Airline leaked 9.4 million customers personal privacy,could face huge fines of $4 billion.

Recently, an airline issued an announcement on its website. It revealed that the personal data of about 9.4 million passengers were stolen. The incident began in March, confirmed in May, and announced in October. Personal information includes passenger name, nationality, telephone number, passport number, etc. In this incident,business not only faces with the crisis of brand image and customer confidence,it may face a huge fine of nearly $4 billion due to its failure to notify the incident in time under the EU's General Data Protection Regulations (GDPR).
Let the business grow in the long term | Start with protecting assets
At the network security level, the most common challenges for businesses are prevention, detection, and response to protect business endpoints, servers, networks, and sensitive data. Installing anti-virus software is the first step. However, in the face of today's endless network attacks, this step is relatively passive. The airline incident started with a system anomaly in March and confirmed the leakage of data in May. It was announced in October and the whole process lasted for more than six months. A company spokesperson said that it took so long to find out exactly what happened.
The environment faced by businesses is complex and severe. Especially for airlines with
large-scale business, many employees, and extremely valuable customer information stored, they will naturally become the target of hackers.
Today, companies should use the widest range of potential sources to obtain anti-virus
information in order to make predictive adjustments and adapt to an evolving security
environment. Targeted attacks, advanced stubborn threats (APT), zero-day viruses, and
botnet activity are hard to find for security engineers who only get relevant information from the company's internal network environment.
On the contrary; using artificial intelligence and machine learning, early warning, and
monitoring various threats from inside and outside of company, businesses can then respond in a timely manner and reduce losses.
Preventing data leakage depends on professional software assistance
X-FORT electronic data control system, integrated protection, without loopholes
In planning control, many system authorisations of MIS and senior executives and
managerswith the most information but not under supervision will be ignored. The
employers’mindset is always different from that of the employees. The managers want
convenience. Employees want to work smoothly.In order not to cause inconvenience to
employees’ work, but also make the employers feel at ease,internal security control is
indispensable. X-FORT allows MIS system setting, managers to check the information,senior executives to easily master reports and easily manage internal security.
Main functions
· Integrate AD to provide remote deployment
·Protection features include any channels that may write data
· Does not change the user's operating experience, does not affect the user's computer
operation
·Humanistic and intuitive UI management interface, zero learning costfor managers
· Instant warning, regular delivery of operation reports, mastering the usage condition of
employees' computers
· Select functions according to the requirements of business security, and provide flexible
space for future expansion

Customer Satisfaction

Company Profile

Established in 1989, FineArt Technology Co., Ltd. began as a team of NCTU graduates that shared the same vision in professional software R&D.
The company has collaborated with international companies and is widely acclaimed for its compact, speedy, and accurate program features from the first local Desk Top Publishing (DTP) to Handwriting Recognition (HR). FineArt Technology’s product line has received positive feedback from its customers over the past 20 years.
In addition to substantial OEM/ODM market development, FineArt Technology also engages in information protection, computer asset management, and USB application software to provide professional Data Leak Protection (DLP) for enterprise and personal users and meet customers’ software product requirements. The company persists in stringent quality control and enthusiasm in providing customers with the most comprehensive and reliable products and services.
FineArt Technology holds great pride in its technology and R&D experiences. Other than numerous national awards and more than 110 patents locally and overseas, it has also excelled in domestic and overseas product sales. FineArt software is found in one of seven USB flash drives worldwide! It also successfully gained entry in the Japanese market with high-quality information security products used by many world-renowned customers. Its handwriting recognition software is also adopted by CASIO, the leading electronic dictionary manufacturer in Japan with over 3 million authorized sales annually. Not only has FineArt established reputable credibility amongst its clients, it has also proved its mature and reliable professionalism in software.
As its name implies, FineArt insists on developing the most innovative and functional products in pursuit of art and beauty. With years of R&D experience, FineArt aims to achieve innovative breakthroughs and expand overseas markets so that Taiwan can become one of the world leaders in software technology.

NetJapan releases an Updated ActiveVisor™

NetJapan releases the next iteration of ActiveVisor™, a centralized solution for managing ActiveImage Protector™ clients featuring a new browser-based console, and expanded license management.

Tokyo – NetJapan, Inc., publisher of backup, disaster recovery, and virtualization software solutions, announces a new release of ActiveVisor, a centralized solution for managing ActiveImage Protector backup clients. ActiveVisor now includes a new browser-based console, expanded license management, and support for Microsoft Azure.

