Skip to content

ESET named a ‘Strategic Leader’ in rigorous new AV-Comparatives Endpoint Prevention and Response Test

BRATISLAVA – ESET, a global leader in cybersecurity, has been named a Strategic Leader in the Endpoint Prevention and Response (EPR) Comparative Report, one of the most comprehensive tests of endpoint detection and response (EDR) solutions and endpoint security products ever performed by AV-Comparatives. The ESET PROTECT Enterprise bundle, comprising the ESET PROTECT management console, ESET Endpoint Security 7.3, and ESET Enterprise Inspector 1.4 – ESET’s EDR solution – was tested in the report.

AV-Comparatives, a leading independent testing organization, well-known for offering innovative real-world environment testing, subjected the products of nine vendors to dozens of targeted attacks, each deployed by a variety of techniques and tactics.

In addition to traditional in-depth testing, AV-Comparatives has developed an Enterprise EPR CyberRisk Quadrant™ that factors in the effectiveness of each product at preventing breaches, the calculated savings resulting from this, the purchase costs of the product, and the product’s accuracy costs (incurred due to false positives). ESET and its solutions were named a Strategic Leader in the quadrant – the highest certification in the quadrant. Strategic Leaders are defined as products that have a very high return on investment and provide very low total cost of ownership due to exceptional technical   capabilities, combined with reasonable costs. Strategic Leaders develop groundbreaking ideas and implement these impressively in their products.

ESET achieved particularly high scores in the categories of active response, passive response, and combined prevention/response capabilities, scoring the highest percentages of the test with 98%, 100%, and 99%, respectively. In the combined prevention category, only four out of the nine vendors received such a result.

As stated in the report, ESET PROTECT Enterprise did exceptionally well at handling threats targeted towards the user, in particular before the threat progressed inside the user environment. The easy-to-use intuitive console was praised, as well as the contextual data provided in order for security analysts to prioritize, mitigate, and further investigate threats. In addition to threat data and insight, ESET’s solutions showed good mapping to the MITRE ATT&CK®, enabling analysts to escalate an incident when necessary and provide additional defensive measures when available.

Andreas Clementi, CEO and founder, AV-Comparatives, commented, “ESET not only achieved the highest combined prevention and response score in the test, but also demonstrated outstanding overall detection and reporting capabilities. The test results contributed to ESET’s lowest total cost of ownership for organizations among all assessed vendors and ensured ESET’s position as a Strategic Leader in this new test by AV-Comparatives.”

Juraj Malcho, Chief Technology Officer at ESET, noted, “We are extremely proud of these results and of being named a Strategic Leader by AV-Comparatives in such a rigorous and important new test. We are passionate about always improving on and innovating our cutting-edge solutions, and third-party testing is a critical step in ensuring we’re delivering on that promise. The high scores in this EPR test reflect both our dedication to our customers’ safety and our commitment to providing the highest standard of EDR and endpoint security solutions from both passive and active defense standpoints.”

To learn more about ESET’s award-winning solutions, click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

What have we learned about mobile security in 2020?

Whether we like it or not, it is now an established fact that mobile phones play a major role in our day-to-day life, and never has this been truer than in 2020. With opportunities for socializing and travel reduced, it has been a year of scrolling, messaging and video calling. While there is a general perception that mobile phones are a safe haven from malware and cyberthreats, ESET’s research this year has shown that to be far from the truth.

Android threats surged in March, as the COVID-19 crisis created an opportunity for threat actors to exploit Android users’ hunger for information about the virus and related topics. ESET researchers witnessed malicious apps distributed in campaigns under coronavirus-themed disguises, such as infection maps, tracking applications and information about financial compensation.

For example, in Q2 2020, ESET researchers identified a new Android crypto-ransomware posing as a Canadian COVID-19 tracing app, just days after the Canadian government announced its intention to back the development of a nationwide tracing app. ESET researchers also analyzed an extremely dangerous Android app in May called DEFENSOR ID, which was capable of wiping out a victim’s bank account or cryptocurrency wallet and taking over their email or social media accounts.

In July, a long-running cyberespionage campaign was discovered that targeted Android users in the Middle East via the malicious Welcome Chat app. The app’s operators spied on their victims and then made the data harvested from them freely available on the internet. Similarly, victims in the Middle East were also targeted with a new version of Android spyware used by the APT-C-23 group, which allowed threat actors to read notifications from messaging apps and record calls and screen activity.

