Skip to content

The Importance of the Voice of the Customer Report

We, from senhasegura, a provider considered Challenger by Gartner in its Magic Quadrant for PAM 2020 report, are proud to announce that we have also received the Customer’s Choice seal by Gartner in the Voice of the Customer: Privileged Access Management report. This seal is a recognition for the providers best evaluated by verified users, and endorses our commitment to developing the best PAM solution on the market, with our customers as the driving force behind our work. To ensure a fair and reliable evaluation, Gartner uses a rigorous methodology to consider the aspects analyzed by users.

Gartner considers Privileged Access Management solutions, or simply PAM, as tools that help organizations provide privileged access to critical assets and achieve compliance requirements by managing and monitoring privileged accounts and access. The functionalities of a PAM tool range from the discovery of privileged accounts in systems, devices, and applications to the isolation, monitoring, recording, and auditing of sessions, commands, and privileged access actions.

Since its creation in October 2015, Gartner Peer Insights has received over 350,000 reviews in more than 350 industries. The Voice of the Customer report summarizes reviews from the evaluation platform to assist IT leaders in choosing the best tools according to their organizations’ needs. These reviews complement Gartner’s assessment methodology and have an important influence on the decision-making process, considering the users’ experiences in implementing and operating the solutions.

To be considered in the report, providers must have obtained 10 or more reviews during the eligible submission period, which is usually 1 year. According to the Voice of the Customer 2021 report, Gartner Peer Insights has published 924 reviews in the period ended in November 2020. It is worth remembering that reviews from customers with less than USD 50 million in revenues are excluded from the methodology adopted by Gartner. In the period evaluated, senhasegura has received 54 reviews with an average score of 4.8, the second-highest review in the PAM market. It is worth mentioning the Service and Support aspect, also with a 4.8 score. Besides, 96% of our customers recommend the senhasegura Security platform.

Some testimonials from senhasegura’s users on the Gartner Peer Insights platform include:

“Excellent PAM (tool) for DevOps and Secrets Management, Fast deployment, and great Support. – Portfolio and Program Management for a client with sales between USD 250M and 500M.

The solution is very flexible and scalable. It has integrated very well into our DEVOPS CICD environment composed mainly of Kubernetes, Docker, Jenkins, and Gitlab. The architecture adopted was a 3-node active-active cluster in our AWS account, as we had a large number of applications depending on it. Also, the integration with AWS Watch gave us real-time PAM on ephemeral servers. The secret discovery tool helped us to have visibility of secrets in the pipeline and allowed us to rotate them during the application deployment stage without having to refactor each application in the first place”

For another customer with a turnover of more than USD 1 billion, senhasegura “allows a PAM approach to IT and OT environments for industry 4.0”.

Finally, one more satisfied customer, from the telecommunications and billing area with earnings between USD 3 and 10 BI, considers that “senhasegura’s intuitive wizards and all-in-one architecture facilitate deployment, even in a complex telecommunications company scenario, including high availability (HA) and disaster recovery (DR). The tool is also adherent to local and cloud environments and integrates seamlessly with our infrastructure with various vendors and technologies, including legacy devices.”

Among the 14 providers considered in the Voice of the Customer report, those who obtain a higher score than the market average, evaluated by more than 50 customers during the eligible period, receive the Customer’s Choice seal. Also, customer reviews must be represented in different segments, sizes, and regions. For Gartner, this is a way to recognize both the most satisfied PAM customers and the solutions offered by providers.

Once again we reinforce our pride in being listed in the Gartner Voice of the Customer report and receiving the Customer’s Choice seal. To find out more about what our customers have to say about senhasegura, and if you also want to leave your testimonial, visit our page on Gartner Peer Insights.

Disclaimer

Gartner Peer Insights Customers’ Choice constitutes the subjective opinions of individual end-user reviews, ratings, and data applied to a documented methodology. They do not represent opinions, nor do they constitute an endorsement by Gartner or its affiliates.