New Features:

  • Browser-based Console
    Administrators can manage, monitor, and modify backup agents, and task schedules from any location using a new browser-based console. 
  • Expanded License Management
    New offline-mode provides client licenses on environments that are not connected to the internet. 
  • Centralized Management of Microsoft Azure Clients
    Manage Azure Virtual Clients connected to local network domains. 
  • Improved Console Performance
    ActiveVisor’s new console has improved responsiveness and lower resource consumption, resulting in smoother console operation.
  • Enhanced Client Monitoring Panel
    An auto-scroll feature in the monitoring panel displays alerts of the latest changes occurring on clients. When a monitored client’s status changes, the client’s information will automatically display at the top of the panel.

Standard Features

  • Graphical Dashboard
    The dashboard window provides a graphical representation of computers on the network, OS types, ActiveImage protected client machines, and visually draws attention to the status of task execution.
  • Client Grouping
    Clients can be grouped for management purposes. Groups can be rearranged, if necessary, based on changes to a systems configuration.
  • Detailed and Flexible Scheduling
    Schedules may be configured based on individual client requirements, or apply a predefined scheduled template to deploy a pattern-based backup schedule to batches of clients.
  • Push Install
    The Push Installer lists unmanaged clients in the Domain or workgroup, and can  remotely install the ActiveImage Protector agents to unmanaged clients.
  • License Manager
    The License Manager provides the centralized management of ActiveImage protected clients by displaying product key information for licensed client machines, and can reassign client licenses as needed. 

ActiveVisor is provided at no additional charge to ActiveImage Protector users who have valid annual maintenance contracts.

GREYCORTEX ATTENDS IT SA 2018

IT-SA is Europe’s leading trade fair for IT security. Held in the German city of Nuremberg over October 9-11, it features over 630 presenters in three halls, in diverse areas like mobile, cloud, network, and data security. It also offers an additional day of expert speakers in the field of IT Security. GREYCORTEX will attend for the second time attending the show.

If you’re going, make sure to stop by our booth in Hall 10.1 / 10.1-408, and ask Michal Srubar, Pavel Chmelar, and Irina Milshina how MENDEL’s advanced detection, deep visibility, and quick response features can secure your network.

You can find our profile here and floor plan here.

NetJapan, Inc., Releases ActiveImage Protector™ 2018 SP2 For Hyper-V™ Enterprise With ReZoom it!™ Live

Tokyo – NetJapan, Inc., publisher of backup, disaster recovery, and virtualization software, releases ActiveImage Protector 2018 SP2 for Hyper-V Enterprise with a new feature,  ReZoom it! Live, and support for ActiveVisor™ management console.

After a disaster, malware infection, or system failure, large multi-terabyte virtual machines can take hours to recover. ReZoom it! Live eliminates this time-gap between failure and recovery by providing system availability while recovering a virtual machine.  ReZoom it! Live boots the virtual machine from the host’s backup when the recovery process begins; bringing the virtual machine online while simultaneously recovering the VM. All changes made during the ReZoom it! Live process will be available when the recovered virtual machine is subsequently booted.

ActiveImage Protector can now create bootable media on either USB disk drives or USB flash drives. This takes advantage of the additional space provided to store backups, and the added convenience of having the backups local when using a bootable USB disk drive.

ActiveImage Protector 2018 includes task tools for verifying backup integrity and bootability, and for consolidating backup image files via post-backup processing. NetJapan’s BootCheck™ gives you confidence that your backups are bootable, whether restoring or virtualizing.

New features

  • ReZoom it! Live eliminates the time-gap between VM failure and recovery.
  • Full support for NetJapan’s new centralized management console ActiveVisor.
  • Boot Environment Builder now supports USB disk drives.
  • Post-backup processing tools now include BootCheck and backup image file consolidation.
  • Enhanced full-state file recovery now retains file and directory access rights

For more information about ActiveImage Protector 2018 for Hyper-V Enterprise, please visit here.

NetJapan, Inc., Releases ActiveVisor™

An Enterprise Management Solution for System Administrators to Easily Manage NetJapan’s Flagship Backup and Recovery Product, ActiveImage Protector.

Tokyo – NetJapan, Inc., publisher of backup, recovery, and virtualization software solutions, announces the release of ActiveVisor, an enterprise management solution for system administrators to manage ActiveImage Protector backup agents.

ActiveVisor monitors and manages the state of ActiveImage Protector agents in order for system administrators to maintain system continuity. By collecting information from distributed agents over the network, ActiveVisor provides a visual representation of overall system protection, sends email notifications of client backup status, monitors storage space availability of devices, and administer deployment of agents, schedules, and tasks. System administrators save time, and reduce costs by managing ActiveImage Protector agent settings providing peace of mind that continuous and reliable backups are performed.

