Skip to content

Get on the DeLorean: Digital transformation over time!

We travel back in time in search of the first digital transformation

“-Jimmy! Define Digital Transformation!
-I haven’t studied it…
-There are no excuses, it is a very intuitive and well-known concept, even for an elementary school student.
-Mmm…
-Come on, Jimmy! Or I’ll give you an F that will give you blisters!

It was right then that Jimmy rose like a spring, and with his mind blank and his gaze clouded, he snapped a sonorous and mechanical sound to the horizon:

“Digital transformation is that change or advance relative to any application of new digital technologies in all aspects and aspects of human society.”.


-BRAVO, JIMMY! BRAVO!, applauded the whole class.

That day they carried Jimmy out of the building on their shoulders and immediately instituted summer vacations for the entire school, in the middle of October. From here we can only say: Thanks, Jimmy. We will use your neat and undeniable definition to trace today, on Pandora FMS blog, a journey through time in search of the first notions about digital transformation and its consequent repercussions. So join us, if you like, on our tuned, hybrid, and full of diesel DeLorean, to make an absolute reference to Back to the Future.

Digital Transformation in 2011, 2013 and 2015

We have already burned wheels in two parallel lines of fire with our DeLorean and we have reached 2015. Do you remember? Jorge Lorenzo won his third MotoGP World Championship and Juan Goytisolo received the Cervantes Award. That same year the research center MIT Center for Digital Business and the private firm Deloitte declared: “mature digital businesses are focused on the integration of digital technologies, such as social, mobile, analytics and cloud, at the service of the transformation of how business is done. In contrast, less mature businesses are focused on solving discrete business problems with individual digital technologies.” Is it clear enough? If you are not applying digital transformation, your chances of being left behind are high then.

In 2013, the Year of Faith according to the Catholic Church and the year of Luigi according to Nintendo. Not that long ago, not even a line on our DeLorean’s tank marker, we found a very uneven analog-digital conversion, according to Booz & Company, the global strategy consulting team. We are talking about sectors and countries lagging behind in converting from analog to digital. I am sure that if you look back, you will remember the uncertainty and slowness of analog technology. Politicians and strategists at the helm around the world had to step up the development ladder in this paradigm shift. The economy depended on it!

In 2011, with the death of Steve Jobs and the beatification of Pope John Paul II, we find that only a third of the companies around the world have a particular program of truly efficient digital transformation. Sad, yes, but as we travel backwards we will feel this crudeness more strongly.

Digital Transformation in 2000

We refuel our DeLorean in 2000, big milestones of the year? I got Pokemon Gold with Typhlosion at level 91. At that time, digital transformation was a fact very much in mind and in which they were already working, but the arrival of the three Ws (World Wide Web) changed, profusely, the speed and scope that digitization would show. There was increased pressure from societies to pass this process.

Digitization had become a concept/argument that was used at all times. And of course, it had to do with the increased use of the Internet and IT at all scales. This climate, already so common in companies, made us all aware of the issue and even the EU, for example, created the Digital Single Market. From this place arose many of the ideas with which the political agendas of the different countries of the Union were nurtured. The transformation of their different societies began gradually.

Digital Transformation much further back in time

I know you didn’t expect our DeLorean to be past eighty. After all, many believe that from there, apart from the unquestionable Back to the Future franchise, comes all the magic of digitization. However, it is time to accelerate. The Flux Condenser will fume but it will be worth it. If we get stuck in the past, with no possibility of returning, we will learn its customs and form a new family while we make ends meet by investing in aspirin or the gramophone.

In 1703, the King of Portugal, Pedro II, declared himself opposed to the cause of Philip of Anjou and Tsar Peter the Great founded the city of Saint Petersburg. However, the digital transformation has to give thanks at that time to Gottfried Wilhelm von Leibniz, who, attentive, gave birth to the concept of digitization in one of his most transcendental publications: “Explication de l’Arithmétique Binaire”. Years later, 1854, 1938, approx, geniuses as renowned as George Boole and Claude Elwood Shannon complemented and developed it.

