Skip to content

SafeDNS Integration Types: Which One is Right for Your Business?

When it comes to protecting your organization from cyber threats, integrating SafeDNS is a must. However, with so many integration types available, it can be overwhelming to choose the right one for your organization. In this article, we’ll explore the top SafeDNS integration types and what they entail to help you make an informed decision.

IP Addresses / DynDNS: Simple Setup

Using IP addresses or Dynamic DNS (DynDNS) hostname is a straightforward integration method. By simply setting the DNS server IP addresses on your network devices or configuring the DynDNS service to use SafeDNS, you can ensure all your network devices are protected. This integration is compatible with both IPv4 and IPv6, making it a versatile solution for businesses of all sizes.

DD Client: Hassle-Free SafeDNS Integration for Dynamic IP Addresses

Organizations with dynamic IP addresses can benefit from a DD Client integration. The DD Client is a SafeDNS feature that allows businesses with dynamic IP addresses to ensure their filtering policies remain active even when their IP address changes. The DD Client transmits the client’s IP address to the SafeDNS dashboard but does not change DNS settings itself. To ensure that SafeDNS filtering is applied correctly, DNS settings must be changed manually on each device.

Agents: Customizable Internet Access Control with SafeDNS

For businesses with a large number of users or devices, an Agents integration is an efficient option. By installing software agents on each device, you can apply policies on a per-user basis. The agent supports installation through silent keys, allowing for quick and easy installation on a large number of devices using a script. This is useful for organizations with different departments or user roles that require different levels of internet access.

VPN Integration: for Devices without the Agent

If some devices cannot have the SafeDNS Agent installed, VPN integration can be used instead. OpenVPN creates a VPN tunnel using the SafeDNS configuration file, ensuring all DNS queries are filtered through SafeDNS. Unlike regular VPN services, OpenVPN does not change or hide your public IP. It only receives filtering rules from your dashboard, ensuring you stay connected while maintaining high levels of security.

NAT DNS: Comprehensive SafeDNS Protection for Large Networks

Network Address Translation or NAT DNS is a SafeDNS feature frequently used in corporate networks. It enables different filtering policies for networking hardware, such as routers and gateways, behind NAT with a single public IP. This technology allows businesses to secure their local networks, decrease the number of static IPs, prevent unwanted external access to local hosts, and manage filtering policies for all devices connected to the network, regardless of their location.

In conclusion, choosing the right SafeDNS integration type can improve the security and efficiency of your organization’s internet access. Consider the size of your organization, the number of devices you have, and the level of security required when selecting the right integration type for your needs.


Start using SafeDNS for free

Take advantage of the SafeDNS trial period and try all the best features

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SafeDNS
SafeDNS breathes to make the internet safer for people all over the world with solutions ranging from AI & ML-powered web filtering, cybersecurity to threat intelligence. Moreover, we strive to create the next generation of safer and more affordable web filtering products. Endlessly working to improve our users’ online protection, SafeDNS has also launched an innovative system powered by continuous machine learning and user behavior analytics to detect botnets and malicious websites.

Asset inventory is foundational to security programs

Think of the technological ecosystem an organization relies on to operate efficiently and effectively: desktop workstations, mobile devices, IT/IoT/OT devices, virtual systems, web apps, data, cloud infrastructure–just to name a few. Keeping track of every single one of these devices feels impossible.

As the number and types of assets continue to grow exponentially, organizations need help staying on top of these devices. Left unmanaged, these devices can act as potential footholds for malicious actors. Security teams need to be able to discover and identify unmanaged assets if they ever want to secure or protect them. How could they effectively secure and protect their organization if there are assets they don’t know about–what they do, where they are, or what their status is?

 

Cybersecurity frameworks and regulations start with a comprehensive asset inventory

Asset inventory is the foundation of a strong cybersecurity posture. It is often considered the first step in identifying potential risks to your organization’s security. This is why it is a key recommendation in many cybersecurity frameworks, including the NIST Cybersecurity Framework (CSF) and CIS Controls. By maintaining an up-to-date inventory of all hardware, software, users, and digital assets across your organization, you can better understand your attack surface and take proactive measures to protect against potential threats.

Let’s take a look at some of the major frameworks and regulations that require an asset inventory.

