Skip to content

ESET Endpoint Security v12 CC Certification

We are proud to announce that ESET Endpoint Security for Windows v12 has successfully met the rigorous requirements of the Common Criteria (CC) certification, evaluated under the Protection Profile for Software Applications.

The Benchmark for IT Trust: ISO/IEC 15408 (Common Criteria) is the globally recognized standard for verifying the security integrity of IT products.
 

Why This Matters for Highly Regulated Sectors

This certification is a critical requirement for organizations operating in environments where security is paramount, including:

  • Governmental and Public Sector entities.
  • Critical Infrastructure and Utility providers.
  • Healthcare and Financial Institutions.

By securing this validation for our flagship product, ESET ensures that global enterprises can deploy our solutions with full confidence in their resilience and compliance with international standards.

View Official Certificate

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

1.4 million users choose Supremo every day

The Complete Remote Desktop Solution Supremo is a remote monitoring, management

and support software. It allows you to access and control remote endpoints with the highest security standards, including customisable security features.

Simple and Light

Supremo: intuitive interface, small executable, no router or firewall configuration needed.

Safe

Secure remote access and file transfer via AES-256, ID password authentication.

Ready for company use

Automatic startup remote access; subscribers customize branded support software distribution.

Affordable

Affordable plans unlock full Supremo features; free for personal use.

Access, Support and RMM features of Supremo

🚀 Unattended Access

Quick installation enables smooth unattended access to computers and servers.

💻 File Transfer

Secure, reliable remote file transfer between computers during active sessions. 🔐

📊 Online Reports

Track, filter, export outgoing connections data to improve billing accuracy.

🖨️ Remote Printing

Print remote documents locally by enabling remote device printing feature.

👥 Address Book

Instantly view contacts’ online or offline status without connecting. 👀

🤝 Contacts Sharing

Share contacts with partners to collaborate and improve remote support.

🎨 Customizable

Create custom branded interface for distribution to your customers.

💬 Chat

Live chat during remote sessions to optimize support and workflow.

🔄 Automatic Updates

Enable automatic updates to ensure clients always have latest features.

📥 Support Queue

Enable Support Queue to receive and manage customer support requests.

 Auto Deployment

Remotely configure and mass-install Supremo across all network devices automatically.

🪪 License Usage Control

Track real-time license usage by viewing device IDs actively using it.

Access any device at any time, wherever you are

Supremo Professional

Use our IT RMM Console to provide the best service to your customers

Hotline (65) 6296 4268 | Email: sales@version-2.com.sg
Website: www.version-2.com.sg | www.v2catalog.com

Enterprise Access Control Modernization Report

Forrester’s Total Economic Impact™ of Portnox Cloud highlights a fundamental shift for enterprises: moving from reactive troubleshooting to proactive governance.

287% Total ROI
75% Risk Reduction
95% Fewer Support Tickets
< 6 Months Payback Period
 

The Cost of Legacy Stagnation

Enterprises relying on on-premises access models face significant business risks:

  • Invisible Assets: Unmanaged IoT and BYOD devices create unknown lateral-movement risks.
  • Operational Drag: Access issues consume up to 60+ hours of engineering labor per week.
  • Scaling Bottlenecks: New site deployments are delayed by hardware procurement and physical setup.

The Cloud-Native Transformation

ObjectiveCloud-Native Outcome
VisibilityReal-time oversight of every connected device across all regions.
UptimeElimination of local server failures; 34 hours of uptime recovered per year.
AgilityDeployment in under 20 minutes; scaling without increasing headcount.
“We can see everything now—and that changes everything.”
— Enterprise Security Leader

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Stryker Cyberattack: Endpoint & Mobile Monitoring Analysis

2025-12-22   A log correlation engine automates the process of linking fragmented event data across diverse systems, transforming raw logs into real-time, actionable insights. By normalizing data and applying correlation rules, it reduces alert fatigue, accelerates incident detection (MTTD), and enables faster root cause analysis for improved security and operational efficiency.

Continue reading

Security Advisory: GNU Inetutils telnetd

Multiple vulnerabilities have been discovered in the GNU Inetutils telnetd server, affecting most modern Linux deployments. These flaws allow for authentication bypass and remote code execution (RCE) before a login prompt is even shown.

Status: No Patches Available. It is highly recommended to disable the Telnet service on all vulnerable hosts immediately.

Vulnerability Summary

VulnerabilityDesignationCVSSAffected Versions
SLC Buffer OverflowN/ACriticalUp to 2.7
Auth Bypass ($USER variable)CVE-2026-240619.81.9.3 and higher

Identification via runZero

Use the following query in your Asset Inventory to find potentially impacted Linux systems:

_asset.protocol:=telnet AND protocol:=telnet AND os:Linux AND banner:=”%login:” AND NOT banner:busybox

Recommended Actions

  • Disable telnetd across the entire network.
  • Ensure strict network access controls (firewalls) are in place.
  • Replace Telnet with SSH for remote management.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Resilience by Design | Scale Computing & Eaton

IT downtime is more than an inconvenience; it is a costly disruption that can reach $100,000 per hour. Scale Computing™ and Eaton have partnered to deliver a disaster-ready infrastructure designed for continuous uptime and simplified recovery.

