Skip to content

The Log4j Vulnerability Spells Crisis for Network Security, With Some Exceptions

In early December 2021, a significant vulnerability in a common piece of Java-based code by Apache set the world on fire…at least for IT security professionals. Within 24 hours of disclosure, leading software companies like IBM, Oracle, Amazon, and Cisco went into damage control, seeking to assess the level of potential damage they had and could expect to sustain, and frantically working on patches to prevent their customers’ data from being siphoned off and sold to the highest bidder. The event was fitting for 2021, a year marked by disinformation, confusion and fear.

“The log4j vulnerability is the most serious vulnerability I have seen in my decades-long career,” Jen Easterly, U.S. Cybersecurity and Infrastructure Security Agency director, said in a interview on CNBC.

As December 2021 dragged on, related flaws continued to surface, sending those same software companies back to the drawing board to repackage and test yet another series of patches for customer distribution. This after communicating initial patches to customers that often took a whole weekend or more to implement. It didn’t bode well for a happy holiday season for already resource-strapped IT teams who had been dealing with a plethora of network security issues for two years brought on by the COVID-19 pandemic and the overnight surge of remote workforces.

Depending on the version and the type of application, the log4j vulnerability’s scope and severity ranged from focused and moderate to widespread and critical. Some vendors were hit harder than others, such as Cisco, whose Identity Services Engine system saw more than 120 configurations affected. Others, like Microsoft, capitalized on the opportunity, rolling out solutions to proactively seek out and manage affected files, software, and devices impacted by log4j.

Widespread & Hard to Pin Down

The extent of the impact of the log4j vulnerability was in many ways foreseeable. The root cause: human “ingenuity” that could otherwise be called laziness. Rather than reinventing the wheel by creating a new set of code for each application that is developed, software engineers now often patch together existing libraries and packages for shared functions to generate much of the codebase that runs critical applications.

Like many noteworthy cyber incidents before it, the Log4j vulnerability helped us open our eyes to just how many software dependencies exist across enterprise systems — no matter if they are designed for security, operations, or sales. It also highlighted to us just how hard it is to mitigate and develop stopgaps for these vulnerabilities when they are so far-reaching and barely understood, especially in the early days of disclosure.

While the ability to utilize the same code across many systems does offer value in terms of time to market, the problem is that many prefabricated libraries and open-source projects are interdependent, resulting in a web of dependencies that drill down many layers. Inevitably, this creates a scenario where indirect dependencies that can be nearly impossible to identify and troubleshoot when a vulnerability is unearthed.

For the average Joe IT manager, this just means that the software you licensed was likely built using common third-party code you’re not even aware of that likely contains some vulnerabilities. Multiply this shared code across other enterprise systems in your stack – and queue the headaches.

Avoiding Issues Like Log4j as an End-User

Java is a programming language that’s been around for a while and is commonly found in older on-premises software. As such, it should not come as a surprise that the classic tech giants of the world wasted no time prioritizing the log4j vulnerability – they had billions of dollars in revenue at stake across their suites of legacy software. And to make matters worse, the issue didn’t just impact Java-based systems, but also Java components and development frameworks that rely on it including Apache Struts2, Apache Solr, Apache Druid, Apache Flink, ElasticSearch, Apache Kafka and many others. We’re talking about tens of millions of impacted systems in use at any given moment today.

How to avoid such widespread vulnerabilities is more than a question of choosing which apps are programmed with which language(s) – software engineers can debate the efficacy of each until they are blue in the face. Rather, it’s a question of how to consume enterprise software. For organizations more reliant on cloud native software-as-a service applications, IT employees almost certainly experienced fewer lost weekends dealing with the log4j problem.

This is because SaaS has a shared responsibility model, whereby both the vendor and the customer are responsible for the security of the application in use. The onus is on the SaaS vendor to deliver secure products and services, while the responsibility for configuring, managing, and using the product lies with the customer. In the case of Log4j, most of the heavy lifting falls on the SaaS vendor. They must ensure that their products are not affected. If they are, it is up to them to provide transparency into how the system is being patched and how the vulnerability is being mitigated.

