Skip to content

Remotely: Tips from the UnderDefense Team

A recent survey by our friends at learning platform ELVTR discovered 68% of US employees still access their work devices while on vacation – leaving the door wide open for malicious attackers to penetrate business devices. While summer holidays are over, the issue is not closed given the high number of remote workers internationally. So, let’s dive into the top risks highlighted by top cybersecurity expert and our CEO at UnderDefense, Nazar Tymoshyk, and uncover how to conquer them.

Risk #1: Surfing the Cyber Waves Unprotected

The scene is set: your personal laptop, your favorite cafe, and the allure of free Wi-Fi. But here’s the catch – that free Wi-Fi can be a gateway for cybercriminals to sneak into your digital kingdom. Connecting to public networks and personal devices introduces significant security risks, leaving you vulnerable to data breaches, identity theft, and financial losses.

Solution:Nazar’s advice rings loud and clear: Get yourself a reputable Virtual Private Network (VPN). It’s like an invisibility cloak for your data, encrypting your internet traffic and keeping your sensitive information away from prying eyes.

Risk #2: The Stealthy Rogue Access Points

Imagine this: you’re lounging at the mall, connecting to what seems like a legit Wi-Fi network. Except, it’s a trap – a rogue access point set up by attackers. These sneaky networks mimic real ones, intercepting your internet traffic and potentially accessing your personal data. Scary, right?

Solution:Stay one step ahead of these tricksters by confirming the Wi-Fi’s legitimacy with the staff. And whenever you’re on public networks, fire up that trusty VPN for added protection.

Risk #3: The Web of Spoofed Sites

Cybercriminals have an uncanny knack for creating fake websites that look exactly like the real deal. You might think you’re logging into your bank’s website, but you’re actually giving away your credentials to a malicious actor. This trick, known as website spoofing, can lead to phishing attacks and compromised accounts.

Solution: Before you click any link, give it a hover to see the full URL. And always look for that trusty padlock icon in the address bar – it’s your digital seal of approval.

The SOS Plan for Suspicious Networks

If you suspect you’ve used insecure Wi-Fi, don’t panic. Just follow Nazar’s quick steps:

  • Change Passwords:Update passwords for your important accounts.
  • Financial Check:Keep an eye on your financial statements for any suspicious transactions.
  • Sweep Your Devices: Scan your personal devices with trusted antivirus and antimalware software.
  • Set Up Alerts:Enable account notifications for any unusual activities.
  • Call in Reinforcements:When in doubt, seek guidance from cybersecurity professionals or your IT department.

As we embrace the freedom of remote work, let’s not forget that with great freedom comes great responsibility – especially when it comes to security. 

Check out the full article on staying secure on vacation here, and don’t hesitate to get in touch with us if you need support! 

 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About UnderDefense
UnderDefense, a globally top-ranked firm by Gartner and Clutch, provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats. We empower clients to predict, prevent, detect, and respond to threats.

Stellar Cyber to Showcase its Award-Winning Open XDR Platform at the 2023 RSA Cybersecurity Conference

See the only field-validated Open XDR Platform, which protects millions of connected assets and thousands of customers daily, in action during RSAC.

Stellar Cyber, the innovator of Open XDR technology, and recently recognized by Cyber Defense Magazine as the Most Innovative XDR Solution, will exhibit its Open XDR – driven SecOps platform at this year’s RSA cybersecurity conference at Moscone Center in San Francisco, CA, from Monday, April 24th through Thursday, April 27th. 

During the conference, Stellar Cyber experts will deliver on-demand demonstrations highlighting how lean security teams can experience a new streamlined approach to securing a diverse environment, slashing MTTD and MTTR with the Stellar Cyber Open XDR Platform.

Attendees will see how Stellar Cyber’s Open XDR Platform can: 

  • Automate detection of complex multi-vector attacks
  • Deliver hands-free incident context enrichment driving rapid investigations
  • Enable fast threat hunting across a universe of security data
  • Mitigate threats with “point-and-click” response actions 

“We are thrilled to participate in this year’s RSAC and look forward to meeting with security decision-makers that want to improve their security operations,“ says Steve Garrison, Vice President of Marketing at Stellar Cyber. “With so many vendors claiming to deliver similar capabilities and benefits, many buyers may find it difficult to find something that can address their challenges better. Well, we can, and we are prepared to prove it.” 