These discoveries demonstrate that threats must be taken seriously, but they do not need to ruin our experience with mobile phones – it is vital that we are just as committed to protecting our phones with cybersecurity software as we are our laptops and desktops. ESET Mobile Security (EMS) is a solution for Android that protects against a multitude of mobile threats, securing users’ data through strong malware protection and providing a safe browsing environment with its anti-phishing feature. EMS also protects users from physical loss and theft, supplying real-time information about the status and whereabouts of the device in question.

In September of this year, version 6.0 of ESET Mobile Security was launched, adding a host of new features including Payment Protection, which safeguards users while they are using applications in which they access sensitive financial information for banking transactions or online shopping. The feature prevents other apps replacing or reading the screen of any applications installed from the Google Play store that fall into the finance category, also allowing users to use the same protection for other installed apps that fall outside of the finance category.

Version 6.0 also brought design changes, improving its intuitiveness and ease of use with features such as the Call Filter feature that allows users to protect against unwanted incoming calls and a redesign of the Anti-Theft feature to allow for simpler onboarding and resetting of passwords.

The year 2020 also saw ESET awarded certificates by MRG Effitas, a world leader in independent IT security efficacy testing, in their Android 360° Assessment Programmes in Q1, Q2 and Q3, receiving a 99%+ score for detection. As both the report and ESET’s research highlight, Android-based threats are constantly on the rise, and it is therefore vital to have software installed that protects against malware, as well as other threats such as phishing.

To find out more about ESET Mobile Security and how it can keep you and your phone safe from mobile threats, head over to ESET’s website

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET has joined the Diversity Charter of the Slovak Republic

Bratislava – ESET, a global leader in cybersecurity, has joined fifty other signatory companies operating in the Slovak Republic in signing the Diversity Charter of the Slovak Republic. In a first, the signing ceremony took place online. The Diversity Charter is a voluntary initiative by companies and organizations to promote diversity in the workplace. It is supported by the European Commission via the EU Platform of Diversity Charters, which supports the dissemination and sharing of principles, good practice and experience on diversity management in EU countries.

“For ESET, as a technology company, a central tenet of diversity and CSR activities is strengthening the representation of women and girls in IT, not only for the company itself, but for the entire sector as a whole. By signing the Diversity Charter of the Slovak Republic, we want to demonstrate that ESET takes inclusion and diversity seriously and that it is a matter of principle for us,” said Lucia Marková, ESET’s CSR Manager, at the signing of the Diversity Charter.

Membership in this initiative is open to all companies and organizations that are aware of the importance of equal treatment, inclusion and diversity in the workplace. The signatories agree with the content of the Diversity Charter of the Slovak Republic and subscribe to the following principles:

  • Voluntarily integrate into the life of the company a set of principles and procedures that take into account diversity and an inclusive approach in the workplace.
  • Build a relationship toward employees based on these principles and raise awareness of diversity issues at the management level.
  • Inspire other companies operating in Slovakia and spread awareness of the benefits arising from the implementation of a policy of diversity.

“We work hard at creating a respectful environment in which all our employees feel welcome, without distinction. We promote diversity in the workplace very naturally; on our part, we mainly focus on a receptive and individual approach, not on statistics. We also pay serious attention to the approach we’ve taken to promote mental health at work, a very current topic that underlies the success of any and all employees,” concludes Daniela Škripková, Chief HR Officer at ESET.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

SolarWinds / SunBurst – Should Enterprises Adopt Supply Chain Certification?

SunBurst – The Cyber Attack on SolarWinds

SunBurst is a cyber espionage campaign that leveraged a supply chain attack on SolarWinds, a leading supplier of network management software. Between March and May 2020, the attackers gained access to SolarWinds’ build system, added a malicious DLL (library) file, and distributed it to 18,000 SolarWinds Orion customers.

The malicious file allowed remote control of the target host, while leveraging advanced evasive tactics. Using this access point, the attackers were able to hack into organizations with well-established security practices such as Cisco and Microsoft. These organizations failed to detect the attack before FireEye (who was also attacked) made it public.

A targeted attack at this scale doesn’t happen very often. It’s a rare event that should shake both enterprises and the security community. The fact that this campaign went undetected for such a long period of time (6+ months), proves that something is fundamentally wrong with the way that computer networks are protected.