CIS Controls

The Center for Internet Security (CIS) provides a list of recognized standards for defending your systems and data against modern cyber threats. Cybersecurity professionals and subject matter experts use a consensus-based process to establish these controls. Organizations such as ISC2 and the SANS Institute contribute to the process.

You can consider the CIS Controls an essential safety check that ensures you have your house in order by following security best practices. It speaks volumes that the first control on the list, seen as foundational for good cyber hygiene, is “Inventory and Control of Enterprise Assets.” The rationale is that you need an up-to-date inventory to know what to monitor and protect within the enterprise. An asset inventory also helps you identify unauthorized and unmanaged assets to remove or remediate.

NIST CSF

The NIST Cybersecurity Framework (NIST CSF) is a set of cybersecurity guidelines developed by a non-regulatory agency of the United States government. The NIST CSF is about guidance and best practices with a framework centered around five core functions: Identify, Protect, Detect, Respond, and Recover.

It’s in the Identify function of this framework that asset inventories get flagged as vital for modern cybersecurity programs. According to the framework, the Identify function is all about “risk to systems, people, assets, data, and capabilities.” A big part of this is knowing what assets you actually have.

SOC2

SOC2 is a voluntary compliance standard, but it’s often required to land vendor contracts, particularly with SaaS and B2B companies. Compliance with SOC2 shows clients and partners that your company maintains the highest standards of information security. Meeting SOC2 requirements can make all the difference in whether you succeed in various industries and types of services.

Effective IT asset management is pivotal for obtaining SOC2 certification. In particular, the certification looks for your ability to safeguard assets against unauthorized access and reliably assign owners and users to assets.

HIPAA

Compliance with the Health Insurance Portability and Accountability Act (HIPAA) is essential in the healthcare industry. High standards of security must protect sensitive patient healthcare information. Violations of HIPAA are costly from a financial standpoint, and the penalty involved depends on the level of negligence.

Healthcare providers and business associates need IT asset inventories in order to track the location of electronic health information (ePHI). This reliable, up-to-date asset inventory helps comply with the regulation’s Security Rule.

PCI DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a mandatory regulation aimed at protecting cardholder data. Companies that store, process, or transmit cardholder data must comply with PCI DSS. In requirement 2.4 of PCI DSS, the regulation requires companies to maintain an inventory of physical devices, software, user accounts, and more.

The elusive single-source-of-truth for assets

An asset inventory is like the blueprint of a house–without it, there isn’t a clear understanding of what needs protecting. But just like how blueprints can change over time with additions and renovations, an inventory can also become outdated as assets get added or removed from the network.

Networks change constantly, with users logging into enterprise platforms from personal devices or rapidly spinning up new cloud infrastructure that often gets forgotten about. Unsanctioned shadow applications get stood up or accessed by different departments. Add remote work and the continued proliferation of IoT devices to the mix, and you have a more complex IT ecosystem that’s harder to track than ever.

A couple of statistics that drive home the challenges include:

  • Shadow IT cloud usage is estimated to be 10x the size of known cloud usage.
  • One survey found just 28 percent of companies thought their asset inventories were more than 75 percent complete.

Why do asset inventories pose such a challenge for so many organizations? Part of the challenge is that many companies use outdated processes, like spreadsheets, for tracking and managing their cyber assets. As a result, gaps in visibility emerge regularly in today’s dynamic IT ecosystems and risky security scenarios are commonplace. For these reasons, it’s crucial to have a system in place that allows for continuous discovery and monitoring of assets.

The risks of not having an accurate asset inventory

If you’re not proactively maintaining and analyzing your asset inventory, you’re putting your organization at risk. An up-to-date and comprehensive asset inventory is essential for you to make informed business decisions and ensure operational efficiency. Let’s take a look at some of the common issues you’ll encounter when your asset inventory is lacking.

Issue 1: Misalignment between IT and security teams

IT and security teams end up counting different numbers of assets, depending on how they track and update their inventories. This makes it hard to discern the truth of what your IT ecosystem looks like and reduce risks.

Issue 2: Weak security controls coverage

Given the lack of a single source of truth, gaps are more likely to arise in security control coverage. Different teams take responsibility for various areas of security. If these teams lack alignment you’ll end up with a lack of visibility into security controls coverage, leaving you unaware of:

  • Endpoints not covered by an endpoint detection and response solution (EDR), such as CrowdStrike.
  • Missing hosts from the SIEM tools used by security operations teams to correlate events and proactively respond to more advanced threats.