Since the Stellar Cyber Open XDR Platform debuted over four years ago, enterprises and MSSPs have reported double-digit improvements in both mean times to detect and respond to threats (MTTD & MTTR), meaning their security teams can do more faster. 

Here are two examples of what customers say about the Stellar Cyber Open XDR Platform:

“Stellar Cyber’s Open XDR platform is the only security tool we’ve seen that is so easy to use that it lets us bring in new analysts and have them immediately impact our organization and our customers.”
Brite Security Services

“Stellar Cyber helped close our visibility gap as no other solutions could. As a result, it has become indispensable to our organization, allowing us to act on potential threats immediately.”
Amanda Stowell, Information Security & Privacy Analyst, A-Dec

“The key to delivering results like we are seeing is our obsessive focus on simplicity,” said Sam Jones, Vice President of Product Management at Stellar Cyber. “By incorporating core security capabilities into a single platform and ingesting data from any security product, we eliminate the friction that exists in most security operations. We look forward to demonstrating our unique approach to security to the attendees at this year’s RSA conference.”

To see for yourself how Stellar Cyber can simplify your security operations, visit us in booth 244 in Moscone Center, South. 

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Stellar Cyber
We deliver an easy-to-use Open XDR platform built to meet the needs of lean security teams, providing security functionality anyone can use.
Our Mission: Deliver world-class security products for the 99%

Stellar Cyber Named a Strong Performer in Gartner Peer Insights™ Voice of the Customer for Network Detection and Response

Stellar Cyber Open XDR receives 4.8/5-star rating from customers on Gartner Peer Insights

Stellar Cyber, the innovator of Open XDR technology, today announced that it has been named a Strong Performer in the Gartner Peer Insights Voice of the Customer for Network Detection and Response. Network Detection and Response is just one of the core capabilities built into Stellar Cyber’s AI-driven Open XDR cybersecurity platform, which also includes NDR with next-generation SIEM, TIP and bi-directional integration with any third-party EDR solution.

As the report explains, “The “Voice of the Customer” is a document that synthesizes Gartner Peer Insights’ reviews into insights for IT decision makers. This aggregated peer perspective…focuses on direct peer experiences of implementing and operating a solution.” In the report’s detailed vendor summary, 100% of Stellar Cyber’s customers responded that they were willing to recommend the company’s Open XDR platform, and gave it a composite rating of 4.8 stars out of five across the product’s capabilities, sales experience, deployment experience, and support experience based on 20 reviews submitted as of March 2023 on Gartner Peer Insights.

“We have a strong commitment to our customers and partners to ensure they have successful deployments and utilize the full value of the Stellar Cyber Platform as their Open XDR Security Operations Platform,“ says Paul Levasseur, Vice President of Customer & Partner Enablement at Stellar Cyber. “We’re very happy that our customers are reporting their satisfaction through the Gartner Voice of the Customer report.” 

Gartner, Voice of the Customer for Network Detection and Response, Peer Contributors, 29 May 2023

Resources

Gartner and Peer Insights are trademarks of Gartner, Inc. and/or its affiliates. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Stellar Cyber
We deliver an easy-to-use Open XDR platform built to meet the needs of lean security teams, providing security functionality anyone can use.
Our Mission: Deliver world-class security products for the 99%

How to disable Edge password manager

Why you might want to deactivate Edge password manager

The Edge password manager is a convenient addition to the browser as it offers basic functionality by saving your passwords directly in the browser. However, there are several reasons you might consider moving away from the built-in tool.

  • Security risks: Sometimes, storing passwords in a browser can make them vulnerable to hacking attempts, especially if your device is lost or compromised. Cybercrooks often target browsers because quite a few people use them to store sensitive data such as passwords, payment cards, and personal details.

  • Limited features: While Edge’s password manager is convenient, it still lacks advanced features like password health analysis, secure password sharing, email masking, sub domain matching for autofill, and so much more.

  • Cross-platform incompatibility: If you use multiple browsers or devices on a daily basis for work or just to run personal errands, syncing passwords across those devices is critical; this way you’ll have your credentials with you at all times. Unfortunately, Edge’s password manager doesn’t offer seamless cross-platform support.