The success of this attack campaign, versus other campaigns, is built upon two factors:

  1. First and foremost, this is not a coincidence. This is a team of highly skilled attackers who made all of it possible. The campaign shows world-class planning, knowledge, experience and attention to detail.
  2. SolarWinds Orion is a network management product. Due to its role, it has a number of advantages as an attack source, vs. other types of attack sources:
    1. It’s whitelisted to perform reconnaissance (network monitoring) in many security tools – This tool is designed to perform reconnaissance, so no one will suspect when the tool does what it was designed to do.
    2. From SolarWindows Orion’s perspective in the network, the network is usually flat. Regardless of how many network segments are there, the component in Orion that scans the network requires direct network access to the target devices, so enterprises allow this traffic through their firewalls. This allows unique network access from the initial access point.
    3. SolarWinds Orion commonly has access to certain admin credentials that make it possible to move laterally.

The Supply Chain Risk

The supply chain risk to both enterprises and government organizations has been discussed in the last few years. The attack on SolarWinds is one of the most powerful examples of the supply chain risk. It joins a list of similar events such as the attack on Target in 2013. Supply chain attacks exploit trusted third-parties to enable access to a large number of attack targets in parallel. By using that trust, such as the trust organizations put on SolarWinds software updates, it’s easier to obtain access rather than attacking each target separately and directly.

Supply Chain Certification

The United States DoD (Department of Defense) is one of the government organizations that took far-reaching steps to reduce the supply chain risk. In October 2016, the DoD first issued a supplement to the DFARS regulation, that introduced cyber security requirements for DoD suppliers. In November 2020, only a month before the supply chain attack on SolarWinds, the DoD made another major addition to DFARS. This addition is called CMMC or the Cybersecurity Maturity Model Certification.

The CMMC includes a few non-linear improvements vs. the original DFARS supplement, in multiple categories:

  1. Third-party certification of suppliers by approved parties (C3PAOs) instead of self-certification.
  2. Certification is mandatory to be able to participate in RFIs and RFPs, meaning that it can affect the supplier’s revenue.
  3. CMMC has a 5-levels maturity model.
  4. There are 154 new requirements out of 171 in CMMC (vs. the original DFARS supplement), and they’re spread across the 5 levels of maturity.
  5. Reporting of compliance status in an online portal. This means that the DoD can monitor compliance of the entire DIB (Defense Industrial Base – the regulated organizations).

By introducing CMMC, the DoD conveys a clear message to DoD suppliers: We want you to be secure. And if you’re not secure enough, you cannot work on defense projects. Find another niche that’s less critical. If you want to work with the DoD, these are our requirements.

The question is: Should enterprises follow a similar path? Should a supply chain certification model be the standard in enterprise RFIs and RFPs?

The Pros and Cons of Supply Chain Certification

There are a few pros and cons to consider when discussing supply chain certification.

Pros:

  • Increased security of the supply chain using financial incentives.
  • Competition between suppliers on security maturity levels – Enterprises will start ranking suppliers based on a new metric.
  • Transparency in security maturity levels. “Are you a Level 3 Security supplier or a Level 5 Security supplier?”
  • Following a cyber attack, the certification might be re-evaluated. If major violations are found, the certification can be voided.

Cons:

  • How much is this going to increase the prices of goods and services? And is it worth it?
  • The certification can end up being another checkbox, where it has high costs and provides no security value.
  • Smaller suppliers might find it difficult or impossible to be certified within their resources, which will create a bias toward larger organizations.
  • Do enterprises have a large enough negotiation power, similar to that of the DoD, to pose such requirements on suppliers?
Our Predictions

We see a clear path to how supply chain certification becomes mainstream in the next years. With the DoD adopting CMMC, certain suppliers will have a CMMC certifications. They can then use their CMMC certification as a competitive advantage in non-DoD deals.

The DoD kickstarted this program, defined the requirements, and laid out the infrastructure (C3PAOs, RPs, etc). That allows the entire world to adopt CMMC – other government bodies and enterprises can easily adopt it at a low cost.

If the CMMC certification will be perceived as an efficient risk reduction strategy, and that there’s nothing fundamentally wrong about it, this (or a similar) model is going to expand into additional industries.

