

Safetica is a leader in SoftwareReviews’ Data Loss Prevention Data Quadrant
According to the comprehensive market reviews compiled by SoftwareReviews, Safetica has earned its place in the DLP Leaders’ quadrant. Placing just behind the overall quadrant winner McAfee, Safetica was praised for its Net Emotional Footprint and for providing exceptional support.

Both companies were awarded a gold medal and named winners of the 2021 quadrant. Safetica was top rated in Ease of implementation and Ease of data integration, scoring second in Product strategy and rate of development, and Vendor support.
The Infotech report is based only on extensive end-customers’ ratings. We are extremely proud to be one of the winners and for being top rated in ease of implementation and data integration, which are notorious challenges in the DLP sector.
says Richard Brulík, CEO of Safetica.
Category overview
SoftwareReviews rated DLP solutions according to feedback provided by their end-users during a comprehensive online survey. Vendors are evaluated on several factors: 11 capabilities, product features, likeliness to recommend and emotional footprint. A composite score is calculated from those factors. In 2021, McAfee DLP received a 8.9/10 composite score, followed closely by Safetica with 8.7. You can read the whole report here.

Quadrant gold medalists
The DLP quadrant is spread across the axes of product features and user satisfaction and vendor experience and capabilities. The leader’s quadrant features four solutions: McAfee DLP, Safetica, Trustwave DLP and Forcepoint Data Security Suite. DLP overview was populated in only two other quadrants: product innovators (Trend Micro DLP and Symantec DLP) and challengers (Sophos Enduser Protection Bundles and Check Point DLP). The Service star quadrant remained vacant in the 2021 evaluations.

Vendor capability awards
For all of the 11 capabilities, SoftwareReviews created a comprehensive review, with the highest-ranking solution winning the “Top rated” award in these capabilities. In their evaluations, customers gave Safetica the highest score in Ease of implementation and Ease of data integration, second in Product strategy and rate of development, and Vendor support.




About SoftwareReviews
SoftwareReviews is a division of Info-Tech Research Group, an IT research and advisory firm established in 1997. Backed by two decades of IT research and advisory experience, SoftwareReviews is a leading source of expertise and insight into the enterprise software landscape and client-vendor relationships. By collecting real data from IT and business professionals, the SoftwareReviews methodology produces detailed and authentic insights into the experience of evaluating and purchasing enterprise software
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.
senhasegura 特權帳號管理(PAM)解決方案 協助企業完善資安風險管理


IPEVO 愛比科技 DO-CAM 視訊協作攝影機榮獲 GOOD DESIGN AWARD 2021
與德國「IF」、德國紅點「Red dot」、美國「IDEA」,並列為全球最具權威及影響力之四大設計獎項的日本優良設計獎 GOOD DESIGN AWARD,已於10月20日公布得獎作品。
今年 GOOD DESIGN AWARD 收到來自世界各地共5835件參賽作品,經由80多位專業評審評審評選後,IPEVO 愛比科技DO-CAM 視訊協作攝影機榮獲 GOOD DESIGN AWARD 2021 教材、教育用品類獎項,除獲得國際大賞的肯定,更被評審評選為最愛的設計之一,並受邀在GOOD DESIGN東京丸之內展覽場展出,展期為10月20日至11月24日。
在 GOOD DESIGN 擔任評審之一的日本知名設計師 Ricca Tezuchi,是プロペラデザイン(propeller design)創辦人,也曾是深澤直人在 IDEO JAPAN 的同事,並在與深澤直人擔任無印良品與±0的設計總監時,合作開發過許多產品。
Ricca Tezuchi 女士評選DO-CAM 視訊協作攝影機為本次得獎作品中的最愛。
她提到,「這是一款可以輕鬆拿在手上的視訊攝影機。使用後,往下按便可以折疊起來,變成像筆盒一樣。這個獨特的設計考慮到了視訊攝影機在未使用的狀態下,亦能融入日常生活中而不會感到格格不入,因此我相當推薦這個產品。」
DO-CAM 視訊協作攝影機考量到遠距教學及遠端協作的實際應用,以特殊結構,創造方便攜帶及融入各種教育及工作場域的設計,以及可一鍵翻轉影像,在人物影像及文件影像中迅速切換的便利功能,是邁向混成教學及混合式工作不可缺少的數位工具。
About Version 2
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
關於IPEVO
IPEVO源自於PChome Online硬體事業部門,2007年7月正式獨立。自2004年於台灣營運Skype網絡電信服務,使台灣成為Skype全球發展中最成功的市場。2005年起以IPEVO品牌推出一系列Skype專屬硬件產品,將Skype虛擬服務轉化為使用者實質經驗。IPEVO以簡單、實際且具有價值的經驗為產品目標,其簡潔俐落的產品風格呼應著IPEVO的核心思考與產品精神。目前已研發之產品包括:Skype有線USB話機、Skype無線話機、Skype會議系統、Skype視訊設備、Stand-alone免電腦Skype話機。