The Power of Partnership

Eaton provides trusted UPS and power management, while SC//HyperCore™ delivers self-healing infrastructure. Together, they ensure the lights—and your business—stay on.

Proactive Disaster Avoidance

Rather than focusing solely on “after the fact” recovery, our design prevents disasters from becoming disruptions:

  • Risk Elimination: UPS protection stops outages from halting operations.
  • Self-Healing: SC//HyperCore™ keeps applications running automatically.
  • Edge-to-Core: Deploy anywhere without extra hardware or specialized IT overhead.

Key Benefits for Your Organization

  • Continuous Uptime: Reliability during storms, surges, or grid instability.
  • Simplified Management: No need for on-site experts at every location.
  • Data Security: Reduced risk of loss via built-in backup and recovery.
  • Proven Leadership: Peace of mind from industry-leading resilience experts.

Don’t wait for recovery. Avoid the disaster today.

About Scale Computing
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Zero Trust Application Access Guide

Securing SaaS, Devices, and Users in the Hybrid Work Era

The Shift to Cloud-Native NAC

Zero Trust moves security from the network perimeter directly to the users and devices. Unlike legacy NAC, cloud-native solutions provide continuous verification and real-time visibility across all environments.

Core Pillars of Zero Trust Access

  • Least-Privilege: Granting the minimum access necessary for a task.
  • Continuous Verification: Constant monitoring of device health and user context.
  • Microsegmentation: Dividing the network to prevent lateral movement by attackers.

A Phased Roadmap to Implementation

01 Identity-Driven Control: Start with robust user authentication.
02 Device Posture: Verify the health of managed and BYOD devices.
03 Segmentation: Contain risks by creating smaller network zones.
04 Advanced Analytics: Use data to continuously refine security policies.

Conclusion

By moving to a cloud-native Zero Trust architecture, organizations can simplify security operations while providing a superior, secure experience for hybrid employees.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Vendor Access Monitoring & Audit Guide

Vendor access monitoring in most organizations stops at the VPN log. It tells you who connected, but fails to explain what they did next. Without activity data, investigating an incident relies on assumptions rather than facts.

Network Visibility Requirements

  • Real-time and retrospective tracking of accessed systems.
  • Protocol-level analysis of all communications.
  • Data transfer volume and directionality logs.
  • Detailed records of file copies and commands executed.

VPN vs. ZTNA: A Shift in Principle

Traditional VPN

Opens a wide network segment. Once connected, a supplier can potentially reach far more systems than required.

Modern ZTNA

Grants access exclusively to the specific service or application authorized. Nothing beyond that is reachable.

The Risk of Shadow Access (4G/5G Routers)

IT teams often face “shadow” access points installed by vendors for convenience. These unauthorized 4G/5G routers bypass security policies and monitoring entirely. In stable OT (Operational Technology) environments, this is a severe risk.

How to Detect Unauthorized Hardware

Network Detection and Response (NDR) solutions identify rogue hardware through:

  • Device Discovery: Automatic classification of every new device on the segment.
  • Behavioral Baselining: Alerting on new communication patterns or unknown destinations.

Conclusion

Building a verifiable audit trail ensures that when something goes wrong, the data is there to explain it. Moving to a passive monitoring approach allows IT teams to respond to incidents with factual certainty and fulfill compliance requirements through long-term data retention.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Enterprise Browser: Features and Use Cases

While consumer browsers are built for speed and personal convenience, enterprise browsers are designed to secure the modern office’s central hub: the web browser tab.

Definition: An enterprise browser is a managed web environment built for businesses to provide organization-wide oversight of data movement and security.

 

Key Differences at a Glance

CategoryConsumer BrowserEnterprise Browser
FocusIndividual ConvenienceBusiness Security
Data ControlMinimal/OpenNative DLP (No copy/print)
SecurityPlugin-dependentBuilt-in Zero Trust

 

Core Security Features

  • Native DLP: Prevents unauthorized screenshots, printing, and data pasting.
  • Workspace Isolation: Separates corporate and personal profiles to prevent tracking or infection cross-over.
  • Sandboxing: Runs suspicious sites in isolated bubbles to protect the underlying network.

