Skip to content

Revolutionizing Surveillance with FaceMe Security: Harnessing the Edge Computing Capabilities of AXIS Camera Application Platform (ACAP)

Taipei, TAIWAN – June 14, 2023 – CyberLink Corp. (5203. TW), a pioneer in AI and facial recognition technologies, today announces FaceMe® Security is now deployed on AXIS Camera Application Platform (ACAP) on Axis ARTPEC-8 cameras. FaceMe® Security is a facial recognition software solution that allows businesses to painlessly upgrade existing smart security and access control infrastructure. Compatible with most surveillance video management systems and Axis IP cameras, FaceMe® Security provides identity authentication, attendance management, access control, security alerts, and AI smart monitoring.

Axis is a network technology company and industry leader that offers solutions in video surveillance, access control, intercoms, and audio systems. The Axis Camera Application Platform (ACAP) enables a wide portfolio of computer vision and video analytics to be added to their products. “Thanks to the Axis open platform and standardized VMS integration protocols, you can work with your customers’ existing VMS solutions while simultaneously integrating Axis devices with other IT applications, like FaceMe Security,” said Hiroshi Ochiai, Director of Alliances, Portfolio and Customer Services, Axis, Asia Pacific.

FaceMe® Security processes video streams for face recognition and face template extraction. This facial data is then searched and compared to ensure accurate verification for access control, video analytics inclusive of data group management (e.g., VIP, blocklists, employees), and alert notifications. As an Axis Technology Integration Partner supporting ACAP, FaceMe’s facial recognition can now be done at the edge by running directly on Axis cameras.

ACAP enables a reduced workload on the facial recognition engine, improving the overall performance of FaceMe® Security. Additionally, when deployed with ACAP cameras, FaceMe® Security can support even more video channels, all while users reap the benefits of enhancing their surveillance system with FaceMe® Security. They can layer person-of-interest detection, group tagging and management, and visitor summaries on top of existing IP surveillance configurations with Axis cameras and VMS.

“AI facial recognition requires a great deal of computing power, and leveraging Axis’ open application platform to add these functions at the edge means an enhanced experience for our customers,” said Dr. Jau Huang, CEO of CyberLink. “We are proud to be an Axis Technology Integration partner, and ACAP is a proven platform that adds to the performance of FaceMe® Security.”

Learn more about FaceMe® Security by visiting https://www.cyberlink.com/faceme/solution/security/overview

 

About Axis Communications

Axis enables a smarter and safer world by creating solutions for improving security and business performance. As a network technology company and industry leader, Axis offers solutions in video surveillance, access control, intercom, and audio systems. They are enhanced by intelligent analytics applications and supported by high-quality training.

Axis has around 4,000 dedicated employees in over 50 countries and collaborates with technology and system integration partners worldwide to deliver customer solutions. Axis was founded in 1984, and the headquarters are in Lund, Sweden​.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

Mária Trnková named Chief Marketing Officer, will lead a newly formed division at ESET

BRATISLAVA — June 1, 2023 —  ESET, a global leader in cybersecurity, is proud to announce the establishment of its new Marketing, Communication, and Digital Business division, appointing Mária Trnková as Chief Marketing Officer. This strategic move, effective June 1, 2023, reflects ESET’s commitment to innovation, enhancing partner and customer experiences, and strengthening its brand presence in the market.

Mária Trnková, previously Vice President for the Consumer and IoT Segment at ESET, brings on board experience with the creation and implementation of an effective data-driven strategy. Mária started her career at ESET in the autumn of 2016. Her journey began as the EMEA Territory Marketing Manager, where she collaborated closely with regional teams to shape effective marketing strategies. During her six-year tenure, Mária showcased exceptional leadership skills, progressively taking on more responsibility and driving impactful results. When she stepped into the position of Segment VP in October 2019, she moved into a role with interfaces across the entire organization. She also worked closely with the company´s management to ensure Consumer and IoT segment strategy definition and effective implementation.

In her new role as Chief Marketing Officer, Mária will spearhead the newly formed Marketing, Communication, and Digital Business division. This strategic division will enhance ESET’s marketing support across segments, fortify its brand position, and foster innovation through closer collaboration with technology and Environmental, Social, and Governance (ESG) teams. The key enabler for successful marketing implementation will be close cooperation with regional and local branches, ensuring delivery of the utmost value to customers.

