Skip to content

Web Net Com Ltd: MSP-Driven Success Through Unified Detection & Response

Web Net Com Ltd is a leading remote IT company for small to mid-sized businesses that provides exceptional quality services, cutting-edge software solutions, and top-tier cybersecurity. By prioritizing excellence, innovation, and customer satisfaction, they build lasting partnerships that empower their clients to achieve their business objectives. In collaboration with Guardz, they have significantly enhanced their security infrastructure, ensuring the highest level of protection for their clients’ digital assets and allowing them to confidently focus on their core business goals.

How has Guardz changed your day-to-day operations and peace of mind?

Guardz has significantly streamlined our operations and provided unparalleled peace of mind. Instead of spending hours filtering through false alarms, I now start my day with a clear list of actual threats. Recently, we connected one of our new clients to Guardz, and it helped us scan their cloud presence, discovering over 800 files shared publicly, some containing sensitive corporate data. With Guardz’s help, we closed a major data leak before it caused any harm. This reliable protection allows me to focus on strategic initiatives like developing a new cloud migration service that has already attracted several new clients. The efficiency and security Guardz offers are truly invaluable.

Can you recall a moment when Guardz really proved its worth to you?

Absolutely, I can recall a moment when Guardz truly proved its worth. We faced a highly sophisticated malware attack that slipped past our previous security measures. Guardz detected it almost instantly, neutralizing the threat before it could do any damage. This incident reaffirmed our decision to partner with Guardz and highlighted the critical role it plays in safeguarding our clients’ data. It was a clear demonstration of Guardz’s advanced capabilities and our commitment to maintaining top-tier cybersecurity.

How has Guardz impacted your client relationships?

Guardz has significantly enhanced our client relationships by making our proactive efforts more transparent. Its detailed reports clearly show the threats we neutralize, helping clients appreciate the value of our work. For instance, last quarter, we used Guardz’s visual ROI report to present a cyber risk assessment to our manufacturing client. The clear data helped them identify security gaps, leading to a substantial budget increase for additional protective measures. These reports are now crucial for showcasing our value and building stronger, more trusting relationships with our clients.

How has Guardz helped you scale your business?

We’ve grown our client base by 20% since implementing Guardz, and we’ve done it without adding to our team.

What would you tell other MSPs about Guardz?

To fellow MSPs, I can confidently say that Guardz has revolutionized our cybersecurity offerings. Its AI-driven threat detection is impressively accurate, catching issues that previously went unnoticed. The 24/7 monitoring feels like having an elite security team on duty around the clock. What sets Guardz apart is their exceptional support team, working with us as true partners. Since implementing Guardz, our threat response has become faster and more precise, driving our business growth and keeping us ahead of the competition. If you want to elevate your cybersecurity services, I highly recommend Guardz. It has transformed our business.

How do you see your partnership with Guardz evolving in the future?

I envision our partnership with Guardz as a long-term collaboration. Their innovative approach aligns perfectly with our goals, and I’m excited about the potential to grow together. I’m confident that Guardz will continue to push the boundaries of cybersecurity, helping us stay ahead in an ever-evolving landscape.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

Portnox Survey Reveals CISO’s Surprising Views on Job Security, Zero Trust, Multi-Factor Authentication, and More

The survey of hundreds of CISOs at large enterprises paints a picture of a cybersecurity world under siege heading into 2025.

 

Austin, TX – Oct. 8, 2024—Portnox, a leading provider of cloud-native, zero trust access control solutions, today unveiled the results of its latest survey, “CISO Perspectives for 2025,” revealing critical insights into the challenges faced by Chief Information Security Officers (CISOs) at large enterprises.

The survey, which polled 200 CISOs from companies with annual revenues exceeding $500 million, highlights growing concerns around the effectiveness of Zero Trust, the limitations of Multi-Factor Authentication (MFA), and the looming threat to job security amidst an increasingly complex cybersecurity landscape.