Issue 3: Failure to manage risky assets

An asset inventory is crucial for identifying and responding to security risks. Not all assets pose the same level of risk, and a comprehensive inventory helps to identify those that do. For example, an isolated device with encrypted traffic may be less risky than an internet-facing asset with insecure configurations. By keeping track of all assets, organizations can respond quickly to zero-day vulnerabilities that require immediate attention. For example, the Log4 vulnerability affected up to 3 billion devices, highlighting the importance of maintaining an up-to-date inventory for efficient vulnerability response.

Issue 4: Lack of asset ownership

Asset ownership is a critical component of asset inventory, as it defines who is responsible for managing and securing each asset. The Equifax breach serves as a prime example of the consequences of not having proper asset ownership in place–without clear ownership over a legacy internet-facing system, no one took responsibility for ensuring that it was scanned and patched regularly. To avoid similar incidents, organizations must prioritize establishing clear lines of asset ownership and incorporating them into their overall security program.

Build the foundation for your security program

Given the modern threat landscape and the fluid nature of IT environments, organizations must regard an accurate and up-to-date asset inventory as a basic tenet of an effective security program. Given the challenges and risks involved, it’s time to move on from manual processes that provide point-in-time static snapshots that often don’t resemble the true state of your network.

Take the first step towards improving your security posture by moving to cyber asset management solutions that can keep pace with the assets connected to your network. A truly effective cyber asset management solution offers advanced fingerprinting techniques and leverages asset data from multiple sources to provide a comprehensive view of your asset inventory–from IT to OT devices, on-premise to cloud to remote environments.

How runZero can help

runZero can help you to gain visibility into all the assets connected to your network, so you can proactively defend against cyber threats. First, you can identify all the assets connected to your network, including those that may have been forgotten or overlooked. Second, you can track changes made to these assets over time. Third, you can assess the risk associated with each asset and prioritize remediation efforts accordingly. As a result, you can improve your organization’s overall security posture by having a complete understanding of your asset inventory.

Ready to take the next step? runZero is the fastest and easiest way to get to full asset inventory across IT, OT, on-premise, cloud, and remote environments.

Build your asset inventory in minutes

runZero is a cyber asset management solution that delivers full cyber asset inventory–quickly, easily, and safely. The solution enriches existing IT & security infrastructure data–from vuln scanners, EDRs, and cloud service providers–with detailed asset and network data from a purpose-built unauthenticated active scanner. No credentials required. Just deploy an Explorer and start scanning.

Get runZero for free

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Data Security in the Age of Remote Work: How to Keep Your Business Safe

How should you set up your security policies for your employees working from home? What are the potential culprits of a remote workforce? And is BYOD putting your organization at unnecessary risk of a data breach? Some love it, and some hate it, but there’s no use turning a blind eye to the massive surge in the number of employees working from home.

Ever since covid turned the world upside down in 2020, working remotely became the norm… and a new threat to data security. Covid-19 sent employees packing (to their home offices). Across the globe, workers have been working from home, but not every company has managed to keep up with the security policy department.

Based on the 2022 Verizon Data Breach Investigations Report, 82% of all data breaches involve the human element. You probably know all too well by now how hard it is to keep those humans in check (security-wise), even if they’re all in the same building. But making sure everyone is being safe when they’re out of sight? Are you sure your work-from-home guidelines for employees are up to date?

With 8 in 10 people working either in a fully remote or hybrid environment (and the numbers are expected to rise, based on a 2022 AT&T study), figuring out and maintaining a work-from-home policy is not just important; it’s critical to any organization’s security.

 These are the top things to keep in mind if your organization employs remote workers: 

What are the security risks of working from home?

First of all, let’s be clear about one thing: It’s called “work from home”, but unless you are specifically restricting your employees from working outside of their residence, they could be all over the place: from a cafe downtown to a beach on the other side of the world.

That requires smarter planning, stronger policies, and better communication with employees on your part.

Remote work poses a wide variety of cybersecurity risks due to all the potential scenarios and versions of remote work. Some potential considerations:

  • Without an IT department in the office next door, your remote worker may struggle with their limited IT skills.
  • What type of networks are your employees connecting to? Are they using public wifi?
  • Are you providing hardware for remote workers, or are they using their own devices?
  • Is your infrastructure cloud-based to allow for a more functional work-from-home solution?
  • What are your employees’ work habits? Could they be endangering your data with their behavior? 