“I am deeply honored to assume the role of Chief Marketing Officer at ESET. Throughout my journey with the company, I have witnessed the power of hard work and dedication in driving success. I am grateful to work in an inclusive environment where diverse perspectives thrive, fueling innovation and propelling ESET’s growth in the dynamic cybersecurity landscape. Together, we will continue to push boundaries and deliver exceptional solutions to our valued customers,” said Trnková.

Richard Marko, Chief Executive Officer of ESET, expressed his excitement about appointing Mária Trnková as Chief Marketing Officer. He stated, “At ESET, we continuously work on strengthening the position of our brand in the market through research and innovations, but also on improving our performance and finding the right solutions for our customers’ needs. Mária’s appointment as CMO represents a significant step forward for ESET as well as our commitment to keep incorporating equity, and inclusion into our company’s leadership. Her exceptional skills and dedication to driving innovation make her the perfect fit for this role, I wish her a lot of success.”

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET tops the 2023 performance & malware protection tests for consumer products and receives Advanced+ awards

ESET stood out in the Malware Protection Test and the Performance Test conducted by one of the globe’s leading independent security testing organizations

BRATISLAVA — June 2, 2023 —  ESET, a global leader in cybersecurity, is proud to announce that its advanced multilayered security product ESET Internet Security has received the prestigious Advanced+ awards in the recent Malware Protection Test and Performance Test conducted by AV-Comparatives. This recognition highlights ESET’s exceptional performance and its commitment to safeguarding users against malware threats.

The Malware Protection Test evaluated a range of products from 16 vendors, including ESET Internet Security, through the execution of malicious files on the system. The test encompassed vectors such as network drives, USBs, and scenarios where malware existed on the disk. The comprehensive test set comprised 10,015 recent and prevalent malware samples, representing the real-world threats faced by users. ESET Internet Security achieved an outstanding 99.9% malware protection rate. Furthermore, the test report also included a false alarm test, which evaluated the quality of file detection capabilities of antivirus products. Notably, ESET Internet Security exhibited flawless performance with zero false alarms, reinforcing its reliability and demonstrating its ability to detect legitimate files and potential malware threats effectively.

In the latest Performance Test, both “Antivirus” and “Internet Security” consumer products underwent testing – both referred to as security products. The results demonstrate the impact on system performance that a security product has when compared to other tested security products from 16 vendors. The Performance Test comprises several assessments, and the results from these tests collaboratively shape the overall Impact Score. To test the product’s efficiency in using minimal resources, the performance impact across various routine operations, such as file copying, archiving, installing, launching applications, downloading files, and browsing websites, was assessed. The products were classified as Slow, Mediocre, Fast, and Very Fast based on the median results. In addition, the test also ran under the industry-recognized PC Mark benchmark, where the test machine, without any security software, was assigned a PC Mark score of 100 points. Particularly in the PC Mark assessment, ESET Internet Security claimed the top position with 98.4 points, highlighting the efficacy and overall performance of the solution in real-world use.

ESET Internet Security excelled in this rigorous assessment in both the Malware Protection and the Performance Tests. This remarkable score positioned ESET Internet Security among the top of all 16 vendors’ products. It showcased its commitment to delivering robust digital security solutions while fostering trust among consumers guided by AV-Comparatives’ test results.

“We have a deep commitment at ESET to continuously monitor the evolving security landscape and provide advanced solutions. ESET Internet Security, our best mobile multilayered protection against all types of malware threats, helps our modern users concerned about their privacy, who actively use the internet for shopping, banking, work, and communication. Thus, we are thrilled to receive the Advanced+ awards in the Malware Protection Test and the Performance Test by AV-Comparatives, one of the globe’s leading independent security testing organizations,” said Mária Trnková, Vice President of the Consumer and IoT Segment at ESET. “This achievement is a testament to our relentless pursuit of excellence in protecting our users with admirable solutions based on the continuous development of our core ESET technologies. We remain committed to delivering security solutions that provide the highest level of protection without compromising on usability.”