The results present a stark picture of a cybersecurity world under siege, where security leaders must constantly balance ironclad defenses with user-friendly experiences while navigating regulatory demands and soaring cyber insurance premiums.

Key Survey Findings:

  • Job Security on the Line. Nearly all CISOs (99%) are worried about losing their positions if a breach occurs, with a striking 77% of CISOs being very or extremely concerned. This underscores the immense pressure they face in protecting their organizations.
  • MFA Under Fire. While MFA has become a cornerstone of many organizations’ security strategies, 85% of CISOs expressed concerns that it’s not keeping up with increasingly sophisticated attacks. Common issues include password fatigue, insider threats, and phishing exploits.
  • Passwordless Gaining Steam. Passwordless authentication represents the agreed upon method for stronger security, but only 7% of organizations have fully implemented it, citing cost, complexity, and employee resistance as key barriers.
  • NAC Investment is Growing. CISOs unanimously agree that Network Access Control (NAC) is a critical component of any Zero Trust framework they put in place. Reliance on NAC is growing, as more than 4 in 5 are increasing their investment in the next year.
  • Zero Trust Skepticism. Every CISO surveyed (100%) agreed that Zero Trust Network Access (ZTNA) has not fully lived up to its promise, with many organizations still in the early stages of adoption.
  • Compliance Challenges. As regulations like NIS2 loom, 90% of CISOs feel overwhelmed by constantly shifting compliance demands, making it difficult to ensure they’re always up to date.
  • Cyber Insurance Gaps. With 58% of CISOs unsure whether their cyber insurance policies adequately cover critical threats such as supply chain attacks, many organizations are left exposed to potentially devastating risks.
  • Breaches Remain a Top Concern. Despite the challenges, 86% of CISOs are laser-focused on preventing breaches. However, many concede that their current defenses may not be enough to withstand today’s advanced threats.

“CISOs today are under immense pressure to do more with less, while the stakes have never been higher,” said Denny LeCompte, CEO of Portnox. “The survey results underscore a clear reality: security leaders need tools that not only protect their organizations but also provide peace of mind in an increasingly hostile environment.”

To view the full data from the survey, including a complete breakdown of respondent demographics please visit: www.portnox.com/2025-ciso-perspectives-report-data/

Methodology

The Portnox Survey was conducted by Wakefield Research (www.wakefieldresearch.com) among 200 US CISOs at companies with a minimum annual revenue of $500m with representative quotas set for company size, between August 29th and September 9th, 2024, using an email invitation and an online survey.

Results of any sample are subject to sampling variation. The magnitude of the variation is measurable and is affected by the number of interviews and the level of the percentages expressing the results. For the interviews conducted in this particular study, the chances are 95 in 100 that a survey result does not vary, plus or minus, by more than 6.9 percentage points from the result that would be obtained if interviews had been conducted with all persons in the universe represented by the sample.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

ESET Research: GoldenJackal APT group, with air-gap-capable tools, targets systems in Europe to steal confidential data

  • GoldenJackal, an advanced persistent threat (APT) group, used a custom toolset to target air-gapped systems at a South Asian embassy in Belarus since at least August 2019. 
  • In another attack, GoldenJackal deployed a highly modular toolset in Europe on various occasions between May 2022 and March 2024 against a government organization in a European Union country.
  • These toolsets provide GoldenJackal with a wide set of capabilities for compromising and persisting in targeted networks. Victimized systems are given different roles in the local network, from collecting interesting – likely confidential – information, to processing the information, distributing files, configurations, and commands to other systems, or exfiltrating files.
  • The ultimate goal of GoldenJackal is very likely to be stealing confidential information, especially from high-profile machines that are intentionally isolated from the internet.