The question is: How can you protect my organization from external cyber-attacks and the negligence of employees without making it difficult for your employees?

Because if it’s difficult, hard to understand, and tedious, your employees won’t adhere to your security policies.

The most important work-from-home security policies

Which security you set up for your organization will depend on your specific circumstances. But you don’t need to reinvent the wheel.

There are numerous regulations already in existence that your organization may or may not need to comply with that already specify the most important remote work policies.

You can also use ISO 27001, a major guideline for the establishment of an effective information security management system, to set up the best possible data security policy for your organization. Learn more about ISO 27001

Some areas that will always need to be addressed are:

Securing networks

It can be as simple as making sure that your employees’ home wifi router isn’t still on the default password and insisting they never use public wifi when connecting to your organization’s systems unless they use your organization’s VPN (a virtual private network).

A VPN will encrypt data being sent and received, preventing data leaks. It’s like a disguise for your employees’ online identity and your sensitive data.


Multi-factor authentication

Enforce a strong password policy and require changing passwords periodically, but don’t stop there. Have your employees use two-factor authentication to log onto your organization’s systems as an extra layer of protection.

This can be anything from utilizing single-use passwords to using biometrics.

Two-factor authentication can dramatically reduce the success of phishing and malware attacks since they often rely on stealing information such as passwords to infiltrate a system.

Have you heard of Zero Trust? The Zero Trust Approach is an evolving data loss protection model based on the need to authenticate and authorize any access to the network because trust is not assumed even if it has already been granted. It’s a great tool that can help you set up your authentication requirements.


Encryption

Encryption means that data from emails and documents is encoded, and only authorized parties can access and decipher it.

Sure, every device has an encryption option (but is it turned on?), but you can also implement data encryption software to protect your organization. Encryption is also used to protect sensitive data that is transferred between employee devices and company servers.

Using a VPN will encrypt data going to and from your remote worker through the internet.


Up-to-date software and security systems

Make sure all of your employees working from home have up-to-date firewalls, software, and security systems on all of their devices. You want all security patches to be activated as soon as they come out so that any vulnerabilities in the system are managed.

This can be harder to achieve in the BYOD (bring your own device) model. More on that is below.


Communication and support

Provide clear channels of communication. Educate your employees on how to report any suspicious online activity. Instruct them on how to spot a phishing attempt or security breach. Do your work-from-home employees know who to talk to in case a security issue comes up? Have someone within each team act as the go-to contact and provide guidelines for what types of issues should be reported.


Safe behavior

Talk to your employees about safe behavior – Are they working in an environment where people can easily see their screens? Do they know not to share sensitive information over messaging systems or on social media? Are they doing enough to prevent hardware theft?


Dedicated DLP Systems

Dedicated DLP (data loss prevention) systems such as Safetica’s solutions use a centralized and automated system to monitor and report on everything happening in an organization’s cybersecurity landscape – on-site or off. You will feel more secure knowing that no matter where your employees are, your organization’s sensitive data will remain safe.

Dedicated DLP vs Integrated DLP: Which one makes sense for your organization?

How to explain and enforce security guidelines

For in-house employees, you can use things like posters and LED visuals to spread security messages around the office. You’re also more likely to see questionable behavior or notice the need to distribute that new security brochure you spent too long putting together.

For work-from-home employees, out of sight and literally off-site equals fewer possibilities to have any physical effect on the people you work with. You’ll need to think out of the box and remember that it’s much easier to forget about policies (even if it’s by accident) when you aren’t in the office.

Learn more about educating your employees about data security.

school 

Simply put, in order to maintain awareness, you need to keep your policies easy to understand, easy to implement, and easy to remember. And for remote workers also easy to find in the first place.

Since practice makes perfect, everyone in the organization can benefit from a friendly reminder from time to time. Can you plan an email campaign to explain one security rule every two weeks simply? Have team leaders lead by example (that means higher management, too!), and make data security a topic in regular meetings.

To get the word out, get personal and KISS! Emails and passive messages are great as refreshers, but your employees to really hear you and not just scan the security checklist you send them; they need to hear it from the horse’s mouth.