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Finding Zyxel Network Devices

Last month, Zyxel disclosed a remote command execution vulnerability affecting a handful of their product families. This vulnerability has been assigned CVE-2023-28771, and with a CVSSv3 score of 9.8, this vulnerability is considered highly critical. Attackers who send a specially crafted packet to UDP port 500 on an affected Zyxel device could execute arbitrary commands or create a denial-of-service condition.

Along with this disclosure, Zyxel announced updated software to address this issue; information about the update is available here.

There are reports that this vulnerability is being actively exploited in the wild. In the device’s default configuration, the vulnerable port is often exposed to the public Internet.

Finding affected devices using runZero

You can locate Zyxel devices with the exposed by visiting the Asset Inventory and using the following pre-built query:

hw:"Zyxel" and udp_port:500

The devices found by this query should be checked to make sure they are running a patched version of their firmware.

As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory queries.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

The Most Common OT Security Threats and Solutions

There is no question that cybersecurity is a top priority for operational technology (OT) managers across critical sectors like energy, manufacturing, and transportation. These systems control processes vital to society, making them highly attractive targets.

Continue reading

Protecting Sensitive Data in Medical Institutions: How the Regional Center for Blood Donation & Hemotherapy in Warsaw Utilizes Safetica

The Regional Center for Blood Donation and Hemotherapy (Regionalne Centrum Krwiodawstwa i Krwiolecznictwa or RCKiK) in Warsaw is comprised of 10 territorial branches and 5 ambulances that facilitate mobile blood collection, and supply more than 150 liters of blood and blood components to more than 100 hospitals every day. Other customers include clinics and institutes that perform thousands of complex operations, transplants, transfusions and other procedures for which blood or its components are required.

As a medical institution, the RCKiK in Warsaw processes a huge amount of sensitive data containing information about the health of its donors. Until recently, most of the data was processed through paper records, but with technological developments, the digitization of data has become the norm. This switch has introduced a new threat of cyber-attacks and sensitive data leaks through accidental or intentional sharing. This has posed new challenges for the RCKiK.

The security of donor and patient data is a priority for us. That’s why we decided to introduce another technological solution that will ensure comprehensive protection, compliance with regulations and further increase the effectiveness of IT systems securing our facility,

says Karol Pszkit,
Head of the IT Section at the Regional Center for Blood Donation and Hemotherapy in Warsaw.

Medical identity theft occurs when someone uses identifying information related to another person’s health without that person’s knowledge. This can include his or her personal information, home address, registration number and medical records. Unauthorized individuals can use this information to purchase drugs, access reimbursed medical services or file false insurance claims, among other things. Additionally, stolen donor data can be used for other identity fraud.

With more than 300 employees, it’s difficult for us to monitor whether each of them is following procedures correctly. Safetica does this for us, so we know how our center’s processing is going. An additional advantage of the software is that it also performs an educational function in the organization, informing employees whether certain actions on files are appropriate – this is an additional element of protection against accidental data leakage,

explains Karol Pszkit of the RCKiK in Warsaw.

Safetica’s well-configured rules enable the software to detect when sensitive data is about to be mistakenly transmitted, and promptly notifies the employee with a warning message about the potential risk of their action. If the user has the authorization to perform such operations, he or she is allowed to complete the task after giving the necessary explanation to network administrators. Thanks to the fact that Safetica DLP allows continuous monitoring of activities on data, the resources of the Regional Center for Blood Donation and Hemotherapy in Warsaw are even better protected, and employees are aware that the correct way of doing things contributes in a practical way to maintaining the required level of data security for employers, patients

Before implementing the Safetica solution, we received a test version along with training on how to use the management console. The implementation itself went quickly and smoothly. An additional advantage is the exemplary technical support from certified engineers. If we have any questions, we seamlessly receive comprehensive and express assistance,

concludes Karol Pszkit.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

Single Sign-On: What it is and how it works

Nowadays, single sign-on (SSO) authentication is required more than ever. Many websites offer users the option to sign up with Google, Apple, or any other service. Chances are you have logged in to something via single sign-on today or at least this week. But do you know what it is, how it works, and why it’s used? Take a deep dive into the world of single sign-on and all things related to it.