Gartner does not endorse any vendor, product, or service depicted in their research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner’s research publications consist of the research organization’s opinions and should not be construed as statements of fact. Therefore, Gartner disclaims all warranties, express or implied, concerning this research, including any warranties of merchantability or fitness for a particular purpose.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Actiphy Releases The Next Generation Of ActiveVisor Featuring Enhanced Integration With Active Directory

Wildomar – Actiphy, Inc., publisher of backup, disaster recovery, and virtualization software solutions, announces the release of the next generation of ActiveVisor, a centralized management solution for ActiveImage Protector backup clients, with many new features including enhanced integration with Microsoft’s Active Directory Services.

The Covid-19 pandemic has changed how we work, and that’s changing how we must protect our computing resources. With so many people working from home and from remote locations it is essential that any reliable backup and recovery solution provide the ability to protect and recover valuable data from virtually anywhere.

ActiveVisor is a centralized backup management console for ActiveImage Protector backup clients providing a visual representation of statistical data, real-time monitoring of backup status and storage space availability, and deploys agents, backup tasks, and schedules. In the event of a backup failure, ActiveVisor’s simplified user interface displays where the failure occurred so that steps can be taken to address the task failure. System administrators can substantially reduce workloads by monitoring and managing the backup status and configured backup settings for ActiveImage Protector backup clients from any location.

New Features

  • Enhanced Integration with Active Directory includes selecting specific machines from the list of Active Directory search results and adding those machines to the list of managed ActiveImage Protector clients.
  • Get notified when new ActiveImage Protector clients are added.
  • Protector agents automatically find and connect to ActiveVisor consoles for ease of use.
  • Push install ActiveImage Protector software patches and updates to client machines adds convenience and saves time by initiating the deployment from a single location.
  • Manage and monitor agentless backups of virtual machines remotely.

Features

  • Administrators can manage, monitor, and modify backup agents, and task schedules from any location using a browser-based console.
  • Manage Azure Virtual Clients connected to local network domains.
  • Auto-scroll option in the monitoring panel displays alerts of the latest changes occurring on clients. When a monitored client’s status changes, the client’s information will automatically display at the top of the panel.
  • The dashboard window provides a graphical representation of computers on the network, ActiveImage protected client machines, and visually draws attention to the status of task execution.
  • Clients can be grouped for management purposes. Groups can be rearranged, if necessary, based on changes to a systems configuration.
  • Schedules may be configured based on individual client requirements, or apply a predefined scheduled template to deploy a pattern-based backup schedule to batches of clients.

ActiveVisor is provided at no additional cost to ActiveImage Protector users with a valid annual maintenance contract.
Copyright © 2021 Actiphy, Inc. All rights reserved worldwide. All other brands and product names mentioned in this news release are trademarks or registered trademarks of their respective holders.

For more information about ActiveVisor, please visit:
https://www.actiphy.com/en-us/product/activevisor/

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

ASRC 2020 年郵件安全趨勢回顧

2020 年幾乎全年都受到 COVID-19 疫情影響。疫情的出現改變了全球數位工作模式,為了降低疫情對工作人力的衝擊,遠距工作或在家學習成了重要選項,很可能也將成為今後的常態。

遠距工作挑戰了傳統的資安部署觀念,遠端存取不再有「可信任的區塊或空間場域」,因此,所有服務的存取都需要驗證迫使了零信任的架構要提早被實現。遠距工作也推動了雲端應用的加速,雲端服務商算是疫情下少數的受惠者;但雲端服務設定不當造成資料大批洩漏的情況,算是容易被忽視的資安弱點。此外,不論是安全人員或是攻擊者,面對遠距工作直覺可聯想到的資安問題,就是 VPN 連線的安全性保護及 DDoS 攻擊或任何可能阻斷服務取得的手段,這類攻擊在 2020 年算是最容易被觀察到的事件了。

2020 年郵件安全有哪些明顯的趨勢呢?