The SCADAfence Governance Portal is a compliance monitoring automation platform from SCADAfence, that automatically monitors your network’s compliance with the major cyber security standards and regulations. If you’re interested in learning more about how to measure and increase your security program maturity, please visit this page for a short demo about this product.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

ESET discovers operation SignSight: Supply-chain attack against a certification authority in Southeast Asia

BRATISLAVA, MONTREAL – ESET Research discovered another supply-chain attack in Asia, this time on the website of the Vietnam Government Certification Authority (VGCA). The attackers modified two of the software installers available for download on this website by adding a backdoor in order to compromise users of the legitimate application. Supply-chain attacks appear to be a quite common compromise vector for cyberespionage groups. Cybercrime operation SignSight leverages malware known as PhantomNet or Smanager.

“In Vietnam, digital signatures are very common, as digitally signed documents have the same level of enforceability as wet signatures. In addition to issuing certificates, the VGCA develops and distributes a digital signature toolkit. It is used by the Vietnamese government, and probably by private companies, to sign digital documents. The compromise of a certification authority website is a good opportunity for APT groups, since visitors are likely to have a high level of trust in a state organization responsible for digital signatures,” explains Matthieu Faou, one of ESET’s researchers investigating the SignSight operation.

The PhantomNet backdoor is quite simple and is able to collect victim information (computer name, hostname, username, OS version, user privileges [admin or not], and the public IP address) as well as install, remove and update malicious plugins. These additional and more complex plugins are probably only deployed on a few selected machines. By also installing the legitimate program, the attackers make sure that this compromise won’t be easily noticed by end users.

ESET researchers uncovered this new supply-chain attack in early December 2020 and notified the compromised organization and the VNCERT. We believe that the website ceased delivering compromised software installers at the end of August 2020. The Vietnam Government Certification Authority confirmed that they were aware of the attack before our notification and that they notified the users who downloaded the trojanized software.

ESET has seen victims in the Philippines in addition to Vietnam.

For more technical details about operation SignSight, read the blog post “Operation SignSight: Supply- chain attack against a certification authority in Southeast Asia” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Google Chrome and ESET collaborate in fight against online threats

BRATISLAVA – ESET, a global leader in cybersecurity, announced today it is continuing to partner with Google to protect Google Chrome users. ESET’s award-winning technology is used by Google to scan, identify and remove unwanted software encountered by users of Chrome for Windows. The extension of the cooperation on Chrome Cleanup, part of Chrome’s Safe Browsing feature, continues the close collaboration between the world’s most popular browser and the leading EU-based IT security vendor’s technology.

As applied in Chrome Cleanup, ESET’s technology is used by Google to alert users about unwanted or potentially harmful software attempting to get on users’ devices through stealth, for example, by being bundled into the download of legitimate software or content. Google Chrome, using ESET’s security technology, then provides users with the option to remove the unwanted software. Chrome Cleanup operates in the background, without visibility or interruptions to the user. It deletes the unwanted software and notifies the user once the cleanup has been successfully completed.

The two companies enjoy a broad relationship that also includes a collaborative role in which ESET works closely with Google to ensure the safety of the Google Play Store as a partner in the App Defense Alliance. ESET also provides data for users of Chronicle, Google Cloud’s security analytics platform, to surface verdicts on malicious files.

“We are proud to partner with Google in helping Chrome users enjoy safer technology,” said Juraj Malcho, ESET Chief Technology Officer. “The ongoing collaboration with Google and Chrome Cleanup demonstrates the importance that both companies place on keeping users safe and secure. With Chrome being the browser of choice for most Windows users, ESET’s technology and engineers are providing frontline protection.”

For additional information about Google Chrome Cleanup, please click here

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

CyberLink Will Showcase New FaceMe® eKYC and Fintech Solutions at CES 2021

The company will also exhibit the latest updates to its industry-leading FaceMe® SDK, as well as its highly praised pandemic control and access security software solutions FaceMe® Health and FaceMe® Security

Taipei, Taiwan— December 15, 2020— CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technologies, will showcase new applications of its state-of-the-art FaceMe® technology for the banking, financial services and insurance (BFSI) industry at the all-digital Consumer Electronics Show January 11-14, 2021. CyberLink will also feature its innovative software solutions, FaceMe® Health for pandemic control, and FaceMe Security for access control, authentication and security.