MONTREAL, BRATISLAVAOctober 7, 2024 — ESET researchers have discovered a series of attacks that took place in Europe from May 2022 to March 2024, where the attackers used a toolset capable of targeting air-gapped systems, in a governmental organization of a European Union country. ESET attributes the campaign to GoldenJackal, a cyberespionage APT group that targets government and diplomatic entities. By analyzing the toolset deployed by the group, ESET identified an attack GoldenJackal carried out earlier, in 2019, against a South Asian embassy in Belarus that targeted the embassy’s air-gapped systems with custom tools. The ultimate goal of GoldenJackal is very likely to be stealing confidential and highly sensitive information, especially from high-profile machines that might not be connected to the internet. ESET Research presented their findings at the 2024  Virus Bulletin conference.

To minimize the risk of compromise, highly sensitive networks are often air-gapped – isolated from other networks. Usually, organizations will air gap their most valuable systems, such as voting systems and industrial control systems running power grids. These are often precisely the networks that are of interest to attackers. Compromising an air-gapped network is much more resource-intensive than breaching an internet-connected system, which means that frameworks designed to attack air-gapped networks have so far been exclusively developed by APT groups. The purpose of such attacks is always espionage.

“In May 2022, we discovered a toolset that we could not attribute to any APT group. But once the attackers used a tool similar to one of those already publicly documented, we were able to dig deeper and find a connection between the publicly documented toolset of GoldenJackal and this new one. Extrapolating from that, we managed to identify an earlier attack where the publicly documented toolset had been deployed, as well as an older toolset that also has capabilities to target air-gapped systems,” says ESET researcher Matías Porolli, who analyzed GoldenJackal’s toolset.

GoldenJackal has been targeting governmental entities in Europe, the Middle East, and South Asia. ESET detected GoldenJackal tools at a South Asian embassy in Belarus in August and September 2019, and again in July 2021. More recently, according to ESET telemetry, another governmental organization in Europe was repeatedly targeted from May 2022 until March 2024.

With the level of sophistication required, it is quite unusual that in five years, GoldenJackal managed to deploy not one, but two separate toolsets designed to compromise air-gapped systems. This speaks to the resourcefulness of the group. The attacks against a South Asian embassy in Belarus made use of custom tools that we have only seen in that specific instance so far. The campaign used three main components: GoldenDealer to deliver executables to the air-gapped system via USB monitoring; GoldenHowl, a modular backdoor with various functionalities; and GoldenRobo, a file collector and exfiltrator.

“When a victim inserts a compromised USB drive in an air-gapped system and clicks on a component that has the icon of a folder but is actually a malicious executable, then GoldenDealer is installed and run, starting to collect information about the air-gapped system, and storing it on the USB drive. When the drive is again inserted into the internet-connected PC, GoldenDealer takes the information about the air-gapped PC from the USB drive and sends it to the C&C server. The server replies with one or more executables to be run on the air-gapped PC. Finally, when the drive is again inserted into the air-gapped PC, GoldenDealer takes the executables from the drive and runs them. No user interaction is needed because GoldenDealer is already running,” explains Porolli.

In its latest series of attacks against a government organization in the European Union, GoldenJackal moved on from the original toolset to a new, highly modular one. This modular approach applied not only to the malicious tools, but also to the roles of victimized hosts within the compromised system: they were used, among other things, to collect and process interesting, likely confidential information, to distribute files, configurations, and commands to other systems, and to exfiltrate files.

For a more detailed analysis and technical breakdown of GoldenJackal’s tools, check out the latest ESET Research blog post “Mind the (air) gap: GoldenJackal gooses government guardrails”  on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

JumpCloud 宣布推出全新的 SaaS 管理工具 助公司企業對抗揭露「影子 IT」(Shadow IT)

在日常運營中,您已經需要處理大量的核心任務:管理員工和承包商的入職和離職,維護網絡和共享資源,解決終端用戶的技術問題,抵禦安全威脅……這些工作不勝枚舉。只要您能掌握問題的全貌,並擁有應對的工具,任何難題都不會難倒一個組織良好的團隊。