  • Preference for dedicated solutions: Dedicated password managers like NordPass provide enhanced security features, user-friendly interfaces, and better overall management of your digital credentials.

By deactivating Edge’s built-in password manager, you can opt for a solution that offers better security, more advanced features, and more flexibility.

Before you disable your Edge password manager

Disabling the password manager in your Edge browser is more than just flipping a switch. One critical step before disabling the built-in password manager is exporting and saving all your stored passwords. This backup is critical because once the password manager is disabled, your saved passwords may no longer be accessible.

Here’s how you can export your passwords from Edge:

  1. Open Microsoft Edge and click on the three horizontal dots in the upper-right corner.

  2. Select Settings from the drop-down menu.

  3. Click Profiles, then choose Passwords.

  4. At the top of the Saved passwords section, you’ll see an option with three dots. Click it and select Export passwords.

  5. Confirm the action, and choose a secure location on your device to save the exported file.

By exporting your passwords, you ensure that all your login information is safely stored and can be easily imported into a dedicated password manager like NordPass. This not only prevents the hassle of resetting passwords but also provides an opportunity to enhance your online security.

 

How to turn off Edge password manager

Disabling the password manager in Edge is quite simple and should not take too much of your time. Follow these detailed steps:

  1. Launch Microsoft Edge.

  2. Click the three horizontal dots in the upper-right corner of the browser window.

  3. From the dropdown, select Settings.

  4. In the left sidebar of the Settings page, click Profiles.

  5. Under the Profiles section, select Passwords.

  6. Find the option labeled Offer to save passwords.

  7. Toggle the switch to the Off position.

  8. Below that, toggle off Sign in automatically.

  9. If you want to delete the passwords already saved in Edge, scroll down to the Saved passwords section. Here, you can remove individual passwords by clicking the three dots next to each entry and selecting Delete.

  10. Close and reopen the browser to ensure that the changes take effect.

By following these steps, you’ve successfully turned off the password manager in Microsoft Edge.

What happens after disabling Edge password manager

Once you have turned the password manager off in Edge, the browser will no longer prompt you to save passwords when you sign into the website, nor will it automatically fill out your login credentials. In turn, this means that you will need to manually enter your usernames and passwords each time you access your accounts. This change presents a chance to improve your overall online security by switching to a password manager like NordPass. With NordPass, you can securely store your passwords, enjoy automatic form filling, and benefit from advanced security features that offer stronger protection than the built-in password managers.

Advantages of using NordPass over a built-in password manager

Switching to a dedicated password manager like NordPass is not an upgrade but a full change in how you secure and manage your life online. While the built-in password manager offers basic and convenient functionality, NordPass takes that to the next level with advanced features, advanced security, and unmatched convenience.

Advanced security measures

NordPass uses state-of-the-art encryption protocols, more precisely XChaCha20 encryption combined with zero-knowledge architecture. This essentially means that your data is encrypted on your device before reaching the servers of NordPass, and you alone retain keys for decrypting it. On top of that, NordPass supports multi-factor authentication (MFA), adding that extra layer of security by requiring further verification methods when trying to access your vault.

Seamless cross-platform functionality

With NordPass, your passwords, passkeys, payment card data, secure notes, and personal information are synchronized across all your devices, whether you’re using Windows, macOS, Linux, Android, or iOS. This cross-platform accessibility eliminates the limitations associated with browser-specific password managers. At the end of the day, with a dedicated password manager, you will have access to your credentials whenever and wherever you need them.

Better user experience and features

NordPass is designed in such a way that its intuitiveness and user-friendly interface make password management pretty easy, even if you’re not a tech-head. The Password Health feature goes through the passwords stored in your NordPass vault and identifies weak, reused, or old passwords, suggesting updates toward stronger alternatives. The built-in Data Breach Scanner monitors your credentials for exposure. If your information has been compromised, NordPass alerts you immediately so you can take immediate action to secure your accounts.

By transitioning to NordPass, you’re not merely replacing Edge’s basic password storage—you’re adopting a comprehensive security solution that actively safeguards your digital identity. NordPass’ advanced encryption, cross-platform accessibility, and user-friendly features elevate your online security to a higher standard.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How do password managers work?