CyberLink Will Showcase New FaceMe® eKYC and Fintech Solutions at CES 2021

FaceMe® eKYC and fintech solutions, deployable at the edge, offer the BFSI industries the ability to conduct secure, real-time biometric verification and identity recognition. FaceMe®’s eKYC technology offers financial institutions the ability to match a person’s photo to their ID in person or virtually, protecting customers against identity fraud whether they’re at a branch, or accessing their accounts from home.

The FaceMe® eKYC and fintech solution can be applied for identity verification, or second factor authentication, in opening bank accounts, applying for credit, conducting ATM transactions or mobile banking, buying insurance services, and using remote customer service. FaceMe® facial recognition is one of the most accurate methods of identity verification with up to 99.7% accuracy rate according to the NIST FRVT (Facial Recognition Vendor Test) and with secure built-in anti-spoofing. The cross platform flexibility allows FaceMe® to be integrated into smartphones, computers, ATMs, wall cameras and a variety of other devices.

“In light of COVID-19, financial institutions must digitalize transactions and processes while maintaining the highest level of security,” said Dr. Jau Huang, CEO of CyberLink. “Cutting-edge technologies such as facial recognition are the future of digital identity verification and we’re excited to showcase FaceMe® eKYC and fintech solutions at CES 2021.”

FaceMe’s® edge-based architecture empowers powerful, efficient processing, and higher levels of security compared to cloud-based solutions. FaceMe® can run on low-power CPUs to enable facial recognition on cost-effective IoT/AIoT devices, as well as being integrated with high-end servers, workstations and personal computers equipped with GPU to provide highly efficient performance. The result is a fast, flexible, and precise facial recognition SDK solution applicable for a wide range of scenarios, including: smart banking, security, access control, public safety, smart retail and more.

For more information on FaceMe® eKYC solution, please visit https://www.cyberlink.com/faceme/solution/Fintech_eKYC

For more information about FaceMe®, please visit the official website at www.cyberlink.com/FaceMe

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

GREYCORTEX IS LIKE A DOCTOR, PREVENTING CLIENTS FROM CATCHING A CYBER-DISEASE

What a person encrypts, a person can also decrypt. This was true a couple of years ago. Nowadays, cyber-criminals use advanced technologies and their attacks are much more sophisticated and targeted, and consequences are much worse. “Not only the good guys (i.e. cyber protection companies) but also the bad guys are evolving. Attacks are aimed at weak points and human errors,“ says Petr Chaloupka, CEO of GREYCORTEX, a company that focuses on IT and industrial network security. The story of this company that succeeded among the fastest growing tech companies began long before its foundation. It is a story about passion, vision, skills and a ton of humour. And, in a way, it is connected to the beginning of computerisation in Czechoslovakia.

Maybe you too still have a vivid memory of this history chapter and maybe you remember 8-bit computers – or maybe you don’t. Luckily, there is Petr Chaloupka, the founder and CEO of GREYCORTEX, and his memories of a contest from the ’90s, a text game passed around on cassettes and floppy disks that were created very long ago for 8-bit computers. Cassettes and floppy disks were… well, just google it, kids! “This game was protected by a password that was announced on a certain day in the newspaper, on the radio and on TV to give everyone the same fair start. However, my friend and I didn´t feel like waiting and so, after several hours of reverse engineering, we identified the password and came to the conclusion that what a person encrypts, a person can also decrypt. And that is maybe where my lifelong passion for cybersecurity started and this seemingly innocent story signalled my future professional career“.

A STORY OF A COMPANY STANDING ON THE FRONT LINE IN THE BATTLE AGAINST HACKER ATTACKS

The first chapter of the GREYCORTEX story began around 2005. “I was working on an antivirus for Linux, which was a completely insignificant platform for cybercriminals back then and for which there was no malware. There were only a few lab experiments for proving that there could be one. My colleague Michal Drozd used to hack banking systems using social engineering and customised malware“, reminisces Petr Chaloupka about the beginnings with a smile. The group includes another Petr – Petr Chmelař. “Back then, he was working on machine learning principles that would be capable of finding video signal anomalies. A strong technology for which there may have been another use. What about transferring it from the video world into a computer network“? asks Petr Chaloupka rhetorically with a good portion of irony.

However, you are probably more curious about the ending of the first plotline, about Michal Drozd and his bank story. There was no shocker – Michal Drozd stood on the right side and banks paid him to do what he did. We would say today that he was an ethical hacker. “However, if he had decided to become a cybercriminal, he would be very rich by now,“ adds Petr Chaloupka.

