Skip to content

Keepit at Gartner IT Symposium/Xpo: How to rapidly recover critical cloud data no matter what

Keepit and Baptist Health to present at Gartner on how next-level SaaS data protection revolutionizes healthcare compliance 

COPENHAGEN, DENMARK, Oct. 11, 2023 – Keepit, the market leader in cloud data protection and management, today announced that it will be presenting and exhibiting at the Gartner IT Symposium/Xpo™ 2023 conference taking place from October 16 to October 19 in Orlando, Florida.

At the Symposium, the Keepit team will be sharing the latest insights on how to mitigate the impact of ransomware attacks by ensuring fast and complete recovery for enterprises. Research shows that a strong backup and recovery strategy can mean the difference between organizations being able to ignore extortionists and having to succumb to paying ransom again and again.

And on Tuesday, October 17, Keepit’s Senior Director of Product and Microsoft MVP Paul Robichaux will co-present with Ryan Hooley, Senior Director of Enterprise Architecture at Baptist Health, in a session titled, “Keepit: From On-Prem to Cloud – How to Revolutionize Healthcare Compliance.”

Session attendees will learn how healthcare compliance affects backup and recovery requirements and get insights into the data security and sovereignty issues that must be addressed when migrating from on-prem to cloud. Additionally, attendees will learn how Baptist Health’s collaboration with Keepit’s cloud-native solution helped to ensure patient data protection while navigating this transition.

The Gartner IT Symposium/Xpo™ 2023 will be held at the Walt Disney World Swan and Dolphin Resort. The conference provides an opportunity for information technology (IT) and cybersecurity executives to explore the technology, insights, and trends shaping the future of IT and business while getting expert guidance on best practices to define and validate IT strategies. Attendees will gain real-world insights of how to execute on key initiatives. Topics covered will include accelerating business transformation, cybersecurity, customer experience, data analytics, executive leadership, and the impact of generative artificial intelligence (AI) on every industry and job role.

WHAT: Speaker session: “Keepit: From On-Prem to Cloud – How to Revolutionize Healthcare Compliance”

WHO: Keepit’s Senior Director of Product and Microsoft MVP Paul Robichaux and Ryan Hooley, senior director of Enterprise Architecture at Baptist Health

WHERE: Swan Ballroom 4

WHEN: Tuesday 17, 3:45pm EST

REGISTRATION: https://www.gartner.com/en/conferences/na/symposium-us/register

Keepit will be exhibiting for the duration of the conference at booth #349.

To arrange a product demonstration or meeting with a member of the Keepit team at the conference, book a meeting here.

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

A Look at the Top Application Security Challenges Heading into 2024

In the ever-evolving landscape of cybersecurity, corporations are facing an unprecedented array of challenges when it comes to protecting their applications. As technology advances at an exponential pace, so do the tactics employed by malicious actors. In this age of digital transformation, applications have become the lifeblood of businesses, making application security a paramount concern.

In this article, we delve into the top application security issues facing corporations today and outline what IT security teams should focus on to bolster their application security for the year 2024. As we explore these challenges, it becomes clear that vigilance, innovation, and collaboration are essential to safeguarding the future of business operations.

The Evolving Threat Landscape

The first and most fundamental challenge in application security is keeping up with the evolving threat landscape. Cyberattacks have grown in sophistication, often outpacing traditional security measures. In 2024, we can expect even more advanced tactics to emerge – some an evolution of existing types of attacks, and others completely novel:

  • Advanced Persistent Threats (APTs): APTs are complex, targeted attacks that can go undetected for extended periods. They often involve social engineering, zero-day vulnerabilities, and multi-stage attacks. Corporations must anticipate APTs and employ proactive security measures such as threat hunting and anomaly detection.
  • Ransomware: Ransomware attacks continue to plague organizations. Attackers are increasingly sophisticated, demanding larger ransoms and exfiltrating data. Companies must invest in robust backup systems, employee training, and threat intelligence to combat this menace.
  • Supply Chain Attacks: Attackers are targeting supply chains to infiltrate organizations indirectly. Companies should thoroughly vet their third-party vendors, assess their security practices, and establish clear security requirements.
  • AI-Enhanced Attacks: As artificial intelligence (AI) becomes more prevalent, cybercriminals will harness its power to automate attacks and bypass traditional security measures. Corporations need AI-driven security tools to counter these threats.
  • Zero-Day Vulnerabilities: New vulnerabilities are discovered all the time, and attackers are quick to exploit them. Corporations should prioritize timely patch management, vulnerability assessments, and threat intelligence feeds.