詐騙郵件

到疫情的影響,在郵件安全方面防疫物資的詐騙經常出現。這些防疫物資的銷售廣告來自不明的公司與新註冊的域名,且出現的頻率與疫情的嚴重程度、防疫物資的匱乏程度有關係。2020 年的第一季與第二季較常看到此類詐騙;第四季後就相對少了許多。

為了口罩銷售而指向一些新註冊的域名

除了與疫情有關的詐騙郵件外,還有內容以恫嚇收件人電腦遭到入侵與監控的比特幣詐騙郵件。詐騙的內容其實是杜撰的,但這樣的詐騙郵件內容依發送的地區與國別,融合了多國的在地化語言,以提高詐騙成功的機率。

攻擊目標為中國,則以簡體字為內容

有些詐騙並非以直接騙取金錢為目的,而是騙取企業內部的資訊,再作後續利用。這樣的詐騙在 2020 年居家辦公,不便直接確認的情況下,特別容易奏效。

冒充企業高層,向員工索討企業內部資訊,或冒名令其執行不該執行的事務

釣魚郵件

2020 年最大宗的攻擊,非釣魚郵件莫屬了。通常釣魚的目標,是希望能釣取企業服務的各種憑證,尤其在遠距工作的情況下,若能釣到一組企業電子郵件的帳號密碼,很可能就能遠距取用企業的所有服務!

意圖騙取郵件帳號密碼的釣魚郵件

在 2020 年第四季,我們也觀察到了聲稱未付稅金導致郵件包裹延遲的釣魚郵件。這種釣魚郵件的目的是藉由假的刷卡付稅,釣取信用卡資訊。在受疫情影響仰賴物流的情況之下,這種釣魚郵件將使受害者更容易上勾!

藉由假的刷卡付稅,釣取信用卡的刷卡資訊

漏洞利用

試圖透過電子郵件嘗試入侵企業單位內部,以利進行後續的竊資、部署勒索軟體等目的。這類攻擊,多半直接寄送可利用 Office 漏洞的惡意文件,並以疫情相關主題誘騙收信人開啟,試圖藉此提高攻擊成功機率。

經統計,此類型攻擊常用的漏洞編號為:CVE-2012-0158、CVE-2017-11882、CVE-2017-0199、CVE-2017-8570 以及 CVE-2018-0802。

冒名 CDC 的通知,事實上為一可利用 CVE-2017-11882 漏洞的惡意文件

針對性攻擊

在 2020 年我們也觀察到了多起與疫情有關的針對性攻擊,與國家資助有關的 APT 族群嘗試以電子郵件攻擊則在五月份最為頻繁,其中有許多與疫情資訊、設備發放、公告通知或口罩相關資訊有關。

假防疫設備支援名義,試圖攻擊相關業者

搭配當時發生的時事,對特定單位發動的針對性攻擊

此外,BEC 攻擊事件以一月份為基準做為比對的話,在 2020 年 11 月份達到全年最高峰,這些 BEC 攻擊郵件中都存在著被攻擊對象才能知道的機敏資訊。

結語

2021 年仍無法明確預測何時可以完全擺脫疫情,而許多企業已將遠距工作視為未來可能的常態。遠距工作為資安帶來了新的挑戰,在家辦公的電腦及所使用的網路也難以確保安全性,因此具備合理存取權限的零信任的架構勢必是未來趨勢。由於遠距工作的關係,非即時同步確認事項的聯繫,多半倚賴電子郵件或其他傳訊軟體,各種詐騙事件將層出不窮。除了應避免公司資料外洩外,重要事項的聯絡,最好能設立第二通訊管道作確認;而重大決策也必須落實複核機制,才能避免 BEC 事件的發生。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於中華數位科技 Softnext Technologies Corp.
創立於2000年8月。
秉持著【We Secure Your Content】的服務理念,以提供企業資訊應用管理服務及打造資訊內容安全防護為宗旨。專精於提供網路應用服務技術,根據市場需求推出多款資訊內容安全的解決方案及應用服務,能夠協助企業透過符合資安管理規範並遵循法規的方式進行資訊內容安全管理,以維護員工的生產力、提升企業經營績效。

關於 ASRC 垃圾訊息研究中心
ASRC 垃圾訊息研究中心 (Asia Spam-message Research Center),長期與中華數位科技合作,致力於全球垃圾郵件、惡意郵件、網路攻擊事件等相關研究事宜,並運用相關數據統計、調查、趨勢分析、學術研究、跨業交流、研討活動..等方式,促成產官學界共同致力於淨化網際網路之電子郵件使用環境。更多資訊請參考 www.asrc-global.com .

SASE & the Future of Network Access Control

Gartner Reviews NAC Tools for 2021

The current enterprise network security practices focus on verifying the identity of the user and the device in a perimeter-less environment, where cloud-hosted technologies prevail in the enterprise and where remote sites include branch offices and employees working from home.