All policies look great on paper (even the digital kind), but they make a much bigger impact during a live video presentation by the IT Director or even CEO – you are letting your work-from-home employees attend important meetings online, right? If it’s just George, the IT guy hounding them in yet another Slack message, he’ll barely be heard.

So keep it short and simple (KISS!), but make it count.  

Specifics of BYOD when working from home

If your remote employees use computers and other devices that your organization provides to them, you are able to make sure that all equipment and software comply with company standards and policies.

But what about BYOD? If employees use their own devices, your work-from-home guidelines for employees will need to:

  • Specify approved devices
  • Separate personal and company data
  • Plan for ongoing maintenance and updates of all devices
  • Set restrictions on what can and cannot be installed on the device
  • Consider potential legal issues/difficult data retrieval
  • Explain ownership expectations and procedures upon an employee’s termination

While BYOD has obvious advantages, such as reduced costs and potentially greater mobility, it also poses a greater security risk for your organization. 

  Let’s talk about data security

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

March 2023: What’s New?

“What’s New?” is a series of blog posts covering recent changes to Comet in more detail. This article covers the latest changes in Comet Voyager over March 2023.

There were just three Comet software releases during March – two in the 23.3.x Voyager release series, plus one minor patch update 23.2.1 for our quarterly “Leda” release track.

We’ve landed a few large and exciting features this March:

S3 Object Lock

Comet 23.3.1 adds support for Object Lock on S3. This feature allows Comet to “lock” an object inside a S3-compatible bucket, preventing it from being deleted or modified for a fixed period of time.

This is a fantastic new capability for Comet and it is a key defense against ransomware. Comet generally requires the capability to add and delete files within your Storage location; deleting files is necessary for applying retention passes, updating index files, and coordinating locking across multiple devices. However, if malware is running on your PC and manages to intercept Comet’s storage credentials, the malware would also be able to delete files, causing much wider havoc.

Comet uses S3 “Compliance Mode” to lock individual objects within the storage location. This ensures that there is no way for the object to be deleted for the specified time, not using Comet’s storage credentials, nor even if your administrator S3 keys are leaked or exposed.

For a visual overview of the process, please see our usage guide and also the simplified explanation.

This feature is available for Amazon S3, Wasabi, IDrive (excluding Storage Template provisioning), and other S3-compatible providers including Minio-based providers. Please check with your S3-compatible provider’s documentation to see if Object Lock is available.

Object Lock is an opt-in feature, both in Comet and with cloud storage providers. It also relies on S3 bucket versioning. These properties generally must be set when the S3 bucket is created for the first time. It is not generally possible to enable Object Lock on an existing S3 bucket. To use Object Lock with an existing S3-based Storage Vault, you would have to create a new S3 bucket with Object Lock enabled; migrate the data; and update Comet’s Storage Vault settings to point to the updated bucket.

Comparison to Backblaze B2

Regular users of Comet may be aware of the existing “Hide files rather than deleting them” option for Backblaze B2. Backblaze B2 supports both a native API and also an S3-compatible layer over the native API. Comet Backup integrates with the native API, so the new S3 Object Lock feature is not available for use with Backblaze B2. However, the existing “Hide files instead of deleting them” option can be used to provide the same protection against ransomware.

Codesigning with Azure Key Vault

If you are customizing the branding of the Comet Backup desktop app, then we would recommend setting up codesigning certificates. Having a codesigning certificate means that installing Comet Backup proceeds more smoothly through Smartscreen and Antivirus popup warnings on Windows, and through Gatekeeper on macOS.

The Windows codesigning programme, “Authenticode”, is currently in a period of disruption as new rules are being put in place. Owing to the high number of events where developer codesigning certificate files were leaked or lost, new requirements are being enforced from June 1st 2023 that newly issued codesigning certificates must no longer be stored as plain files on disk, but instead must be stored in a Hardware Security Module (“HSM”) or equivalent isolated device. Comet has long supported Authenticode certificates using either certificate files (“PKCS #12”), or via plug-in HSM devices that are compatible with the “PKCS #11” standard.

There are two tiers of Authenticode available. The Extended Validation (“EV”) service performs a deeper level of business-level and legal checks of the target organization before issuing the certificate. The extra vetting comes with a higher purchase cost, but it also results in a higher level of initial reputation for the resulting codesigned .exe file. An EV certificate was always required to be stored on an HSM.