Security guidelines state that all accounts, regardless of their importance, should use unique and complicated passwords. Unfortunately, the burden of juggling different accounts with long passwords that are difficult to keep track of or enter without typos leads to people settling for simpler, repetitive, and far less resilient passwords.

This struggle can be easily solved once you know how password managers work to support your credential handling. Whether it’s a built-in browser password manager or a dedicated third-party tool, they let you conveniently keep track of your credentials without losing out on that security factor. Let’s look into how password managers actually work, what features they may offer, and what makes them a safe choice to store all sensitive details in one place.

What is a password manager?

Password managers are pretty self-explanatory—they’re tools that let you store and manage your login credentials. They do the heavy lifting for you by storing your essential login information, such as your usernames, passwords, and email addresses.

Even if the term doesn’t ring a bell, chances are you’ve already used one before. Browsers like Chrome, Firefox, and Opera have built-in password managers that let you save your login details, saving you time whenever you need to log in. Third-party password managers are generally regarded as a more secure alternative to their browser counterparts.

What does a password manager do?

The primary purpose of a password manager is to provide secure storage for sensitive information. This is achieved through encryption—the process of scrambling data so that it can only be accessed if you have the right key to decipher it. A password manager like NordPass encrypts information on your device and, once it’s scrambled, sends it to the servers for safekeeping. This helps ensure that even in the case of a breach, the data is not accessible to unauthorized parties in plaintext.

As for the data itself—despite the name, password managers are not limited to passwords alone. They also provide storage for email addresses, personal addresses, ID information, banking details, and any other sensitive data that you want to keep safe. Password managers can even provide storage for passwordless solutions—NordPass lets its users store and manage passkeys.

Secure storage is just the tip of the iceberg. By now, password generators are a basic requirement for both browser-based and standalone password managers. Password generators help easily create unique and complex passwords that meet the standards of various security protocols. Instead of coming up with a password yourself, you can have the password manager generate a random, one-of-a-kind string of characters for you.

Password managers can take the chore out of finding the right password for the right account. Although you can use the vault search function or sort your credentials alphabetically when you need them, password managers eliminate this manual step altogether with autofill. This function instantly finds the login credentials you need and inputs them for you, instantly letting you access your account. Additionally, autosave detects whenever you’re entering credentials that aren’t in your vault and lets you store them without needing to type them out yourself.

 

Family password management

We usually focus on the benefits password managers offer to individuals. But did you know that you can share this tool with your friends and family and keep your entire closest circle protected online?

A password manager facilitates secure and convenient credential sharing. Imagine a family of five using a single Amazon account but scattered across different households. Using a password manager like NordPass, they can securely juggle access to the shared account. No need to send an unencrypted text message, a screenshot, or spell it out over the phone—you can simply select the password you want to share, who you want to share it with, and what access permissions you want to grant.

Managing passwords within a family is also convenient for broader security. Setting up a NordPass Family account grants access to Premium features like the Data Breach Scanner, which tracks the dark web for any signs of leaked personal information, and Password Health, which lets you know if any of your passwords are old, weak, or reused.

Multiply that by six, and you have your family’s cybersecurity sorted. And don’t forget, a family password manager doesn’t mean it has to be your relatives only—you can bring your spouse or friends along for the ride.

Business password management

Have you ever given in to the temptation to reuse one of your personal passwords for a work-related account to save time? It wouldn’t be surprising—between juggling accounts for personal and professional use, an average person has to handle 168 and 87 passwords, respectively.

A business password manager is here to keep things simple and separate personal and work credentials. It helps organizations optimize their workflows and implement centralized password usage policies that uphold high security standards.

Many features related to corporate credential security are handled from the admin side of password managers. For example, using NordPass, security managers can establish password strength requirements, such as password length, use of special characters, and frequency of updates.

Companies can set up extra layers of security, like multi-factor authentication, across the company. Additionally, NordPass offers a built-in Authenticator, allowing employees to easily generate two-factor codes for their work accounts and access login credentials all in one place.

As for employees themselves, they can handle their work-related accounts, such as corporate emails, social media communications, or banking. They can also securely share credentials with their colleagues or clients for collaboration.

