emerging threats, effectively closing the cybersecurity talent gap, and facilitating expert consultations for incident management and containment in a fully managed experience.

ESET MDR delivers a remarkable 6-minute Mean Time to Respond (MTTR) — the fastest in the industry*. In comparison, the median time for organizations to detect a breach is 24 days**, leaving critical systems and data exposed for weeks. Every hour that a breach goes undetected dramatically increases the risk of data loss, operational disruption, and financial damage.

“Cyber threats are evolving in both speed and sophistication, particularly across highly digitalised economies in APAC,” said Parvinder Walia, President of APAC Region, ESET. “Our AI-powered MDR services bring together automation, human expertise and global threat intelligence to help organisations stay ahead of attacks rather than react to them. In today’s environment, the ability to detect and respond within minutes can be the difference between a minor incident and a significant breach.”

ESET’S MDR services Meet the Unique Challenges of MSPs

ESET recognises the growing pressures facing MSPs who must balance the critical task of securing clients’ complex IT environments with their own business growth and operations. With threat actors going heavy on supply-chain attacks and abusing MSP tooling, MSPs too find themselves fixed in the crosshairs of cybercriminals. Simply put, MSPs are not only potential victims, but also potential accessories to a crime. To help MSPs fulfill their security potential, ESET’s MDR is also designed to be deployed in an MSP environment with a single solitary security service, available 24/7 that help MSPs to secure themselves as well as their clients.

Premium Support for Maximum Protection and Seamless Operations

As part of the new MDR subscription tiers, customers also benefit from a comprehensive support service designed to maximise protection levels while reducing the risk of operational interruption, including:

ESET Premium Support (included with ESET PROTECT MDR)

  • A guaranteed and accelerated product support package including fast and detailed analysis of any problem
  • 24/7 high-priority support from ESET cybersecurity experts to rapidly address issues and minimise downtime

ESET Premium Support Ultimate (included with ESET PROTECT MDR Ultimate customers)

  • Includes all the benefits of ESET Premium Support, with even quicker response time
  • Deployment and Upgrade services, with installation performed by ESET experts to ensure optimal implementation and effective functioning of ESET solutions
  • Health Check services, with evaluations conducted by ESET experts to maximise product performance and deliver full operational value

For more information, please visit https://www.eset.com/sg/business/services/managed-detection-and-response.

*Based on publicly available information as of 1 March 2026.
**Verizon 2025 Data Breach Investigations Report

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Unified Logging Strategy Guide

2025-12-22   A log correlation engine automates the process of linking fragmented event data across diverse systems, transforming raw logs into real-time, actionable insights. By normalizing data and applying correlation rules, it reduces alert fatigue, accelerates incident detection (MTTD), and enables faster root cause analysis for improved security and operational efficiency.

Continue reading

PCI DSS Level 1 Provider Vetting Guide

 

Audit-Friendly Vetting Checklist

  • Validate a current, signed Attestation of Compliance (AOC).
  • Confirm Service Scope matches your intended architecture.
  • Identify explicitly excluded services or infrastructure.
  • Execute a detailed Shared Responsibility (R&R) Matrix.
  • Verify real-time access to logs and incident response evidence.
  • Audit the data isolation and tenancy enforcement model.

 

I. The Significance of the AOC

A current Attestation of Compliance (AOC) is the primary artifact required by auditors. It confirms that a provider has been independently validated against PCI DSS requirements. Without this document, your organization assumes significantly higher risk and audit overhead.

 

II. The Shared Responsibility Model

Under PCI DSS 4.0.1, the division of labor between you and your provider must be perfectly documented. A “Shared Responsibility Matrix” prevents “last-mile” gaps where both parties assume the other is managing a specific control.