While this differentiation seems simple, implementing a cloud-first IT strategy – no matter if universal or by function – can mean retaining IT talent by avoiding burnout, optimizing your IT budget by eliminating the need for third-party professional services, and so much more.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Actiphy Releases ActiveImage Protector 2022 Backup and Recovery Solution Featuring Direct-To-Cloud Backup and In-Cloud Recovery

Wildomar, CA — November 12, 2021, Actiphy Inc., a leading publisher of backup, disaster recovery, and virtualization software, announces the release of ActiveImage Protector 2022 featuring direct-to-cloud backup, in-cloud recovery, and a new agentless and agent-based hybrid licensing option.

This new version can now backup and restore directly to and from public cloud services and SFTP servers. With new In-Cloud Recovery, backup images can be restored as VMs in the cloud environment. New LTO Tape Support provides high speed backup of bulk data to high capacity tape storage solutions to ensure long-term archival stability. Point-in-time file and folder backup, a frequently requested feature, has been included in this release.

ActiveImage Protector 2022. On-Premise Strong, Cloud Stronger.

New Features

 

  • Direct-To-Cloud Backup
    Backup systems directly to cloud storage. Supported public cloud storage services include Amazon S3 and Azure as backup destinations. In addition, Direct-To-Cloud Backup also supports SFTP servers as backup destinations.

 

 

  • In-Cloud Recovery
    Any backup image can be restored directly to a virtual machine within the same cloud environment. In-Cloud Recovery offers an easy system migration of on-premise virtual or physical machines directly to cloud environments.

 

 

 

  • Actiphy Portal Service (APS)
    A powerful new on-line monitoring portal designed for Managed Service Providers (MSP), distributors and resellers. APS provides monitoring ActiveImage Protector (AIP) clients, collecting backup logs and generating reports of AIP clients’ task status.

 

 

  • LTO Tape Support
    Support for LTO as a backup destination. Backup data saved on tape can be physically isolated from ransomware attacks and ensures long-term archival stability.

 

 

 

  • File Backup
    A new file backup option providing granular point-in-time backup and restore of specific files and folders.

 

 

  • RescueBoot
    Adds an optional boot recovery environment to the system boot menu.

 

 

  • Disk-To-Disk Copy
    A new disk-to-disk copy option that supports virtual disks, physical disks, and volumes, for a complete sector by sector copy.

 

 

  • Offline Environment Activation Support
    With Actiphy Authentication Service (AAS) or a license file, ActiveImage Protector agents can be activated in an off-line environment.

 

 

  • iSCSI Target Server
    Utilize iSCSI targets and NFS exports to emulate backup images as virtual disk files for flexible and immediate recovery or migration.

 

 

  • Subscription License
    Annual, three-year, five-year subscription and perpetual licenses are now available.

 

 

  • Hybrid Licensing for Server Edition
    Selectable Agent-based or Agentless Backup licensing is now available for server edition.

 

 

  • Additional Linux Distributions Support
    ActiveImage Protector Linux edition now supports Ubuntu 18.04 LTS and 20.04 LTS, Debian 9/10/11, RedHat 8.4, Rocky Linux 8, Alma Linux 8 and Amazon Linux 2.

 

ActiveImage Protector 2022 is a backup and recovery solution that protects physical and virtual, Windows and Linux environments. The AIP solution includes all the tools necessary for enterprise level deployment and management of backup, recovery, standby switch-over, and migration.

Copyright © 2021 Actiphy, Inc. All rights reserved worldwide. All other brands and product names mentioned in this news release are trademarks or registered trademarks of their respective holders.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

Multifactor Authentication: How to benefit from this security strategy

Multi-factor authentication is a technological solution that aims to inhibit cyberattacks. In practice, this security strategy uses at least two types of mechanisms to identify an individual trying to access a certain system online.

The methods can involve knowledge factors, such as passwords; possession factors, such as totems; or inheritance factors, including fingerprint and facial recognition.

Do you want to learn more about it? Keep reading the article we have prepared.

Multi-factor authentication is an intelligent solution that protects from cyberattacks to individuals and businesses. 

This strategy is especially important these days, considering the significant increase in hacking attempts.

A survey done by Kaspersky, an organization specializing in security, and published on CNN Brasil‘s website, points to alarming numbers. According to the survey, in 2020, there was a 330% increase in cyberattack attempts. Altogether, more than 370 million corporate systems were hacked.

With the adoption of remote work by most companies during the covid-19 pandemic, their systems became more vulnerable to hacking. 