What is SSO?

Single sign-on is a session and user authentication service that allows the user to use a single set of login credentials – namely, a username and password – to access multiple websites or applications. Put plainly, SSO allows users to sign up and access a variety of online accounts with a single username and password, thus making things a lot easier for the everyday user. SSO’s primary use is as an identification system that permits websites and apps to use the data of other trusted sites to verify a user upon login or sign-up.

Essentially, SSO puts an end to the days of remembering and entering multiple passwords. An added bonus is that SSO gets users out of the vicious password reset loops.

Additionally, SSO can be great for business, as it improves productivity, security control, and management. With a single security token (a username and password), IT professionals can enable or disable a user’s access to multiple systems, which in some cases mitigates cybersecurity risks.

So, how does the magical service work?

How does SSO work?

Single sign-on is a component of a centralized electronic identity known as federated identity management (FIM). FIM, or Identity Federation, is a system that enables users to use the same verification method to access multiple applications and other resources on the web. FIM is responsible for a few essential processes:

  • Authentication

  • Authorization

  • User attributes exchange

  • User management

When we talk about SSO, it is important to understand that it is primarily related to the authentication part of the FIM system. It’s concerned with establishing the user’s identity and then sharing that information with each platform that requires that data.

Fancy jargon aside, here are the basic operational processes of single sign-on:

  • You enter a website.

  • You click “Sign In with Apple” or any other service.

  • The site opens Apple’s account login page.

  • If you’re already logged in, then it gives the site your data.

  • You are logged in to your Apple account.

  • Apple’s site verifies that you are authorized to access the site.

  • If you’re authorized, the site creates a session for you and logs you in.

In technical terms, when the user first signs in via an SSO service, the service creates an authentication cookie that remembers that the user is verified. An authentication cookie is a piece of code stored in the user’s browser or the SSO service’s servers. Next time the user logs in to that same app or website using SSO, the service then transfers the user’s authentication cookie to that platform, and the user is allowed to access it. It’s important to highlight that an SSO service doesn’t identify the exact user since it does not store user identities.

What is an SSO Token?

An SSO token is a digital unit that contains data about a particular user such as their email address. The token is used to transfer user information from one system to another during the single sign-on process. For the recipient to verify that the token comes from a trusted source, it has to be signed digitally.

The SSO service creates a token whenever a user signs in to it. The token works like a temporary ID card which helps identify an already verified user. This means that when the user tries to access a given app, the SSO service will need to pass the user’s authentication token to that app so they can be allowed in.

Password security for your business

Store, manage and share passwords.

30-day money-back guarantee

Single-Sign-On Costs

Because many of the SSO solutions currently available on the market are cloud-based, most of them are offered in a monthly subscription model. The price of a cloud-driven SSO solution designed for small and mid-sized businesses can range from $1 to $10 per user per month.

However, those that want to get an SSO solution designed for a big enterprise will need to either pay more each month or make an entry fee. Enterprise-grade solutions are usually more wide-ranging and require vendors to customize them to each of their client’s needs and requirements. Hence, the price difference.

Is single sign-on secure?

Yes. An SSO protocol is secure when implemented and managed properly and used alongside other cybersecurity tools.

The main benefit introduced by single-sign on with regard to cybersecurity is that, because it allows using a single set of credentials for multiple services, there are fewer login details to be lost or stolen. As long as the server is secure and an organization’s access control policies are established, a malicious user or an attacker will have little to no chance to do any damage.

However, this benefit could also pose a certain kind of risk. Since SSO provides instant access to multiple accounts via a single endpoint, if a hacker gains access to an authenticated SSO account, they will also gain access to all the linked applications, websites, platforms, and other online environments.

This issue can be easily mitigated by implementing an additional layer of security known as Multi-Factor Authentication. Combining SSO with MFA allows service providers to verify users’ identity while giving them easy access to applications or online platforms.

The benefits of SSO

Reduced password fatigue

With SSO in place, users only have to remember one password, making life a lot easier. Password fatigue is real and dangerous. SSO encourages users to come up with a single strong password rather than using a simple one for each account separately. It also helps users escape the vicious cycle of password reset loops.