Control CategoryProvider ResponsibilityCustomer Responsibility
Physical SecurityData Center Access ControlN/A (Inherited)
Network SecurityHypervisor/Backbone IsolationVirtual Firewall Configuration
Data EncryptionEncryption of Data-at-RestKey Management & Access Policies

 

III. Assessing Providers in Transition

If a provider lacks a current AOC, they must provide a roadmap and alternative proof of technical controls, such as SOC 2 reports or third-party penetration testing summaries. Failure to provide transparency during this phase is a major indicator of non-compliance risk.

About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Security Brief: Guest Wi-Fi & Network Segmentation

Strategic Insight: Attackers don’t view guest Wi-Fi as a convenience; they view it as a high-tolerance entry point for unauthorized devices.

Common Vulnerabilities in Guest Segments

  • Flat Policy Logic: Failing to block access to internal IoT, printers, and misconfigured services.
  • Credential Stagnation: Using shared, static passwords that remain unchanged for years.
  • Managed Device Drift: Employees using the guest network to bypass corporate 802.1X security.

Maturing Your Segmentation Strategy

Security FactorLegacy ApproachZero Trust Approach
Device DiscoveryPeriodic AuditsContinuous Real-Time Visibility
Access ControlVLAN TagsIdentity & Posture Awareness
RemediationManual InterventionAutomated Rogue Redirection

Operational Imperative

True segmentation requires more than just a separate SSID. It demands that Zero Trust principles—least privilege, continuous verification, and total visibility—be applied to every wireless segment, without exception.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

OpenClaw AI: Security & Risk Mitigation Guide

OpenClaw is a powerful automation engine, but its ability to interact with local environments requires a Security-First configuration. Below are the primary risks and the strategies to mitigate them.

Primary Threat Vectors

Prompt Injection: Malicious inputs can override AI safety protocols, triggering unauthorized data exfiltration or system command execution.
Privilege Over-extension: Granting the agent administrative access creates a high-impact failure point if the LLM misinterprets a command.
Integration Vulnerabilities: Unvetted “skills” or plugins can act as backdoors, siphoning credentials or sensitive Markdown/JSON files stored in plain text.
 

Secure Deployment Checklist

  • Deploy in a containerized environment (Docker) to isolate the agent from the host OS.
  • Enforce the Principle of Least Privilege (PoLP) for all system and API access.
  • Implement mandatory logging and real-time monitoring of all agent-triggered actions.
  • Filter and sanitize inputs to defend against injection attacks.
  • Use a VPN or secure tunnel for remote access; never expose ports to the public internet.

Conclusion

Deploying OpenClaw safely requires shifting from an “Assistant” mindset to an “Administrator” mindset. By treating the agent as a privileged user and applying network-level segmentation, organizations can leverage AI automation without compromising data integrity.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Secure Browser Strategy Guide

Executive Summary: As the browser becomes the central hub for SaaS and cloud workloads, secure enterprise browsers provide the necessary control plane to protect data across managed and unmanaged (BYOD) devices.
 

The Difference in Visibility

Security FactorConsumer BrowserSecure Enterprise Browser
AdministrationIndividual/User-ledCentralized IT Governance
Data ProtectionBasic Cookie/History clearingIn-browser DLP & Encryption
Shadow ITUnmonitoredComplete visibility & App blocking

 

Core Defensive Pillars

Centralized Governance

Enforce uniform security standards and whitelisted extensions across the global fleet from a single dashboard.

Exfiltration Control

Prevent sensitive data from being copied into unauthorized AI tools or unsecured personal storage.

Encapsulated BYOD

Create a secure, encrypted container on personal devices to ensure corporate data never leaks into the local OS.

About Nord Security
The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

IoT Security Strategy Guide

Zero Trust Assumption: Modern IoT security assumes the network is already compromised. Every device must be verified, segmented, and monitored.
 

Why IoT Security is Non-Negotiable

As smart devices infiltrate every industry—from healthcare to energy—they provide hackers with thousands of new entry points. Proactive defense is the only way to prevent a smart thermostat from becoming the gateway to your server room.