NordPass allows Business users to control their shared access permissions to maintain data security. No need to fear losing track of what’s been shared—the Activity Log gives a clear overview of who created, edited, or granted access to credentials.

How to use a password manager

The hardest step in getting started with a password manager is finding the right one for you. The core will be similar everywhere—all you need to do is create an account, set up a master password, and add credentials to your encrypted vault. And if you’re looking for additional security for your cyber life, look no further than NordPass.

Whether you’re looking to cover your own personal needs, handle sensitive work-related data, or share passwords more securely with your friends and family, NordPass offers something for everyone. It’s built on zero-knowledge architecture and uses XChaCha20 encryption to provide a high level of security for both your personal and professional sensitive data. Start your hassle-free digital life with NordPass—a password manager that puts convenience first without compromising your security.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

24.6.6 ‘Voyager’ released

Changes compared to 24.6.5

New Features

  • Added an option to have failed backup jobs retry after a configurable period of time
  • Added ability to bulk convert Storage Vaults created with S3-backed Storage Role templates to direct S3 Storage Vaults
  • Added support for restoring a Windows Disk Image backup from a Linux device
  • Added a Linux ISO option when using the Create Recovery Media feature

Enhancements

  • Added an automatic clean up of stale Storage Vault locks immediately when a device reboots, or wakes from sleep
  • Added support for custom prefix directories for IAM-compatible Storage Template providers
  • Added an explanation tooltip for unavailable features in the Create Recovery Media dialog in the Comet Backup desktop app
  • Added safeguards to ensure the Hyper-V Protected Item “Latest VM state” mode is only used with supported Windows versions, in the Comet Server web interface and the Comet Backup desktop app
  • Improved the performance of evaluating the “if last job was missed” schedule option

Bug Fixes

  • Fixed an issue when restoring Disk Image Protected Items to VMware virtual disk files with ZERO extents present
  • Fixed an issue with “Converting PfxData: pkcs12: unknown attribute” error messages when Comet Server uses some types of SSL certificate
  • Fixed an issue with unclear error messages when running a Hyper-V Protected Item using “Latest VM state” mode on unsupported Windows versions
  • Fixed an issue with the Comet Backup desktop app not allowing you to create an IDrive Storage Vault with a bucket name that is five characters long
  • Fixed an issue with the Create Recovery Media dialog not allowing moving to the next page when manually typing a path to create an ISO file
  • Fixed a cosmetic issue with misleading appearance of the Create Recovery Media dialog if the image generation failed

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

July 2024: What’s New?

Written by Callum Sinclair – Product Engineering Manager. 

“What’s New?” is a series of blog posts covering recent changes to Comet in more detail. This article covers the latest changes in Comet Voyager over July 2024.

There were six Comet releases during July – four in the Voyager release series, plus two updates for our Enceladus release series.

We’ve landed a few large and exciting features:

Back Up and Restore Advanced NTFS Features

The NTFS filesystem on Windows supports many advanced features. One feature is its advanced permission and ACL support, allowing control over which Windows user accounts have access to read or access certain files. Another special NTFS feature is Alternate Data Streams (ADS), which allow the file’s main content to be accompanied by entirely different data streams.

In Comet version 24.6.2 or later, we have added a new option “Back up extra system permissions and attributes” to configure for File & Folder Protected Items.

When the new option is selected, Comet will back up the following additional NTFS data:

  • Attributes (system, hidden, integrity)
  • Alternate Data Streams (ADS)
  • Extended Attributes (EA)
  • Full Windows permissions (SACL / DACL)

The extra permissions and attributes are preserved for files and directories. When the file or directory is restored from a Windows device, the permissions and attributes will be re-applied. If the restore takes place on a non-Windows device, the extra information will not be available.

Protecting Alternate Data Streams on Windows devices is vital for maintaining data integrity, application functionality and security. You can now easily include these important attributes in your backups, ensuring a robust and secure backup strategy.

Granular Restore for FAT32, EXT4, and XFS filesystems

Granular Restore enables the recovery of individual files and folders from within a virtual disk image, without having to restore the entire disk.