This has increased the need for technologies such as multi-factor authentication, as discussed in one of the topics below.

In this article, we explain what this feature is, its importance, and how to implement it, among other information. To make it easier for you to understand, it is divided into the following topics:

  • What is Multi-factor Authentication?
  • How Important is Multi-factor Authentication?
  • Are Companies Required to Use This Feature?
  • Two-factor Authentication and Multi-factor Authentication: What is the Difference?
  • Are Complex Passwords as Effective as MFA?
  • Digital Authentication Types
  • Methods Used in Attempts to Break MFA Security
  • Multi-factor Authentication and Remote Work

Keep reading and enjoy it!

  • What is Multi-factor Authentication?

Multi-factor Authentication (MFA) is a feature that inhibits attackers by putting together different mechanisms for user authentication. In this way, it guarantees the required security for data that could be accessed by the computing device, avoiding countless inconveniences and losses.

In practice, there must be a unique User ID that complies with PCI DSS Requirement 8.1.1, in addition to at least two of the three criteria outlined in PCI DSS Requirement 8.2. These are:

  • Knowledge factor: something the user knows, such as a password;
  • Possession factor: something they own, such as a token; and
  • Inheritance factor: something that relates to who they are, as in the case of biometrics.

For multi-factor authentication to work as it should, the mechanisms must be independent of each other. That is, if one of the factors grants access to the other, the desired security will be compromised.

  • How Important is Multi-factor Authentication?

Multi-factor authentication is a mechanism to combat data theft and cybercrime in general. For organizations, this protection is extremely important for several reasons.

It helps to avoid financial losses through theft and impact on productivity, as this type of occurrence can halt business operations.

In addition, it prevents the company from being exposed to legal proceedings arising from data leaks. 

This can occur, for example, by not complying with the General Data Protection Law (LGPD), which came into force on September 18th. This law requires companies to adopt a series of procedures in order to protect individual data. 

Failure to comply with the law can lead to administrative sanctions with eight different types of punishment, which include fines of up to R$50 million.

  • Are Companies Required to Use This Feature?

Multi-factor authentication is not a mandatory solution for all companies. However, its use is strongly advised for companies of any size or segment, after all, it combats a series of risks.

Also, individuals can benefit from this feature as they are also targeted by malicious actions such as cyberattacks.

For some audits, however, it is already a must, and it may no longer be optional in different contexts soon.

  • Two-factor Authentication and Multi-factor Authentication: What is the Difference?

Like multi-factor authentication, two-factor authentication (2FA) is intended to make it more difficult to hack an individual or legal entity’s accounts. Both require the user to use more than just a traditional password to log in.

The difference is that in two-factor authentication, the same method can be used more than once, such as a password and a security code, two factors of knowledge.

Multi-factor authentication is a more complex system, which requires at least two methods to allow access to a certain account. In practice, this means the individual will have to combine elements such as a password and the fingerprint scan. Note that we are talking, respectively, of a knowledge factor and an inheritance factor.

  • Are Complex Passwords as Effective as MFA?

Experts recommend using multi-factor authentication whenever a service provider offers this mechanism. 

That is because the MFA makes it possible to block 99.9% of automated bot attacks, and studies show its effectiveness in stopping malicious actions. 

According to Google, simply linking a phone number to the Google account as a way to recover passwords makes it possible to block up to 100% of automated bots, 99% of mass phishing attacks, and 66% of targeted attacks.

Using only a password as a security mechanism is already an inefficient action, however complex it can be, as hackers have access to increasingly sophisticated cyber tools and the number of breached accounts is shocking.

In contrast, using multi-factor authentication inhibits these intrusions because, in addition to the password, it is necessary to use an additional authentication method.

Furthermore, compromising MFA tokens is so expensive that it only generates interest in hackers who wish to gain access to exorbitant amounts.

  • Digital Authentication Types

There are numerous efficient ways to stop malicious online actions through digital authentication with different levels of complexity. In this topic, we cover the best known. Check them out:

  • Passwords: Passwords are the most common authentication mode. In order to fulfill their function and provide security, some services require compliance with criteria such as the minimum number of characters and the use of numbers or special characters.


  • Personal Information: Certain systems may request information from the user, such as the mother’s name, date or city of birth, and full name.