However, it’s common to install Comet Server on a cloud VM or VPS, where plugging in a USB dongle or smartcard hardware device is not physically possible. This difficulty also discouraged many MSPs from using the higher-quality Extended Validation service. With the impending phaseout of the file-based method for newly issued certificates, neither existing option is suitable, so another option had to be found.

Comet 23.3.0 adds support for codesigning using Azure Key Vault. This is a cloud service from Microsoft to manage the secure provisioning of security keys and certificates, including for Authenticode codesigning. There are various services and pricing tiers available; in particular, it’s possible to purchase a managed cloud HSM, which meets the new June 1st 2023 Authenticode requirements.

At the time of writing, we would recommend GlobalSign or TrustZone for issuing new Authenticode certificates. There is no carry-over reputation with Authenticode, so replacement certificates can be issued from any provider. These particular providers were prepared early for the new requirements and have a secure vetting process to prove your use of an HSM, such as an Azure Key Vault managed HSM, before issuing your certificate. The private key never leaves the managed cloud HSM device, and Comet Server only uses an Azure application ID to remotely perform the signing steps.

Comet Server can perform Authenticode codesigning for Windows, regardless of whether Comet Server is installed on a Windows or Linux host OS. This is achieved by using a cross-platform signing toolchain. To support the new Azure Key Vault feature, we replaced our existing bundled codesigning toolchain from osslsigncode with a new jsign version. Comet ships these third-party utilities as a courtesy in compliance with their redistribution license.

For most existing users of codesigning with a PKCS#12 file-based certificate on disk, there will be no noticeable difference and Comet will continue to work without any configuration changes. However, some users may experience breaking changes:

  • The new jsign program takes different parameters for hardware devices using the PKCS#11 standard, which could not be automatically converted. Users of hardware devices may need to revisit their settings.
  • If Comet Server is installed on ARM64 Linux, the version of jsign distributed by Comet is not compatible with the musl C runtime generally used for static binary distribution. A glibc-based Linux distribution is now required to run the codesigning toolchain on ARM64 Linux. The issue does not apply to x86_64 Linux. We may be able to resolve this issue in a future version of Comet.

For more information, see the full Authenticode codesigning documentation.

New web interface features

Looking beyond these headline features, there have been many more improvements to Comet this month, particularly in the Comet Server web interface.

It’s now possible to select custom snapshots for deletion from the web restore dialog. This builds upon last month’s feature to add this in the Comet Backup desktop app. To use this feature, enable “Advanced Options” from the top-right user menu, and then click the new Actions button in the Restore wizard dialog.

You can now see an online device’s software version, OS platform, and IP address directly on the User Detail page in the Comet Server web interface. This was a minor feature request on our Feature Voting page. To view these new columns, click the “View” button to configure which columns are displayed. Your custom column selection is preserved for this browser throughout multiple page views, but your custom column selection will be reset when a new version of Comet Server is released.

If your Comet Server is configured to show software downloads to logged-out users, the login screen has expanded the number of download options from three (Windows, macOS, and Linux) to four with the new Synology download button. This fixes a minor inconsistency with the web interface as this fourth platform should be shown in the same context as the other three platforms.

There have been many cosmetic improvements to the Comet Server web interface too, including better spacing and padding when configuring an Office 365 Protected Item or a Windows System Backup Protected Item. We regularly make small improvements like this, but this month, we’ve also been working on a much more major cosmetic change for the Comet Server web interface. We will be able to share more information about that soon.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Critical Infrastructure’s Silent Threat: Part 3 – Protecting PLCs and Their Environment

Part 3: Protecting PLCs and Their Environment

For many years, PLCs have been insecure by design. Several years into customizing and applying best practices from IT gave rise to secure protocols, encrypted communications, network segmentation, and so on. However, PLCs programming is still done without security in mind.

PLC secure coding practices leverage natively available functionality in the PLC. Implementing these practices requires little to no extra hardware or software. They can be incorporated into the typical PLC operating and programming workflow. The implementation requires security expertise and solid knowledge of the PLCs that need to be safeguarded, their logic, and the underlying process.

Continue reading
×

Hello!

Click one of our contacts below to chat on WhatsApp

×