Features:

  • Graphical Dashboard: The dashboard window provides a graphical representation of computers on the network, OS types, ActiveImage protected client machines, and visually draws attention to the status of task execution.
  • Add Managed Clients: You can select specific clients, and add them as managed clients so you can monitor and manage agent tasks.
  • Managed Client Grouping: Clients can be grouped for management purposes. Groups can be rearranged, if necessary, based on changes to a systems configuration.
  • Detailed and Flexible Scheduling: Schedules may be configured based on individual client requirements, or apply a predefined scheduled template to deploy a pattern-based backup schedule to batches of clients.
  • Monitor Agent Status and View Logs: ActiveVisor monitors task status, task execution, and agent status. ActiveVisor can display task execution logs for managed clients, and provides pre-emptive information such as insufficient space for efficient storage management.
  • Visual Alert: In the event of a system failure, ActiveVisor provides table views illustrating where the failure occurred, so the affected system can be recovered quickly.
  • Push Install: The Push Installer finds unprotected machines in the domain or workgroup and remotely pushes ActiveImage Protector to the client machine.
  • License Manager: License Manager provides centralized management of ActiveImage Protected clients, displays product key information, list licensed client machines and re-assigns licenses as needed.

Download PDF

ActiveVisor is provided at no additional charge to ActiveImage Protector users who have valid annual maintenance contracts.

More information on the ActiveVisor page.

ESET Declared a Leader and Top IT Security Vendor in Central and Eastern Europe

ESET, the leading IT security company based in the European Union, is the top endpoint security vendor in Central and Eastern Europe (CEE), taking the most sizeable portion of the annual market share. According to the IDC Endpoint security software market shares 2017 report, ESET’s market share in the CEE region accounts for 37.5 percent, outpacing all of its competition[1]. IDC has estimated ESET generates around 90 million USD from the IT security revenues recorded in the region in 2017 following 13.5 percent year-on-year growth. ESET is also included among IDC’s “established leaders“, which are large organizations with extensive R&D teams, robust security suites and strong investments in innovation.


“ESET’s technology comes from Central Europe, with our first software being developed in Slovakia more than 30 years ago, which makes us even more proud to keep the CEE region as our stronghold. We are proud to be the leading ’made in the European Union’ IT security solution and pleased that we are expanding our reach further in Europe including our fast growing Western European markets,“ says Miroslav Mikus, ESET Sales and Marketing Director for the EMEA region. 


ESET is headquartered in Central Europe and accounts for 37.5 percent CEE market share based on this recently released IDC market report. ESET ranks 6th globally according to the analyst firm.

IDC highlights ESET Encryption and two-factor authentication in its report, both crucial elements in the already active GDPR legislation. “Both multi-factor authentication and encryption are available to midmarket customers of ESET at an acceptable price and level of complexity along with ease of use… An offering that promises significant data security improvements for ESET’s customers,” writes Mark Child, IDC’s CEE Security Practice Lead, author of this report.

[1] Mark Child, Research Manager, Software, Central and Eastern Europe Endpoint Security Software Market Shares, 2017 (market data for 2017) Available on IDC website

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

NEW! NetJapan releases version 2.0 of ActiveImage™ Deploy USB

Download PDF

Tokyo – NetJapan, Inc., publisher of backup, disaster recovery, and virtualization software, releases version 2.0 of ActiveImage™ Deploy USB, a USB based OS deployment tool for VARs, OEMs, and System Integrators.

ActiveImage Deploy USB v2.0 creates a bootable USB Flash Memory containing a master image created from a pre-configured computer system, and deploys that image to a new client machine. ActiveImage Deploy USB automates, simplifies, and streamlines the deployment process making it an ideal solution for setting up new systems to include custom software and hardware configurations, and deploying setups to a large numbers of computers.

Version 2.0 now simplifies license management, deployment to larger disks, password protected master image files, and now master images can be created using Inline Data Deduplication Compression.

NEW Features:

  • Simplified Licensing Management.
    The Built-in License Manager includes the addition of multiple and site license configuration.
  • Deployment to Larger Disks.
    Optionally, restore to larger disks and automatically extend volumes.
  • Password protect master image files.
    Secure Master image files with password protection.
  • Create Master Image files using Inline Data Deduplication Compression (IDDC).
    Significantly reduce image size and deployment time by using IDDC when creating master image files.