然而,問題在於 IT 可能在背後悄悄運作。

「影子 IT」聽起來像是一部恐怖電影的名字,但它在現實中確實存在,並且通常是由於員工想提升工作效率、表現更好。他們會尋找幫助他們提高生產力的解決方案,但這些解決方案往往是在沒有 IT 部門監控的情況下被採用。現代「影子 IT」主要是由 IT 部門未監管的 SaaS 應用程式組成,這可能導致營運效率低下、成本增長以及安全漏洞的出現。

為了幫助您的公司企業更好地管理這些未經授權的 SaaS 應用程式,JumpCloud 宣布推出全新的 SaaS 管理工具。

這款新工具能幫助 IT 管理員發現所有受管理設備上使用的 SaaS 應用程式,讓您清楚知道哪些應用被使用,以及使用者是誰。JumpCloud 的 SaaS 管理工具有助於控制 SaaS 增長,防止「影子 IT」,擴大單一登錄(SSO)的覆蓋,降低 SaaS 成本,確保公司企業內部的 SaaS 使用安全、合規並經過優化。

為什麼選擇 JumpCloud SaaS 管理?

如今,許多公司企業難以管理跨部門使用的 SaaS 應用程式。由於 SaaS 工具的採用相對簡單,這些應用的數量容易失控,導致 SaaS 應用的過度擴散以及潛在的安全問題。未知或未授權的 SaaS 應用,通常被稱為「影子 IT」,可能會繞過安全政策,造成安全風險、合規性問題和不必要的開支。

對於中小企業(SMEs)和為其提供服務的管理服務供應商(MSPs)來說,這些挑戰尤為明顯。有限的資源使他們很難實施和維護 SaaS 管理。中小企業和 MSP 通常缺乏專門的 IT 人員和工具來有效地跟蹤和管理眾多的 SaaS 應用程式,導致數據洩露、知識產權的損失以及難以滿足監管要求。

儘管一些 MSP 使用防火牆或路由器報告等解決方案來應對這些風險,但隨著混合辦公和遙距工作的普及,這些方法變得不再那麼有效。JumpCloud 提供的幾乎實時的 SaaS 使用信息,能幫助 IT 管理員更好地掌控 SaaS 使用情況,並與客戶共享。

JumpCloud 的 SaaS 管理解決方案使 IT 團隊能夠有效保護和管理公司企業內的 SaaS 應用程式。公司企業可以利用 JumpCloud 簡化 SaaS 應用的發現,防止「影子 IT」,擴展 SSO 覆蓋範圍,並在一個綜合平台上實現合規要求。

SaaS 管理的關鍵優勢

可視化和控制
通過 JumpCloud 的 SaaS 探索和監控功能,您可以在安全性和生產力之間找到最佳平衡。


您可以全面了解已授權和未授權的應用程式,包括 SSO 登錄,從而掌控公司企業內部的數據散佈,幫助 IT 管理員將傳統的手動 SaaS 跟蹤方法轉變為精確的自動化流程。

改善 SaaS 成本
JumpCloud 讓 IT 管理員可以輕鬆檢測未授權或未充分利用的 SaaS 應用程式。

通過整合和追蹤授權,IT 管理員可以協商更好的合同條款,了解使用趨勢,重新分配資源,減少不必要的開支,確保每個 SaaS 應用程式都與公司企業的目標和預算相符。

保護 SaaS 訪問與使用
確保員工的工作不被打斷,並在無縫的工作體驗中享受安全保障。

IT 管理員可以在用戶存取未經批准的 SaaS 網域時自動警告或直接阻止,並提供安全的替代方案。用戶可以安全、順暢地存取經授權的 SaaS 工具。

主要功能

發現「影子 IT」
管理員可通過 JumpCloud 瀏覽器擴展來識別和追蹤 SaaS 應用程式及帳戶
阻止訪問未授權應用
管理員可阻止對未經 IT 部門批准的應用程式的存取,並建議替代方案。透過警示和政策來引導員工採取適當行動,降低安全與合規風險
擴展 SSO 覆蓋範圍
管理員可確定哪些應用已與 JumpCloud SSO 整合,並識別可新增的應用以擴展安全 SSO 存取
追蹤 SaaS 使用
管理員可監控 SaaS 應用程式的使用情況,並報告員工的參與度,從而減少在未充分利用的應用程式上的不必要支出