My Company Suffered a Ransomware Attack: Should I Pay the Ransom or Not?

Ransomware attacks are one of the biggest fears of companies today. Imagine having to use your business resources to pay cybercriminals. This is a reality that happens.
However, in case your company suffers a ransomware attack, what is the best option: To pay or not to pay the ransom? That is exactly what we will talk about in this article.
Keep reading and understand how to handle this type of situation.
What is a Ransomware Attack?
A ransomware attack consists of blocking data from computers and servers through encryption.
The hacker blocks this data and demands the payment of the ransom through a type of digital currency, such as Bitcoin.
The promise made is that the data will only be released when the ransom is paid.
How Does a Ransomware Attack Work?
One of the biggest risks to a company’s information security is cyberattacks, as hackers are aware of possible system security flaws due to data transfer between the various devices connected to the server.
The moment a hacker identifies a security loophole in the system, they prepare their attack.
As far as ransomware is concerned, computer files are encrypted and ransom is requested for the data to be released again.
It is possible to fix these flaws before hacker attacks happen through system updates, but this does not always happen in a timely manner and hackers are usually quite quick in their actions.
One of the ways to avoid ransomware is to keep operating systems always up-to-date, as malware easily invades when it perceives a system failure.
Another way ransomware attack can happen is through phishing which, in practice, occurs through an email sent with a strange attachment or code to your inbox.
This email arrives disguised as a known sender, such as an employee of the company itself, causing a person to open the attachment without so much suspicion.
By clicking on such an attachment, the virus gains access to all computers and devices connected to the system and the ransomware begins to encrypt the files until they are all taken “hostages”, and remain so until the desired payment is made to the cybercriminals.
It is important to mention that, although the hacker promises to release access to the data after payment, this may not happen, as these people are not trustworthy to simply believe their words without guarantees.
Also take the opportunity to read: The pillars of information security: part 2
Learn How to Handle a Ransomware Attack
In case a ransomware attack happens in your company, you must immediately notify the IT team who will be responsible for finding the last backup performed on the system.
When it occurs at home, the ideal is to disconnect the computer from the network and look for a professional who is an expert in information security to help you solve the problem.
One of the ways to protect yourself from these hacker attacks is to have an antivirus in your system, always kept up to date, in addition to performing regular backups of your data, preparing for possible losses in the future.
To Pay or Not to Pay for a Ransomware Attack?
Experts on the subject defend the idea that not paying for ransomware attacks is the best option because, as already mentioned, cybercriminals offer no guarantee that they will release the data later.
In some cases of this malware, it is entirely possible to solve the problem with the use of a good antivirus, for example.
When it comes to recovering data such as personal photos, legal documents, medical reports, and such, you must decide between the risk of paying and getting them back or not.
In the end, the most appropriate way to avoid these hacker attacks is to keep your system constantly protected by antivirus and security tools that cover cyberattacks like this one.
Furthermore, it is important to keep backups always up to date and your data stored in the cloud as another secure way to protect yourself.
It is worth noting that making payment for this type of hacker attack may even be considered illegal, as threats to sell or disclose confidential information on the dark web is a form of extortion, which is a crime under the law, as reported on Welivesecurity.
This is one of the cases where relying on a company that specializes in digital solutions becomes essential for good performance and data security in your company.
Was this content useful for you? Also read: Is Your Company Really Prepared for a Cyberattack?
About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.
Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.