But let’s be more serious now. Fast forward fifteen years later. Petr Chaloupka sums up that Linux is a common and widespread platform, interesting enough for cybercriminals to attack. GREYCORTEX is now a well-established company focusing on the development of security products for network protection, machine learning and AI research, and the second fastest growing tech company in the Rising Stars category of the Deloitte Technology Fast 50 competition.

“Were we visionaries back then? I don’t know. Maybe we were just the three right people at the right place, and if we had never met, nothing would have happened. Literally. But we did meet, a couple of good questions were asked and we started to look for answers together.“

THOROUGH AND COMPLETE SECURITY

The second chapter of the GREYCORTEX story was about visionary questions in the end; for example, how can someone manage to break into a bank or any other company without having to leave their home? And how come they don’t get caught? Then the right answers came and with them the first specific solution.

“Somewhere around 2014, things blended really well and when five more friends and colleagues joined us at the end of 2015, everything was ready to establish a company and start our business. It needs to be said that all founders are still with us in different roles in the company, helping it grow.“

Petr Chaloupka

 

Four years later, the company became five times as big. “Our product ‘Mendel’, which can uncover hidden threats in the network, from unknown devices to advanced attacks, has matured. After overcoming some childhood diseases and puberty, it is becoming a model for others – we helped introduce another branch of cyber security into the world! It used to be called NTA (Network Traffic Analysis) in the past; now it is called NDR (Network Detection and Response),“ says Petr Chaloupka.

Don’t worry if you are getting a little lost in all the information, you have a right to that and you deserve an explanation: NDR combines deep visibility into infrastructure with the capability to detect known and unknown attack and malware types and to react to them in real time. So, it is clearer now, isn’t it? Same as the fact that “the world is changing, technologies are changing and we are changing with them. It is important that we have done our bit and continue to give cybercriminals a hard time and ruin their filthy and immoral business,“ remarks Petr Chaloupka.

What was the worst in the beginning? “Even in our case, it holds true that all theory is grey, but the golden tree of life springs ever green, so we do everything in a completely different manner than we used to. However, the most important thing is that we learned to understand what it means not only to have a good product but also to sell it and persuade clients that they need it. You could say that we are selling insurance or that we are like Eastern medicine – we ensure that the client does not become infected and he pays us for not getting ill.“

To sum it up, Petr Chaloupka views success and failure as communicating vessels. “A functioning and growing company is a success, even though it arose from humble financial background and was basically only a dream of a few founders some 6 years ago. From the beginning, we had a vision of building a global company and so our plans now are clear – to strengthen our position in the territories in which we already operate and gradually add other locations to reach our goal. It is definitely important to find balance between this dream goal and the need to have both feet on the ground (or at least one foot).“

This article was originally published here

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

CyberLink’s FaceMe® AI Facial Recognition Engine Ranks as a Top Ten Vendor in Latest NIST Leaderboard

TAIPEI, TAIWAN — December 8, 2020 —CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technologies, announced it has ranked as a global top ten vendor in the latest Facial Recognition Vendor Test (FRVT) with its FaceMe® AI facial recognition engine. The test is the leading authority on facial recognition precision and is the most rigorous evaluation for facial recognition technology within the industry conducted by the United States’ National Institute of Standards and Technology (NIST)

CyberLink’s FaceMe® AI Facial Recognition Engine Ranks as a Top Ten Vendor in Latest NIST Leaderboard

In the latest FRVT 1:N Identification report, FaceMe® scored an accuracy rate up to 98.11% on its identity recognition against a database of 1.6 million Visa and webcam images, ranking ninth globally out of all tested vendors. When excluding vendors from China and Russia, CyberLink ranks in third for accuracy worldwide with its automated face recognition algorithm. FaceMe® has found immense, real-world practical success due to its flexible edge computing architecture optimized across platforms and devices, enabling a wide range of use cases for smart banking, retail, security, smart cities and more.

“NIST’s independent evaluation establishes CyberLink as one of the de facto leaders in facial recognition research and development globally,” said Dr. Jau Huang, CEO of CyberLink. “To date, FaceMe® has been applied to a range of applications across multiple IoT/AIoT scenarios in the hospitality, retail, law enforcement and financial industries. With the rising adoption of facial recognition in banks and fintech, we are ready to partner with industry leaders and create a safer ecosystem by deploying solutions such as electronic Know Your Customer (eKYC) to protect against identity fraud.”