In 1939, World War II begins and Gaby, Fofó and Miliki decide to form a comic trio of clowns. But we also have George Stibitz, known in the trade for his work on the development of digital logic circuits and, nothing more and nothing less, than for laying the foundations of the first digital computer. In addition to popularizing the term “digital”, very important for this article.

In 1961, Yuri Gagarin becomes the first human being to travel to outer space and Roy Orbison releases his debut album, “Roy Orbison at the Rock House”. But who interests us is Leonard Kleinrock, the American, engineer and science teacher who conceives the Internet in his work “Information flow in large communication networks”. To this day (the day the article is published), this man is still alive. Better go pay tribute to the door of his house. He resides between New York and Los Angeles and likes camellias.

In 1969, the arrival of Apollo 11 to the Moon and the Beatles’ last public performance. The ARPANET network was also created, commissioned by the US Department of Defense, and which is basically the seed of what we now know as the Internet.

Now that we have returned, unscathed, from our journey in search of the past milestones and nuances of the “Digital Transformation” concept, and now that the DeLorean is parked, until the next adventure (in which we will undoubtedly go see a Tyrannosaurus Rex or a Queen concert), we can resolve that the digital transformation has led to important changes within business models, social and economic structures, political and legal decisions, culture and other organizational patterns that guide us in the present. The concept went from a small and private sector to reach the hands of a huge public, always eager to master new technologies. The question is: In this new kingdom, as we have seen, new and old at the same time, what is your place?

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Myths and Truths About Privileged Access Management

Implementing privileged access management to systems in a company is critical to ensuring that there are no information theft and other security issues.

The so-called cyberattacks are responsible, for example, for the theft and hijacking of information in exchange for money, causing several damages to the continuity of an organization’s business. They have become very common and their actions can cause not only financial losses but also image and reputation losses.

Unfortunately, the trend is that over the years, these cyberattacks will become more and more severe and that their number of occurrences will grow.

With this scenario, importance of privileged access management also grows. Cyberattacks happen through classic malware and phishing methods or the exploitation of zero-day software vulnerabilities, in addition to advanced social engineering techniques.

With all that, privileged access management comes to help ensure that organizations function. Thus, it covers the need to protect data, networks, and devices from malicious actions.

Privileged Access Management

Privileged access management allows one to control all access performed through an organization’s privileged credentials in a system, preventing insider attacks and breaches.

Its deployment allows IT departments to be able to reduce access privileges, following tools and groups. In this way, users will have the right to access only those applications and locations on the network they need to perform their duties. This concept is called the principle of least privilege.

Also, IT can have visibility of how user interactions are being done, access times, how many interactions with the system were performed, which servers were used, and what activities were performed by each user.

With privileged access management, a user – be they from the company or a third party – who has a high privilege will have administrative access to the system using a privileged account.

It is through this credential that one can make changes to various settings, in addition to changing security protections or other user accounts.

In this way, all accesses performed in a company’s network environment must be managed. Furthermore, an unauthorized user should never have access to privileged systems and data.

Are you enjoying this post on privileged access management? So, visit our website and learn more about our products and services.

senhasegura strives to ensure the sovereignty of companies’ actions and privileged information. To do so, we work against data theft and through traceability of administrator actions on networks, servers, databases, and a multitude of devices through a PAM solution.

How is privileged access done?

Privileged access to devices can be accomplished in two ways:

  • Manually (least recommended); and
  • Through specific Privileged Access Management (PAM) solutions.

In this second case, PAM controls administrative access to a company’s critical systems to help it achieve its cybersecurity goals.

Controlling privileged actions allows one to protect a company’s IT systems against any attempt to carry out malicious actions, such as improper changes in the environment and theft of information. These blocked actions can take place both inside and outside the company.

In this context, using privileged access management technology is essential to optimize the deployment of a cybersecurity infrastructure in companies.

Moreover, the need for effective use of privileged access management techniques has never been greater, as traditional defense mechanisms such as antivirus, VPNs, and firewalls are subject to many failures today.