The Human Factor

While technology plays a significant role in application security, the human factor remains a critical concern. Employees are often the weakest link in an organization’s security posture. In 2024, corporations should focus on addressing these human-centric challenges:

  • Phishing and Social Engineering: Phishing attacks have become more convincing and targeted. Comprehensive employee training programs, regular simulated phishing tests, and user awareness campaigns are essential to mitigate this risk.
  • Insider Threats: Employees with access to sensitive data can inadvertently or maliciously compromise security. Implementing user behavior analytics and access controls is crucial to detect and prevent insider threats.
  • Remote Work Challenges: The shift to remote work has introduced new security challenges. Companies must secure remote endpoints, enforce strong authentication, and provide secure access to corporate resources.
  • Shadow IT: Employees may bypass official IT channels to use unauthorized applications, creating security blind spots. IT departments should encourage open communication and provide safe alternatives for employee needs.
  • Third-Party Risk: Vendors and partners can inadvertently introduce security vulnerabilities. Robust vendor risk management programs are vital to assess and mitigate third-party risks.

Emerging Technologies

As corporations further adopt emerging technologies like cloud computing, IoT, and blockchain, new security challenges arise. These technologies offer significant benefits but require careful consideration to maintain security.

  • Cloud Security: The move to the cloud necessitates robust cloud security strategies, including identity and access management, data encryption, and continuous monitoring.
  • IoT Vulnerabilities: The proliferation of IoT devices presents a vast attack surface. Corporations must segment IoT networks, update firmware regularly, and implement strong authentication.
  • Blockchain Security: While blockchain offers inherent security benefits, smart contract vulnerabilities and human errors can lead to significant losses. Companies should perform thorough code audits and conduct penetration testing.
  • AI Security: AI-powered applications can be susceptible to adversarial attacks. Security teams must understand AI-specific threats and implement defenses accordingly.
  • Quantum Computing: Although not yet mainstream, quantum computing has the potential to break current encryption standards. Corporations should monitor quantum advancements and plan for post-quantum cryptography.

Regulatory Compliance

With the proliferation of data breaches and cyber threats, governments worldwide are enacting stricter data protection regulations. Compliance with these regulations, such as GDPR, CCPA, and emerging ones, is essential for avoiding hefty fines and reputational damage. In 2024, corporations should further invest in compliance programs and data protection technologies.

Security by Design

To address these challenges effectively, corporations should adopt a “security by design” approach. This means integrating security into every stage of the application development lifecycle. Key aspects include:

  • Secure Coding Practices: Developers should receive training in secure coding practices to reduce vulnerabilities from the start.
  • DevSecOps: Integrating security into the DevOps pipeline ensures continuous security testing and rapid response to vulnerabilities.
  • Container Security: As containerization becomes more prevalent, securing containerized applications is vital. Implementing container security scanning and runtime protection is essential.
  • API Security: With the rise of APIs, securing them against attacks like OWASP API Top 10 is crucial.
  • Microservices Security: As applications become more modular, securing microservices and their interactions is critical.

Collaboration and Information Sharing

Cybersecurity is a collective effort. Sharing threat intelligence and collaborating with industry peers, security vendors, and government agencies can help corporations stay ahead of emerging threats. Initiatives like Information Sharing and Analysis Centers (ISACs) and threat intelligence sharing platforms play a crucial role in this regard.

Application Security in 2024: Final Thoughts

As we approach 2024, the landscape of application security for corporations is poised for continuous evolution. To navigate this challenging terrain successfully, companies must adapt to emerging threats, prioritize the human element, embrace new technologies cautiously, and remain compliant with regulations. Security by design, a proactive approach to threats, and collaboration are the cornerstones of a robust application security strategy. By addressing these top application security challenges, corporations can bolster their defenses and ensure a safer digital future for their businesses and customers alike. As the saying goes, “The best defense is a good offense,” and in the world of cybersecurity, a proactive stance is the key to survival and success.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

Evolution of cyber law: how the NIS2 Directive shapes Europe’s security landscape

Ever wondered why even tech giants like Google approach European internet laws with caution? The answer is the Network and Information Systems (NIS2) Directive, a beacon in the world of internet safety.