 

Leading Use Cases

  1. BYOD Security: Secure work data on personal devices without full device management.
  2. SaaS Protection: Monitor activity in cloud tools like Salesforce or HubSpot.
  3. Audit Readiness: Automated logging simplifies compliance for SOC 2 and GDPR.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET launches eCrime reports to give security teams a strategic edge against modern cybercriminal groups

  • Launching ahead of RSAC 2026, ESET’s stand-alone eCrime reports provide security teams with curated, highquality insights into incidents, including key lessons, IoCs, hunting rules, and guidance, to strengthen resilience.  
  • ESET Threat Intelligence eCrime Reports deliver a clear, operational view into real-world intrusions and uncover hidden clusters of activity, including TTPs and infrastructure, moving beyond monitoring MaaS and RaaS advertisements.
  • Enabled with ESET AI Advisor, security teams are able to rapidly analyze and act upon threats with SOC team-level advisory.

Bratislava, San Diego — March 12, 2026 — ESET, a global leader in cybersecurity, today released eCrime Reports, a new strategic offering in the ESET Threat Intelligence portfolio. As companies have become increasingly overwhelmed by the growth and complexity of ransomware and infostealers, the demand for high-quality, curated cyber threat intelligence (CTI) has grown. With ESET’s new eCrime Reports, businesses have unprecedented access to data that shows how actual incidents unfold, including affiliate-level attack visibility, full attack-chain timelines and tooling, and region-specific telemetry.

“For over 30 years, ESET has helped governments, channel companies, and businesses stay protected from the world’s most advanced cybersecurity threats,” said Roman Kováč, Chief Research Officer at ESET. “Our newly launched eCrime Reports combine technical depth with functional defense guidance – based on feedback from ESET’s threat researchers around the world. This means law enforcement, IT, and security teams don’t just read about threats; they gain insights needed to anticipate attacks, close gaps, and strengthen defenses proactively. Focused on ransomware and infostealers, these eCrime reports help organizations to strengthen their overall cybersecurity postures, particularly in high-stakes environments.”

The new offering comes in two tiers – ESET Threat Intelligence eCrime Reports and ESET Threat Intelligence eCrime Reports Advanced. These curated reports are built on proprietary data and telemetry, with unique insights from real-world intrusions occurring across the globe. By following TTPs, ESET’s eCrime Reports uncover hidden clusters of activity, enabling and enhancing eCrime-related strategic decisions. Moving beyond monitoring MaaS and RaaS Dedicated Leak Sites (DLS), eCrime Reports can be supplemented with ESET’s proprietary intelligence feeds, including Android Infostealer, Malicious Email Attachments, Ransomware, Cryptoscam, Phishing URLs, Scam URLs, Smishing, and more. 

“Quality is essential in threat intelligence data,” said Kováč. “ESET Threat Intelligence customers are able to reduce maintenance and manpower associated with processing feeds – cutting through information overload associated with competitor threat intelligence offerings. Rather than struggling to sift through huge, noncurated external datasets, ESET’s services allow organizations to quickly identify and prioritize emerging business risks and previously unknown threats – giving them more time to accelerate incident response, mount an effective defense, and implement an overall more proactive cybersecurity posture.”

What’s Inside the Reports:

Activity Summary

A high-level overview of recent ransomware and infostealer campaigns distilled into strategic insights. Includes targeting patterns, attack progression, lessons learned, IoCs, and actionable guidance, to improve resilience.

Technical Analysis

Deep-dive reports on specific threat actors, campaigns, and more, detailing the full attack chain – from initial access to data theft. The technical analysis includes attacker tactics, tooling, infrastructure mapping, MITRE ATT&CK® coverage, and associated IoCs.

Monthly Digest

An executive-ready summary of current ransomware and infostealer activities. Outlines key trends, major incidents, and emerging threats, to help leadership set priorities and assess organizational risk.

eCrime Feed

A continuously updated stream of curated IoCs focused on ransomware gangs, their affiliates, and infostealer campaigns, delivered in standard STIX/TAXII format.

ESET AI Advisor (Advanced only)

ESET AI Advisor enables security analysts and decision-makers to rapidly interpret incidents and act upon threats. Built on 20+ years of AI and ML expertise, this generative AI module seamlessly integrates into day-to-day operations of security analysts.

Access to MISP Server (Advanced only)

Direct integration with curated threat intelligence. Automatic IoC ingestion enriches defenses, streamlines workflows, enhances detection, and supports incident response operations.

ESET’s eCrime Reports join the ESET Threat Intelligence portfolio, which includes three tiers, two of which are Premium APT Reports with in-depth analysis of global APTs, including state-aligned Russian, Chinese, Iranian, and North Korean groups. Supported by global threat hunters, these reports expose espionage activities, exploitation of vulnerabilities, and zero days – and have been expanded to include geopolitical context. ESET also offers 18 proprietary intelligence feeds and two sub-feeds, including Android threats, IoCs, Botnets, Phishing URLs, and more.

Launched ahead of RSAC 2026, visitors to this global cybersecurity tradeshow can visit booth N-5253 to receive a demo and talk to ESET’s threat experts. Details on ESET’s presentation schedule, meeting requests, and booth activities can be found here.

For more information about ESET Threat Intelligence, visit ESET’s website.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Limited
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.