註: JumpCloud SaaS 管理工具目前支援 JumpCloud Go 擴展功能。


立即使用 JumpCloud SaaS 管理工具

現有的 JumpCloud 客戶和 MSP 合作夥伴現在即可開始使用 JumpCloud SaaS 管理功能,無需額外費用,並且可以獲得 Platform Prime 的更多功能。

如果您是 JumpCloud 的新用戶,請註冊免費試用,親身體驗 JumpCloud SaaS 管理工具的優勢。

 

關於 JumpCloud

JumpCloud® 提供一個統一的開放式目錄平台,使 IT 團隊和 MSP 能夠輕鬆、安全地管理公司企業中的身份、裝置和存取權限。通過 JumpCloud,用戶能夠從任何地方安全工作,並在單一平台上管理其 Windows、Apple、Linux 和 Android 裝置。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

JumpCloud 推出「流動裝置信任」功能 提升員工生產力並保障安全

JumpCloud Inc. 正式宣布推出「流動裝置信任」(Mobile Device Trust)功能。透過此功能,JumpCloud 的客戶現在可以限制使用者僅能透過安全的企業擁有裝置(COD)和個人自帶裝置(BYOD)存取公司資源。這項功能不僅提升了公企業的安全防護,也提高了使用者的工作效率。

JumpCloud 產品總監 Khanh Tran 表示:「我們很高興能夠推出許多客戶期待的流動裝置信任功能。企業需要確保員工隨時隨地安全地存取敏感資源,而 IT 管理員則希望擁有能靈活管理企業擁有裝置的工具。同時,終端用戶也需要簡單易用、無干擾的流動體驗。JumpCloud 的流動裝置信任功能滿足了這些需求,秉持我們提供安全、便捷存取的承諾。」

未受管理的流動裝置是企業安全的主要漏洞之一。流動裝置信任功能利用 JumpCloud GoTM 提供抗釣魚憑證,加強了流動裝置的安全性。用戶可在 Apple MDM 或 Android EMM 註冊的裝置上安裝 JumpCloud ProtectTM 應用,透過 JumpCloud Go 註冊裝置,並建立信任關係。該功能還透過取消密碼需求,改善用戶體驗,提升企業安全性,同時不影響員工的工作效率。

主要功能與優勢包括:

  • 裝置管理條件:這些預設政策確保 JumpCloud 可以管理裝置並驗證其可信度。IT 管理員可以強制執行密碼規範,並在裝置遺失、被盜或員工離職時移除公司資料或取消存取權限
  • 作業系統限制:允許 IT 管理員根據經批准的作業系統限制裝置的資源存取
  • 磁碟加密增強:確保裝置具備所需的磁碟加密(基於文件或元數據)
  • 裝置證明:保護裝置免受以下威脅:
    ○ 裝置遭破壞後偽報其狀態
    ○ 裝置使用過期的證明信息
    ○ 裝置冒用其他裝置的識別碼
    ○ 提取私鑰供惡意裝置使用
  • 裝置信任儀表板:此儀表板為桌面、iOS 和 Android 裝置的設置提供可見性,讓 IT 管理員輕鬆查看企業中設置的策略,並強調運用裝置管理條件的條件式存取策略。

流動裝置信任功能現已向所有 Platform Prime 客戶開放。對於希望從單一平台管理 Android 和 iOS / iPadOS 裝置的企業,現在可以向 Version 2 申請免費演示。

關於 JumpCloud

JumpCloud® 提供一個統一的開放式目錄平台,使 IT 團隊和 MSP 能夠輕鬆、安全地管理公司企業中的身份、裝置和存取權限。通過 JumpCloud,用戶能夠從任何地方安全工作,並在單一平台上管理其 Windows、Apple、Linux 和 Android 裝置。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×