Increased employee and IT productivity

When deployed in a business setting, SSO can be a real time saver. According to a recent report, people waste 16.3 billion hours a year trying to remember, type, or reset passwords. In a business environment, every minute counts. Thanks to SSO, users don’t need to hop between multiple login URLs or reset passwords and can focus on the tasks at hand.

Enhanced user experience

One of the most valuable benefits of SSO is an improved user experience. Because repeated logins are not required, users can enjoy a digital experience with less hassle. This means that users will be less hesitant to use the service. For any commercial web-based service, SSO is an essential part of their user experience.

Centralized control of user access

SSO offers organizations centralized control over who has access to their systems. In a business setting, you can use SSO to grant new employees specific levels of access to different systems. You can also provide employees with a single set of credentials (username and passwords) to access all company systems.

Top single sign-on solutions

Microsoft Azure AD

Microsoft Azure AD includes Active Directory Federation Services (AD FS) as an option to support SSO. Azure AD also offers reporting, security analytics, and multi-factor authentication services. It’s perfectly suited for any company that uses the Microsoft Azure cloud platform, no matter its size.

Okta Identity Cloud

Okta is well-established in the world of SSO solutions. They are open-source SSO leaders because of their flexibility and ease of use. Okta offers customizable open identity management in real time according to business needs, as well as two-factor authentication and a password reset functionality. Okta can serve the needs of multiple industries, from education and nonprofits to financial services and the government.

OneLogin Unified Access Management Platform

OneLogin is an open-source SSO provider that is often used for employee access to the company’s cloud-based applications. OneLogin is suited for a variety of IT administrator needs since it is designed to enforce IT policy in real time. It can also be updated according to specific needs if any changes occur, such as an employee leaving.

Idaptive Application Services

Idaptive is primarily suited for small to medium-sized businesses. Idaptive is capable of providing support to many users at once, thanks to their new cloud architecture. The company also offers adaptive MFA, enterprise mobility management (EMM), and user behavior analytics (UBA) all in a single solution.

Ping Intelligent Identity Platform

Ping offers services to large enterprises. The solution can serve anywhere between a few hundred to a few million users. Ping provides both on-premises and cloud options for deploying their solution. Additionally, the service comes with multi-factor authentication.

Does NordPass provide SSO?

Yes, NordPass does provide a single sign-on authentication! It can be set up via NordPass Admin Panel for users who want to log in to the NordPass app with their Microsoft Azure, Google Workspace, or Okta credentials.

This means that if you turn on Microsoft Azure Active Directory (AD), Google Single Sign-On, or Okta Single Sign-On, and invite new members who use one of these SSOs, they will be allowed to login in using their Azure AD, Google, or Okta SSO credentials — it’s as simple as that.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Storage Beyond Passwords: Securely Save Files in NordPass

Ever been in that awful situation where you’re going through old emails or disorganized folders trying to find that one crucial document? The insurance form, an e-copy of your ID, or even a video detailing how to get into your new office? Wouldn’t it be a game-changer if you had all your important files right next to your passwords, credit card information, or secure notes?

Good news! Today, we are excited to introduce File Attachments — a new and improved way to manage important files with NordPass.

Best for large file attachments

Here’s a quick rundown of how it works. As a NordPass Premium user, you now have the ability to attach files to your saved items in NordPass. It’s not just about enhancing organization. This feature also provides an unmatched level of security. Forget the hassle of disorganized unsafe file storage. Any attached files or documents will be as secure as your passwords thanks to our encrypted storage.

But we didn’t stop at mere functionality. NordPass Premium now provides a whopping 3GB of encrypted storage per account, a giant leap forward. That’s not just more — it’s three times more than any other password manager out there! We’re offering you unrivaled storage and advanced security — and that’s certainly what we call more bang for your buck!

NordPass — The best password manager for large file attachments.

– Attila Tomaschek

CNET

No strings attached (except your files)

With NordPass Premium’s File Attachments, you have the freedom to store documents of any type to one of your existing items. Whether it’s a simple JPEG, PDF, MP4, or DOC file — NordPass supports them all.

Supported file types

The new feature allows for files up to 50MB in size and up to 50 attachments per single item. The only limit is your 3GB storage per user — and that’s a whole lot of space for your files.