Myths and Truths

Now let’s take a look at some myths and truths about privileged access management:

1. Using PAM tools can completely prevent all cyberattacks.
Myth. This type of attack on the security of corporate networks is becoming more and more sophisticated. Therefore, there is no way for PAM to completely prevent all cyberattacks. However, this tool guarantees a lot of security for networks, preventing or mitigating the vast majority of attacks. In addition, it also needs to be constantly optimized to keep up with the boldness of cyberterrorists. As such, it is quite secure to avoid these problems.

2. Cyberattacks can be performed using privileged credentials.
True. Threats are becoming more sophisticated and intelligent, making use of attack techniques and tools to infiltrate company networks less visibly. Thus, cyberterrorists are investing in finding and taking advantage of privileged credentials to open their way to attack. That is why it is necessary to have a robust and reliable PAM tool to increasingly stop these attacks.

3. All companies invest in PAM.
Myth. Unfortunately, many companies remain blind to the importance of stopping attacks on their systems and end up not investing in tools for managing privileged access. Many of them believe there is no risk of intrusion when privileged access exists. But this is a wrong belief that could lead the company to bear huge losses later.

4. PAM deployment requires the use of shared accounts.
Myth. PAM has nothing to do with it. The use of shared accounts in itself poses a major cybersecurity risk. Also, many companies have had problems modifying the behavior of privileged users and administrators concerning this issue, posing a great risk to the company.

5. PAM allows you to create non-privileged accesses to a company’s network.
True. Although it seems that PAM only creates privileged access and accounts, in the most modern corporate tools of this system, it is also possible to create other types. In fact, PAM needs to facilitate any form of controlled connectivity to the system, through session and password management, and other security services, as well as monitoring and logging of activities.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

訊連科技FaceMe®人臉辨識名列全球活體辨識競賽前三強 提供金融、保險業安全、可靠之人臉辨識技術

【2021年07月28日,台北訊】 世界級AI臉部辨識技術開發商訊連科技(5203.TW)宣佈,旗下FaceMe® AI人臉辨識於全球知名之2021年國際電腦視覺大會(International Conference on Computer Vision,簡稱ICCV)舉辦之人臉活體辨識競賽中,取得第三名之佳績,更是該項競賽中,排除中、俄廠商後的第一名廠商。活體辨識對於打造安全可靠的人臉辨識應用不可或缺,可避免有心人士使用3D面具、或是2D之人臉照片、影片破解人臉辨識系統。FaceMe®於此項競賽之優異表現,顯見其適合應用於金融、保險,及 eKYC等需要更高安全係數的人臉辨識解決方案。

訊連科技FaceMe®人臉辨識名列全球活體辨識競賽前三強 提供金融、保險業安全、可靠之人臉辨識技術

ICCV為IEEE(電機電子工程師協會,Institute of Electrical & Electronic Engineers)每兩年舉辦一次之研究會議,是電腦視覺領域之頂級會議之一,亦是學術界、產業界及研究人員之指標性活動。於ICCV 2021中舉辦的活體辨識競賽(Anti-spoofing challenge)開放全球廠商、研究機構及學術團體申請參賽。此項競賽係採用高度仿真之3D面具做為競賽項目,不同與以往採用2D相片、影片進行測試。高仿真3D面具的出現,對於許多現行人臉辨識技術是一項嚴峻的挑戰。

本次競賽一共募集了全球195組團隊參加,當中56組進入最終階段,而其中僅18個團隊達標,名列於ICCV活體辨識競賽領先榜之中。於最終結果中,FaceMe®達到96.8%之防偽率(平均錯誤率為3.215),名列第三名,更是領先榜中,排除中、俄團隊之第一名。此外,FaceMe®與排名第一之演算法,也僅有0.16%之些微差距。

「近年來,人臉辨識應用蓬勃發展,而人臉辨識系統遭受攻擊之風險亦與日俱增。」訊連科技執行長黃肇雄表示:「打造辨識度、安全度更高的人臉辨識技術,是所有人臉辨識開發商的首要目標。訊連科技也很榮幸能在ICCV活體辨識競賽中,取得前三名之佳績,顯見FaceMe®於全球的領先地位。」