FaceMe’s® edge-based architecture empowers powerful, efficient processing, and higher levels of security compared to cloud-based solutions. FaceMe® can run on low-power CPUs to enable facial recognition on cost-effective IoT/AIoT devices, as well as being integrated with high-end servers, workstations and personal computers equipped with GPU to provide highly efficient performance. The result is a fast, flexible, and precise facial recognition SDK solution, applicable for a wide range of scenarios, including security, access control, public safety, smart retail, smart banking and more.

For more information on FaceMe®, please visit www.cyberlink.com/faceme

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

About Talma
With more than 29 years offering complete solutions, in Talma we provide safe, fast and efficient airport services. We operate in 19 airports in Colombia.

ESET launches renovated cloud-based endpoint security management solution for businesses of all sizes

BRATISLAVA – ESET, a global leader in cybersecurity, has today announced the launch of its new endpoint security management platform, ESET PROTECT, in selected countries. The new solution brings easy and automated management of ESET’s wide portfolio of security solutions with two deployment options: on-premises and cloud. ESET PROTECT Cloud is the new cornerstone for security management in ESET’s cloud-based business offering, capable of catering to organizations of all sizes.

The introduction of ESET PROTECT Cloud reflects the well-recognized shift in the security landscape from on-premises security software solutions to cloud-based services. ESET recognizes that many businesses are moving toward a “cloud first” approach, so a security software offering that aligns with this strategy is essential.

ESET PROTECT Cloud provides a cloud-based console for managing ESET security solutions deployed in a network with real-time visibility into both on-premises and off-premises endpoints. The console allows IT administrators to deploy ESET security solutions, execute tasks, enforce security policies, monitor system status, and quickly respond to problems or detections on managed endpoints across all platforms, including desktops, servers, virtual machines, and even mobile devices. In addition to integration for security information and event management (SIEM) tools, comprehensive reporting, and a fully customizable notification system, ESET PROTECT Cloud allows IT administrators to take immediate action against incidents.

The console allows users to manage existing ESET products, including ESET Endpoint Security, ESET Dynamic Threat Defense, and ESET Full Disk Encryption. Customers of ESET Cloud Administrator will be automatically and seamlessly upgraded to ESET PROTECT Cloud from launch day.

To ensure businesses of all sizes are equipped with the right solutions, ESET is offering a selection of subscriptions tailored to the specific business needs of home offices, small- and medium-sized businesses (SMBs), managed services providers (MSPs)* and enterprises. For the full set of ESET’s subscriptions, please check the table below.

All business subscriptions include either an on-premises endpoint management solution (ESET PROTECT; formerly ESET Security Management Center) or a cloud-based one (ESET PROTECT Cloud), along with ESET Endpoint Security by default. For customers looking only for email security, ESET will also offer an ESET PROTECT Mail Plus subscription.

The ESET PROTECT Advanced subscription was designed with the needs of SMBs and MSPs in mind. Providing endpoint protection against ransomware and zero-day threats, and data protection via full disk encryption, the subscription meets the challenge of managing and protecting corporate networks in the face of evolving threats.

The ESET PROTECT Enterprise subscription is geared toward large organizations, where deep visibility and rigorous security requirements are essential. The subscription offers the highest value for mature enterprise customers with one of the most powerful endpoint detection and response solutions on the market – ESET Enterprise Inspector, currently manageable only from ESET PROTECT. By providing rule-based detection of suspicious events happening on endpoints, as well as threat hunting and remediation capabilities, this subscription ensures that emerging threats, risky employee behavior, and unwanted applications are not putting organizations at risk.

Ignacio Sbampato, Chief Business Officer at ESET, commented, “We are thrilled to offer solution for businesses of all sizes that are implementing a ‘cloud-first’ strategy for their IT security. ESET PROTECT Cloud is the culmination of listening to shifting business needs, keeping our fingers on the pulse of the cybersecurity landscape, and improving on our multilayered security solutions. At ESET, we are passionate about safer technology for all, and that means that businesses of all shapes and sizes must be equipped with cutting-edge, tailored solutions to keep their employees and data safe and secure.”

To learn more about ESET PROTECT Cloud, click here.

*Please note that the support of ESET PROTECT and ESET PROTECT Cloud for MSPs will become available in January 2021.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.