While we aim at maximizing convenience, your security is always our top priority. To ensure maximum protection, we currently do not support attaching files to shared items or sharing items with files attached.

You can learn more about how to attach files to your NordPass items in our handy help center article.

Streamline your digital life with NordPass

In the digital age, we often juggle tons of files, documents, and data, and that can lead to a disorganized and chaotic personal digital space. With our new File Attachments feature, we look to help you take back control and streamline your digital life by allowing you to save documents in a quick and efficient way

With NordPass Premium, you can now attach important files to all your saved items. Store any file in one secure place with 3GB encrypted storage.

Instant access

When you’re in a hurry, having quick access to your important documents can make all the difference. That’s where File Attachments shine. Need to view a copy of your ID or an important receipt? No problem! With File Attachments, all your vital images or documents are just a few clicks away.

Effortless downloads

It’s not just about attaching and storing your files along with your passwords. It’s also about being able to retrieve them whenever necessary. Suppose you’ve stored financial documents that you need to share with your spouse. With File Attachments, you can quickly and effortlessly download these files directly from NordPass.

Unprecedented control

The File Attachments feature isn’t just about adding another functionality to NordPass. It’s about giving you greater control over your digital life. You get to decide what files to attach, what items those files are attached to, and when to download or delete them. You can also organize your vault in a way that best suits your personal or professional needs.

A single secure place for files and passwords

Take your password manager experience to the next level with NordPass Premium. Don’t just manage your passwords, manage your life. No more scrambling for documents, no more disorganized files, and certainly no more compromised security.

Your life. Your files. One secure place. Start your NordPass Premium journey today and make the most of our File Attachments feature.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

23.3.9 ‘Voyager’ released

Changes compared to 23.3.8

Bug Fixes

  • Fix an issue with macOS devices failing to log in with an ERR_UNKNOWN_DEVICE error
  • Fix an issue with the Recent Activity and Policies pages not loading correctly when hard-refreshed or loaded directly via URL
  • Fix an issue with Comet default branding not presenting correctly following a server upgrade

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

CyberLink FaceMe® facial recognition integrates with MediaTek’s Genio 700 IoT Platform to deliver a 6.5X performance boost

CyberLink (5203.TW), a leading manufacturer of AI facial recognition technologies, has strengthened its presence in the smart IoT market. The company has announced that its FaceMe® facial recognition engine has been integrated with MediaTek’s Genio 700 next-gen smart IoT platform, dramatically increasing AI performance.

While it continues to integrate with numerous other IoT platforms, CyberLink FaceMe® has significantly improved performance on MediaTek’s latest Genio 700 processors. Running on a Genio 700, the FaceMe® engine is accelerated by MediaTek’s AI Processing Unit (APU). Performance tests show that, in comparison to running exclusively via CPU processing, the APU hardware / software integration increases performance by 6.5X, with a 24% reduction in CPU usage.

The new MediaTek processor provides faster, more efficient and reliable AI facial recognition processing, meeting the complex, high-speed edge computing needs of smart retail and smart security and access control operations. “The strong alliance between CyberLink and MediaTek, with its Genio IoT products, will provide FaceMe® users with faster, more convenient, and powerful facial recognition edge computing products,” said Jau Huang, Chairman and CEO of CyberLink, “enhancing the security and dependability of deployed facial recognition services.”

MediaTek’s Genio 700 is a high-performance AI computing IoT platform. This system-on-chip (SoC) provides powerful CPU, GPU and AI modules, designed for smart home, smart retail and industrial IoT devices. By integrating the latest AI cores and accelerators, the Genio 700 greatly enhances the smart computing power of edge devices, and significantly increases the number of image frames that can be processed per second. MediaTek’s platform can also support real-time AI facial recognition from multiple simultaneous video streams, improving the identification efficiency for implementation scenarios such as smart retail, and access control.

CyberLink FaceMe® not only recognizes faces but can also identify gender, age, and emotions. These features enable the turnkey FaceMe® Smart Retail customer analytics solution to obtain insight into guest demographics, behaviours, and trends. FaceMe® Security strengthens on-site security, with a more complete intelligent security control system.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com