In Gartner’s paper “The Future of Network Security is in the Cloud”, one of the key findings is that “network security architectures that place the enterprise data center at the center of connectivity requirements are an inhibitor to the dynamic access requirements of digital business.” And there is a recommendation for enterprises to move their security into the cloud, based on a networking and security model called Secure SASE, a term coined by Gartner’s leading security analysts.

What is SASE?

SASE, pronounced “sassy”, stands for Secure Access Service Edge. It is a cloud-based network security model and category, proposed by Gartner in 2019, to support agile secure access to enterprise assets. This model includes the network security solutions in a global and cloud-native service that allows IT teams to easily connect and secure all of their organization’s networks and users in an agile, cost-effective, and scalable way. This is especially useful in the currently globally dispersed digital enterprise.

According to Gartner’s analysis, SASE can be characterized as an identity-driven, cloud-native, globally distributed technology that supports and impacts all enterprise edges and IT domains. For example, this would include a branch office in LA along with the main HQ in London, while traveling/mobile team members can connect on the go.

“SASE capabilities are delivered as a service-based upon the identity of the entity, real-time context, enterprise security/compliance policies and continuous assessment of risk/trust throughout the sessions. Identities of entities can be associated with people, groups of people (branch offices), devices, applications, services, IoT systems, or edge computing locations.” (Gartner)

SASE addresses the numerous problems with traditional network security methods, many of which are rooted in the idea that network security architectures should be placed at the center of connectivity in the HQ or data center, where typically branch locations are more vulnerable to attack.

Why should I care? What’s the problem?

Network security legacy applications cannot efficiently support newer networking use cases that have moved to “the edge”, such as cloud applications, dynamic services, and distributed data in remote branch offices. Traditional on-premises architectures introduce challenges such as latency, large management overhead, networking blind spots, and continuous reconfiguration work by the IT team as vendors, services, and equipment change. Even though the SASE model is not without its own challenges, it can eliminate these issues by removing cumbersome technologies and networking complexities, while moving the entire security process to the network edge (The point where the enterprise-owned network connects to a third-party, particularly cloud technologies. Oftentimes, network administrators refer to their “WAN edge” or “internet edge”).

If enterprises try to solve IT challenges as they emerge, with ad-hoc/point solutions, they will be leading themselves into technical compounds that are complex and costly to manage, and that will not necessarily work well with each other in terms of efficiency and speed. Complex and cumbersome communications between IT components slow down IT and its response rate to different business requirements.

SASE can change this paradigm because as mentioned, it is identity-driven, cloud-native, globally distributed, and securely connects all edges (WAN, cloud, mobile, and IoT). With SASE, enterprises can reduce the time it takes to develop new products, deliver them to the market, and respond efficiently and appropriately to the increasing changes in business conditions.

Shift happens.

In the last few years, as more organizations around the world became more decentralized, each office location is considered to be a remote site/ a branch office location, by organizational security controls. Companies either consume access security services in a costly method through data centers, implementing redundant controls in each location, or worse, neglecting the security for that part of the enterprise network altogether.

In simple terms, we are talking about delivering an all-access security suite from the cloud and not from the data center. This is in line with the trend of identity brokers moving to the cloud (such as Azure, G Suite, Okta, and others) as well as the continued migration to the cloud of many other cyber-security architectures and IT services.

In a scenario where you are implementing an on-premises NAC solution that goes with your on-premises network equipment, you can easily identify and authenticate the end-users. However, if your organization is distributed and like many others, has transitioned to using a cloud-delivered ID broker, then continuing to consume authentication and access services from the cloud make much more sense.

In the diagram, on the left side, we can see the price of not leaving any remote site exposed – either you pay a very high price for each location, or you need to duplicate your security mechanisms in each location which is costly. The second option is to authenticate and obtain your access rights and compliance needs via the closest, geo-redundant cloud service available.

OK, so what happens now?

The sensible course of action is to plan a security strategy to be scalable and efficient in the present, while at the same time future-proofing the organization’s security. With the organizational data migrating to the network edge, it makes sense to authenticate and authorize users and devices in a cloud format, thereby assuring that regardless of the equipment and geolocation, employees can securely connect in a cost-efficient and secure method to the needed resources.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×