As part of Comet 24.6.3, we have improved our Granular Restore feature to work with FAT32, EXT4, and XFS filesystems. For partners protecting Linux based Virtual Machines using our Hyper-V or VMware Protected Items, you will be able to recover individual files and folders without needing to restore the entire VM. To make use of this feature, all you need to do is upgrade to Comet version 24.6.3 or later.

This means you are able to recover data faster, reducing downtime and enhancing productivity.

Improved retries for S3 Storage Vaults Downloads

Networking related errors are an inevitable part of downloading data from a S3 Storage Vault. Previously, when downloading data from an S3 Storage Vault, Comet would attempt up to 10 retries to successfully download the data. However, each time an error occurs, the process has to start over from the beginning. This is particularly problematic for Comet’s index files, which can become quite large.

If Comet is unable to successfully download the index files, it is unable to start the back up job. This is because the index files are a critical part of how Comet backs up data to Storage Vaults.

With Comet 24.6.2, we have improved downloads from S3 Storage Vaults to dynamically restart from where they left off, instead of starting over from the beginning. This means that when an error occurs, Comet can resume the download from the point where the interruption happened. This reduces the amount of data that needs to be re-downloaded and improves the overall reliability of Comet when backing up to a S3 Storage Vault.

Notice: Windows System Backup Protected Item Deprecation

Our Windows System Backup Protected Item is being deprecated. Before we added our Disk Image Protected Item, Windows System Backup Protected Item was a great way to backup and restore entire Windows disks. However, it required spool space (temporary storage) to be able to perform this backup. This means for a 500GB disk, Comet requires an additional 500GB of free space for this Protected Item to work.

As part of our deprecation process for our Windows System Backup Protected Item, upon upgrading to Comet 24.6.3 or later, back up jobs for this Protected Item will now finish with a warning status. Please convert these Protected Items to Disk Image Protected Items before this option is removed from Comet in November (Comet Release 24.11).

We’re committed to continuously improving our services and look forward to delivering even more enhancements in the future. Thank you for your continued support!

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

24.6.5 Voyager released

Changes compared to 24.6.4

Bug Fixes

  • Fixed an issue with the Users list page in the Comet Server web interface being reverse sorted by default
  • Fixed an issue with the Settings and Admin Account pages failing to render for an admin user in the Comet Server web interface
  • Fixed an issue with Comet Server config files being updated with an invalid Admin Organization
  • Fixed a crash when loading the Comet Server web interface on a Comet Server with Auth Role disabled

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

24.5.4 Enceladus released

Changes compared to 24.5.3

Bug Fixes

  • Fixed an issue with the Syncro integration preventing backup job warnings and errors from being raised as an RMM Alert
  • Fixed an issue for Hyper-V Protected Items that caused the error message “Incorrect Function” to occur when backing up guest VMs
  • Fixed an issue for Microsoft 365 Protected Items that caused the error message “invalid character ‘S’ looking for beginning of value” to be returned during listing of accounts
  • Fixed an issue with Hyper-V Changed Block Tracking falling back to full scans

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

24.6.4 Voyager released

Changes compared to 24.6.3

Enhancements

  • Added a new log message to backups that indicates that all pre-job steps are complete and backup work has begun

Bug Fixes

  • Fixed an issue for Hyper-V Protected Items that caused the error message “Incorrect Function” to occur when backing up guest VMs
  • Fixed an issue for Microsoft 365 Protected Items that caused the error message “invalid character ‘S’ looking for beginning of value” to be returned during listing of accounts
  • Fixed an issue with the Comet Backup desktop app and Comet Server changing device ID unexpectedly when SSH host keys are changed on Linux
  • Fixed an issue with backups not getting skipped even if “Skip if already running” is set when there are simultaneous backup jobs running
  • Fixed an issue with “warning 6001” error messages outputted in the Comet Server server log when generating a custom codesigned Windows client installer
  • Fixed an issue where backup jobs could complete successfully when a previous retention pass failed due to retention pass failures not being recorded properly
  • Fixed an issue with the Comet Backup desktop app crashing when a user browses a target directory using the web interface
  • Fixed an issue with Constellation Role where buckets with Object Lock enabled were not deleted
  • Fixed an issue with Hyper-V Changed Block Tracking falling back to full scans

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.