StrategyTechnical Outcome
Micro-SegmentationPrevents lateral movement by isolating devices in digital “rooms.”
Identity-Based AccessVerifies the specific device “fingerprint” before granting network entry.
SBOM ManagementProvides transparency into third-party code for faster vulnerability patching.

 

Core Defensive Measures

  • Credential Hardening: Replace all factory-default passwords with unique, complex keys.
  • Firmware Hygiene: Implement a schedule for regular IoT updates to patch known exploits.
  • Layered Authentication: Deploy MFA (Biometrics/Auth Apps) for device management portals.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Security Research: Azure IMDS Token Exploitation

Critical Finding: A single unauthenticated curl command to 169.254.169.254 can grant an attacker full access to Key Vaults, Storage, and Domain Controllers depending on assigned RBAC roles.

 

The Core Vulnerability

The IMDS endpoint handles token requests at the hypervisor level. Because it requires no authentication and bypasses standard Conditional Access, it acts as a high-impact offensive primitive.

 

Control Plane vs. Data Plane

PlaneToken AudienceImpact of Compromise
Control Planemanagement.azure.comInfrastructure mapping, resource deletion, setting modifications.
Data Planevault.azure.net / storage.azure.comSecret extraction, PII data theft, offline Active Directory analysis.

 

Security Myths

  • vTPM: Does NOT prevent user-mode IMDS token acquisition.
  • Confidential VMs: Does NOT change the IMDS API access for an attacker with guest code execution.
  • Global Reader: Does NOT grant Graph API access for Managed Identities without explicit appRoleAssignments.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scalefusion: Remote Terminal for Windows Launch

  •  Initializing Scalefusion Remote Shell…
  • Connection Secure: AES-256 Encrypted
  • Accessing: PowerShell / CMD
  • Status: Ready for High-Velocity Troubleshooting

Scalefusion’s Remote Terminal bridges the gap between IT operations and security. By providing real-time, “under-the-hood” access to Windows devices, admins can resolve issues without disturbing the end-user experience.

Root-Level Privileges
Execute system-level operations, registry updates, and administrative launches as a System User.
Dual-Shell Continuity
Switch between PowerShell and Command Prompt without terminating your active session.
Resource Monitoring
Track live CPU and RAM metrics remotely to identify performance-throttling processes.
“Ideal for headless environments, kiosks, and mission-critical stations where visual remote control is too disruptive.”
 

Why Modern IT Teams Choose Remote Terminal

  • Uninterrupted Workflows: Apply fixes in the background while users remain productive.
  • Secure Access: Encrypted sessions ensure only authorized admins can trigger shell operations.
  • Reduced Overhead: Centralized command execution across thousands of devices from one dashboard.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Veeam Plug-in for SC//HyperCore 3.0 Release Notes

The latest Veeam Plug-in for Scale Computing HyperCore represents a significant leap in cyber resilience. By integrating AI-powered scanning and application-aware consistency, v3.0 ensures that distributed workloads are protected by the same rigor as the centralized data center.

Application-Awareness
Supports VSS-based quiescence for SQL Server, Oracle, PostgreSQL, and Active Directory to ensure transactional integrity.
AI Malware Scanning
Utilizes inline scanning to detect ransomware notes, onion links, and AI-powered encryption activity analysis.
Granular Recovery
Enables Guest Filesystem Indexing for global file search and specific application item-level restoration.
 

Why Modernize Now?

Edge environments are increasingly targeted by ransomware. Version 3.0 shifts the focus from simple backup to active defense. Administrators can now search, identify, and restore files in seconds, all while the system proactively monitors for unusual filesystem activity.

“Compatible with Veeam Backup & Replication 13.0.1, this update allows IT teams to enforce Zero Trust principles at the edge without increasing operational complexity.”

To deploy, simply download the plug-in update and apply it to your existing Veeam infrastructure. For detailed configuration steps, refer to the official documentation.

About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.