  • PIN: this is a code generated to identify the user of a website, for example. As mentioned earlier, this information is sent to a specific smartphone.


  • Token:  As a possession factor, the token is an item widely used by banks to generate passwords and prevent fraud. This method has the disadvantage of allowing shared access, which can reduce security, especially if not combined with another authentication mode.


  • Face Recognition: This highly advanced form of authentication can identify a person’s face through algorithms and software. First, the features are detected by a camera. Then, sizes, formats, proportions, and distances are analyzed. 

All this information is stored in a database and used for identification.

You might be asking yourself: what about when we get older or present ourselves with a different angle and lighting? In reality, this technology, which was limited before, has evolved more and more, and recognition in three dimensions is now possible.

In addition, the camera captures the shape of the user’s head, precisely to identify their features, regardless of the angle they are at.

 

  • Voice Recognition: There are certain applications to identify users’ voices. Audios are split into bits, converted into digital format, and transformed into text.

Voice recognition fulfills its purpose by analyzing intonation, pronunciation, and vocabulary, among other characteristics of the user’s speech. Its weakness lies in contemplating accents and changes in voice tone, for example.

 

  • Fingerprint: This form of authentication is very common among inheritance factors. It consists of the unique pattern each person has at their fingertips and can differentiate them from others.

 

No type of digital authentication is 100% secure if applied alone. For this reason, multi-factor authentication is strongly recommended.

  • Methods Used in Attempts to Break MFA Security

Multi-factor authentication is widely used by companies to prevent attacks. However, not even this mechanism, with all its complexity and effectiveness, guarantees 100% protection. Here are some methods used by hackers to breach your security:

  • Disabling the MFA

Malicious users can change settings in order to disable the multi-factor authentication application. That way, they do not need to go through a second authentication step when connecting.

  • Bypassing Multi-factor Authentication

In this case, the hacker applies techniques that allow access without MFA. They can do this in two ways: by controlling a maliciously downloaded, user-authenticated application, or by taking advantage of some multi-factor authentication vulnerability.

The possibility of intercepting an SMS message with the authentication code is an example.

  • Taking Advantage of Authorized MFA Exceptions

This happens when the malicious agent finds accounts operating without the MFA’s criteria. They take advantage of legacy applications that do not provide this protection mechanism. This is the case with POP/SMTP email servers.

  • Stealing SAML Signing Certificate

This technique is well known and very difficult to detect. It consists of stealing the private key or having a forged key for signing certificates and shows how important it is to have constant monitoring. 

  • Reusing a Session

It is possible to compromise a system with an authenticated session because most MFA features default to a 30-day timeframe to require re-authentication of a user, system, or application. This leaves enough time to access an account.

  • Multi-factor Authentication and Remote Work

The use of multi-factor authentication has become more urgent with the covid-19 pandemic. This is because most organizations had to adapt to a home office mode, with employees accessing the systems from any environment and device.

According to this publication, 90% of companies operating in Brazil have adopted remote work due to covid-19. Also, many will maintain this working mode even after the end of the pandemic.

This new condition brought vulnerability to companies, as it facilitated the actions of malicious individuals.

In this article, you have seen what multi-factor authentication is and its importance to individuals and corporations. If our content has answered your questions, please share it with others who are also interested in the subject.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