The old rules, laid down in 2016 by the NIS Directive, fell short of safeguarding against cyber threats. While they addressed sectors like healthcare and energy, many industries remained uncovered. But now, the tables are turning. The new NIS2 Directive creates a unified EU front against cyber risks, rewriting the rules for this new digital age.

In this piece, we’ll explore how the NIS2 Directive reshapes the cyber security landscape in Europe and what it means for businesses and governments. Learn how to navigate this evolving terrain and stay compliant without incurring penalties.

The need for evolving cyber law in Europe

It’s no secret that online threats have transformed into something far more sinister than we could have imagined. The time has come for Europe to embrace new cybersecurity legislation that will effectively combat the complexities of these threats. This section will explain how online risks have evolved and why new laws are required.

The changing face of cyber threats

In the past, cyber threats were mainly the work of individual cybercriminals. They were like digital graffiti artists, tagging websites and perhaps swiping some data for their bragging rights.

Now, things are more severe. We face organized groups, and sometimes even governments, harnessing the power of cyber attacks. The objective? Stealing vast amounts of data or causing disruption of critical services.

These aren’t just one-off events anymore. Cyber threats have turned into ongoing campaigns targeting sectors like energy or healthcare. With the omnipresence of the internet in everything from our refrigerators to our cars, the risks have infiltrated every nook and cranny of our lives. The cybersecurity landscape has changed, and Europe needs to update its legislative arsenal to counter these digital dangers effectively.

Time for an upgrade: why the old NIS Directive isn’t enough

Back in 2016, the European Union took its first step in the battle for cybersecurity with the Network and Information Systems (NIS) Directive. It was a start, but it soon became evident it had limitations.

For one, it only covered specific sectors, like energy and healthcare. Many other industries that could be vulnerable to cyber-attacks were left out.

Moreover, the directive’s implementation was a patchwork quilt. Each EU country adopted its own interpretation of the rules. This inconsistency meant that while one nation might be doing a great job fortifying its cybersecurity defenses, its neighbor might lag behind.

In short, the old rules weren’t enough, and it was time to bridge the security gaps. This is where the NIS2 Directive stepped in to address them.

Far-reaching impact of the NIS2 on cybersecurity

NIS2: fixing the flaws of its predecessor

The new and improved NIS2 Directive is Europe’s upgraded plan to make the digital world safer. Unlike the old rules, NIS2 covers a lot more ground. Financial services, public administration, and digital platforms all come under its umbrella.

That means more types of companies have to follow the rules and take measures to safeguard their digital assets. But it’s not just about adding more sectors. NIS2 also brings greater unity among EU countries regarding cybersecurity.

Instead of each country making its own rules, NIS2 established baseline requirements that apply everywhere. This way, the EU can act like one big team in defending against cyber threats, making everyone’s digital life safer.

The NIS2 toolkit: key features for cyber safety

So what’s new in NIS2? First, companies must put in specific security measures that match the cyber risks they face. It’s not a one-size-fits-all solution, but it’s more about adapting to the situation at hand.

Training and awareness

While NIS1 has a nod to raining and awareness-raising, NIS2 takes up a notch, possibly requiring more structured training programs. Organizations must show evidence of ongoing training and be subject to audits to ensure that employees are well-prepared.

Streamlining incident reporting

While NIS1 encouraged incident reporting, the requirements weren’t very specific. Organizations were generally advised to have some form of incident reporting but were given more latitude in implementing it.

But NIS2 steps up its game in incident reporting. It aims to standardize procedures with specific timelines, formats, and more detailed reporting requirements. The goal is to make incident reporting more efficient, ensuring quicker response and better mitigation.

Improving overall security posture

Previously, organizations were encouraged to improve their cybersecurity measures continuously, but the directive wasn’t very prescriptive about how this should be done.

NIS2 pushes organizations to enhance their security posture continuously. This could mean more frequent audits, detailed reporting, and specific milestones to demonstrate progress.

Funding of cybersecurity

While NIS1 hinted at the importance of adequate funding for effective cybersecurity, NIS2 goes further, emphasizing the need for ample financial resources for cybersecurity. Organizations may be required to allocate a specific percentage of their budget to cybersecurity or meet minimum spending requirements.