OTHER Features:

  • An easy-to-use wizard driven interface guides you through creating a bootable USB Flash Memory with ActiveImage Deploy USB installed and ready to use.
  • The built in “Auto-Start” feature automates cloning without user interaction. Simply attach the USB Flash Memory to the target computer, power the system on, and ActiveImage Deploy USB deploys the pre-configured image to the target system.
  • The created Images are stored on the USB Flash Memory, eliminating the need for additional storage devices to be connected.
  • No need for deployment server or configuring network settings
  • Flexible license distribution to easily allocate licenses to each created USB Flash Memory deployment device.

For more information about ActiveImage Deploy USB, please visit: https://www.netjapan.com/en-us/backup-dr-solutions/deploy/

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

ESET Threat Intelligence data improves detection

A test conducted by Whalebone, a provider of DNS filtering services, showed that adding Indicators of Compromise from ESET to DNS filtering detection data significantly improves detection.


Experts from Whalebone and ESET revealed the results of a DNS filtering test in their joint presentation at the IS2 Conference, an information security event held in Prague, Czech Republic. The test was run on a sample of 100,000 internet connections, representing around half a million connected devices in two countries, the Czech Republic and Slovakia.


Before, Whalebone had utilized Indicators of Compromise (IoC) generated via methods such as sandbox simulations, analysis of network traffic or utilizing known malware patterns. „We wanted to include detection data from endpoints as a new source of IoC, hoping for improved detection capability,“ said Robert Šefr, Whalebone’s Chief Technology Officer.

The test was aimed at confirming the expectation that including IoC from ESET Threat Intelligence would lead to new, previously unavailable detections – while keeping false positives at a minimum.


The test was run in the first quarter of 2018 and involved around 55,000 unique malicious domains in the tested IoC feed. Out of those, around 1100 domains were detected. 18.5% of the devices in the test made at least one attempt to contact a malicious domain from the feed; the overall number of incidents in the test was around 1.75 million. Out of those, around  half (866,000 incidents, precisely 49.51%) were detected based solely on the IoC provided by ESET – i.e., without data from ESET, these incidents would have gone undetected. Only 0.47% of incidents were detected based on both ESET’s and original Whalebone data; the remaining 50.02% of incidents were detected independently from ESET.


Out of the 866,000 incidents detected based on the IoC by ESET, only one single domain blocking was found to be a false positive.

„The Whalebone test clearly showed that rigorous categorization of data, which is paramount for ESET, allows for both a high detection rate and keeping false positives close to zero,“ comments Peter Dekýš, ESET’s IT Security Director.


“The testing has shown that by including IoC from ESET Threat Intelligence, detections significantly increased, with false positives amounting virtually to zero. Overall, the test has proven that it is appropriate to use endpoint-sourced IoC for DNS-level protection”, concludes Whalebone’s Robert Šefr.


For more information about ESET Threat Intelligence, please visit ESET Threat Intelligence.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Why GDPR affects companies around the world (video)

As you all know, today, May 25, is the day that GDPR comes into force in the European Union; legislation that will affect companies and citizens around the world, not just in the EU. This is explained by Anscombe, in a video that will hopefully help clarify some of the particulars regarding the new legislation.

GDPR returns control of personal data to the user/customer. In this sense, GDPR makes it mandatory to have the user’s consent for the use of their personal data. Also, obtaining that consent by the user entails certain responsibilities for the company or organization, as it must ensure that this information is collected by the correct persons. This information may only be stored for a period of time and that these data are encrypted.


GDPR affects globally and just within the EU

Some might find the topic concerning who is affected and where they are affected confusing, but Anscombe explains exactly how it will work: “If a user is in Europe and connects to a website or service outside Europe, that service has to provide the same privileges as if operating from Europe, which must comply with the new regulations that imposes  GDPR,” he explained.

Another example mentioned is the case of the non-European citizen, who is occasionally in EU territory and who connects to a website that they usually use when they are outside Europe. In this case, the site must comply with the new legislation, since GDPR applies to everyone who is in the EU at that time – not just its citizens.

Therefore, if you provide services or if your site has visitors from the EU it is important that you consider the changes that have come into force, that you prepare a plan and that you make sure you comply with GDPR.

You may also be interested in any of the following items:

Are firms and regulators prepared for GDPR?

Last call for GDPR

GDPR: One rule to rule them all – legally

For more information on GDPR, ESET has a dedicated page to help ensure that you have all the information needed to cope with GDPR. To read more articles like this one and the ones listed above, please follow our library of related content here on WeLiveSecurity.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.


About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.