CyberLink to Showcase Smart Retail Solutions at NRF 2022

Taipei, Taiwan — January 14, 2021 — CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, will showcase new, contactless smart retail solutions. This solution is powered by its market-leading FaceMe® engine running on the Qualcomm® QCS6125 multimedia processor at NRF 2022 in New York. FaceMe® will be featured at Qualcomm Technologies booth #1411, in the Javits Convention Center, January 16-18, 2022. FaceMe® is one of the world’s top facial recognition engines, with edge-based, optimized architecture delivering precise biometric data in a few milliseconds with up to 99.82% accuracy, and is top-ranked in NIST FRVT (Facial Recognition Vendor Test). Qualcomm® QCS6125 multimedia processor delivers integrated heterogenous compute capabilities to provide optimized Edge AI performance in addition to robust security core for secure biometrics processing. FaceMe® offers cross-platform capabilities on Windows, Linux, Android and iOS, for a variety of edge devices and different hardware configurations, which makes it an ideal solution for smart retail, from kiosks and POS, to personalized shopping, digital signage and statistics. FaceMe® offers a broad and growing set of features and tools that redefine accuracy, performance, security, and flexibility standards for a wide range of industries. Since the launch of FaceMe® in 2018, CyberLink has collaborated with over a hundred global partners, including hardware makers, solution providers, and system integrators, deploying its technology across multiple scenarios. “Working hand in hand with Qualcomm Technologies, CyberLink is leveraging both companies’ technologies to enable a wide range of new user experiences, as demonstrated for retail at NRF,” said Dr. Jau Huang, Chairman and CEO of CyberLink. “Our continued collaboration with Qualcomm Technologies has been integral in making CyberLink’s FaceMe® solution the most advanced biometric access technology in the market. We look forward to having NRF attendees visit the Qualcomm Technologies booth to see FaceMe in action.” “Qualcomm Technologies is pleased to work closely with Cyberlink to drive next-generation biometric solutions and we look forward to showcasing the FaceMe® demonstration at NRF,” said Ketal Gandhi, Director, Business Development, Qualcomm Technologies, Inc. “We have worked collaboratively with CyberLink to support pre-integration capabilities to enable customers and our ecosystem to save time on their development and accelerate the go-to-market timeline for their applications in Retail such as Biometrics Payment, Access Control, Loyalty and more.” CyberLink is inviting NRF visitors to stop by Qualcomm Technologies’ booth to see some exciting results of this collaboration, including its application into POS solutions from Ordyx. Ordyx will introduce a complete POS system accessed by facial recognition for both cashiers and opted-in customers who desire to pay using their face. This new system leverages FaceMe® facial recognition and the Qualcomm QCS6125 solution to create a secure, fast and convenient new experience for customers. Come meet the FaceMe® team and find out about the latest developments in AI and facial recognition. NRF 2022 Information Time: Jan 16 – 18, 2022 Venue: Javits Convention Center Booth Info: #1411 (Qualcomm Technologies’ Booth)

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

New content inspection and classification in Safetica ONE has arrived for macOS

Minor release of Safetica ONE 10.1 brings advanced content inspection with OCR for macOS and gets further enhancements. This version is also ready to be integrated with Netwrix Data Classification.

Now on macOS

New, efficient and less intrusive content inspection with smart pre-scanning and OCR features in Safetica ONE (see details in 10.0 release blog post) has arrived for endpoints with macOS. Organizations with macOS devices in their IT environment can now inspect content that leaves endpoints through specific channels. Safetica ONE monitors selected channels and logs sensitive data in DLP logs (reports).

Better stability and performance

In general, content inspection in Safetica ONE has additional improvements in stability and performance. One of the main components of content inspection is OCR (Optical Character Recognition), which helps to identify sensitive data in images and scanned PDF documents. In this release we are adding a new settings option to deactivate OCR on selected endpoints. This can be useful when there are very slow performing/low-specs computers in a customer’s environment.

Improved UX, layouts, metadata security and other changes

Improvements in the UX for sensitive data discovery in Safetica Management Console makes it easy to run discovery tasks on all local drives and scan them on-demand.

We also revised the layout for data discovery results to enable further compatibility with Netwrix Data Classification. The individual data categories in the data discovery results or detected in file and DLP logs can be now visualized in new charts, in order to provide a super-fast way to understand what kind of data are stored in or moving through your environment.

 

Besides content classification, Safetica ONE also allows a user-based or context classification approach that requires permanent metadata. The results of classification are saved in files’ metadata so that DLP policies are reliably enforced. In this release, we introduced protection that prevents users from manually removing metadata from classified files.

Our team is continually improving and expanding the templates that facilitate sensitive data discovery and classification. From now on you can use new templates for Brazilian Identity card numbers and JAR social identification numbers.

We also improved Windows security compatibility (Device Guard, Credential Guard, Memory Isolation), Active Directory sync optimizations and some website categorization technology improvements.

First results of Netwrix partnership: Improved data discovery

The strategic partnership with Netwrix announced in November 2021 has shown its first results. Netwrix customers can leverage the same data classification rules across their network/cloud storage and now also on endpoints. The new partnership also brings them DLP and insider threat protection features. We’re working on further integration, which will also bring additional options to the Safetica customer base.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×