訊連科技FaceMe® AI人臉辨識引擎,在全球知名NIST人臉辨識競賽中,名列全球最精準的刷臉技術之一,在1:1和1:N測試項目中均位居全球前6強、並是排除中、俄廠商後的全球第一。FaceMe®可廣泛支援Windows、Linux(Ubuntu、RedHat、CentOS)、JetPack(Jetson)、iOS和Android等作業系統,並對CPU,GPU,SoC,APU和VPU等各式硬體優化。FaceMe®提供最全面且彈性佈署的解決方案,能將人臉辨識技術應用在各種IoT和 AIoT設備上。

關於Version 2
Version 2 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括中國大陸、香港、澳門、臺灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

The Coronavirus & the Cloud – A Winning Combination for Hackers

Originally posted on People and Computers

“The combination of changing work patterns due to the coronavirus, with the increasing migration to cloud environments, creates a new and significant challenge for corporate information security managers,” said Ofer Amitai, one of the founders and CEO of Portnox, explaining how it can be answered at the identification stage.

“One day, a food supplier from abroad called me. One of the company’s employees, who was fired, connected to the organization’s operating systems, changed the temperature of the meat refrigerators and caused damage and loss of goods worth millions of dollars. That’s how they understood that more vital identification is needed on the network and contacted us, “Ofer Amitai, one of the founders and CEO of Portnox, told People and Computers.

“The coming period will be characterized by hybrid work. This format makes remote work an integral part of all workers’ activities, and those who have not yet dealt with a remote work method will do so today or tomorrow. It will enable regular work alongside the protection of the organization and its resources. The combination of changing work patterns due to the coronavirus, with the growing migration to cloud environments, creates a new and significant challenge for corporate information security managers, and is a winning combination for hackers,” continued Amitai.

What is the main challenge for information security managers?

“Above all the challenges facing the information security manager, there is a major challenge, and that is that he must understand who and what threats he is facing,” Amitai noted. “One of the most difficult challenges for the organization is the migration to the cloud – how the systems and data will be kept secure in this new environment on the one hand, and that all systems will work on the other. Israel is slightly behind cloud adoption compared to the US market. It will be like the main headquarters so that one day everything will be connected to the cloud, and the services will be consumed from it, without the need to join the offices to the branch. ”

He added that “when setting up secure access control to the corporate network, make sure that application-level privileges are managed – whether via remote connection (VPN) or user management (VDI), which allows remote, virtual access to the desktop. Connection security must also be ensured via MFA – multi-step authentication of the user. Then the end station must be handled, including personal devices that employees bring from home. The goal is to maintain a consistent level of information security, regardless of the identity of the end device.”

A significant promise – but also risky

Portnox was established in 2007 to help organizations protect their corporate networks through the use of technology that allows them to see all devices connected to the network and to perform preventative and corrective actions that defend it from risk-prone devices. “This is a technology that makes life easier for information security managers in their day-to-day work,” Amitai explained.

“When someone accesses the network – via a remote, local connection or cable – Portnox knows how to make a strong identification of the device and the user. We do not manage the end component, but its risks,” said Amitai. “Our product in the cloud, Portnox CLEAR, enables organizations to protect the enterprise network via the cloud. The solution complements the security layer for VPN and VDI solutions. Through continuous risk monitoring capabilities on end stations and devices, information security principles are maintained and enforced – regardless of physical location. The end station, whether inside or outside the organization, and owned by it, or whether it belongs to the company or the employee, thus, all stations become secure and authenticated devices, which comply with the organizational security policy – all through enforcement, by the policy definition The organization, which changes according to its needs. ”

In conclusion, Amitai stated that “all the trends in the market bring with them a great promise – but also risks. They expose organizations to more hacks into their network, which makes them look for security solutions like ours – smart, easy to manage, and those who make sure the corporate network is secure. We have a wide range of enterprise and SMB clients who come from many sectors, including the medical, banking, and high-tech sectors. In the past year, we have experienced a 30% increase in revenue, and I estimate that the growth trend, which continues this year, will continue in 2022.”

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×