Plus, NIS2 has stiffer penalties for companies that fall short of compliance. This gives companies a solid reason to take cybersecurity seriously.

Now that we’ve uncovered what NIS2 brings to the table, let’s explore how it impacts businesses and government offices in the next section.

The NIS2 impact: what businesses need to know

The legal framework

The NIS2 Directive isn’t just another set of guidelines, it’s the law. Medium-sized and large enterprises should understand that compliance isn’t an option but a legal requirement. And it’s not just about avoiding penalties. It’s about fortifying your business infrastructure to protect valuable assets and customer data.

Cost of compliance vs. cost of non-compliance

Yes, implementing the NIS2 Directive requires an investment in time, personnel, and resources. But think about it this way: the cost of non-compliance, including legal repercussions and potential loss of consumer trust, can be much more damaging to your bottom line and reputation.

The Directive is designed to create a safer digital environment that can serve as a unique selling proposition for customers who value data privacy.

Long-term gains: beyond just avoiding penalties

NIS2 compliance is an investment in the future. While the initial setup may demand resources, robust cybersecurity measures can significantly reduce the risk of data breaches and cyber-attacks, both financially devastating and detrimental to a company’s reputation.

Maintaining a secure digital ecosystem can become your competitive edge in a world where data leaks or breaches make headlines.

Cybersecurity is a public concern: the NIS2 Directive mandates it

For public administration entities, cyber security isn’t just about protecting sensitive data. It’s about safeguarding the lives and well-being of millions. A cyber-attack on a government body isn’t just a headline, it could lead to a national emergency.

Under the NIS2 Directive, these organizations must improve their cybersecurity to prevent such potential disasters.

Layers of government: everyone is affected

It’s not a one-size-fits-all solution. Public administrations, from central to regional and local levels, must go beyond mere software upgrades. The NIS2 rules demand a comprehensive review and transformation of how these entities manage data, deploy security protocols, and respond to incidents. No matter the size or scope of the government body, compliance with these new measures is essential.

Holistic approach to cybersecurity

Public administration entities must adopt a holistic cybersecurity strategy that addresses risk assessment, preventive measures, and contingency planning. This comprehensive approach ensures that damage can be minimized in the event of an attack, and normal operations can swiftly resume.

Even if your company is not based in Europe, you can’t ignore Europe’s online safety rules if you’re doing business there. The rules are like a digital handshake, mandatory for anyone offering digital services or handling data in the EU.

Crossing borders: NIS2’s reach beyond Europe

So, what does it mean for global businesses? If your company has its headquarters halfway across the globe, you’re in the spotlight, too. You must follow these new rules when operating in Europe. But don’t worry, it’s a fantastic opportunity. Following these guidelines can signal to European customers that you take security seriously, boosting your appeal. But, word of caution: getting the details right is crucial because the penalties for messing up can be steep.

Global players: future implications and representative requirements

Under NIS2, you can’t simply wing it. If you’re a foreign company doing business in the EU, you need a representative in the EU. They’re your go-to for ensuring all these rules are followed. And it’s not just a formality, it’s a crucial role.

But here is the exciting part: the implications for the future are significant. Global standards like NIS2 might become the norm as the digital world grows. Companies that get it right in Europe now will be a step ahead of the game when similar laws start popping up in other parts of the world.

Now that we’ve covered the new rules and who they apply to, our next section will dive into best practices for organizations to ensure they stay on the right side of the new guidelines.

NordLayer: your NIS2 compliance partner

Navigating the complex world of NIS2 compliance is like solving a puzzle. And while NordLayer may not be the whole solution, it can help you tick off several boxes on your compliance checklist all at once.

NIS 2 legislation, in Article 5, calls for digital service providers to employ suitable technical and organizational measures to secure their networks and information systems. Virtual Private Networks (VPNs) can be particularly helpful in meeting the “appropriate and proportionate” security measures outlined in Article 5.

Specifically, NordLayer offers a secure tunnel between an employee’s device and the corporate network. This ensures that sensitive data, like customer information or intellectual property, is shielded from unauthorized access. This is a powerful step towards managing network and information system security risks, as NIS2 demands.

Article 16 of NIS 2 emphasizes secure data transmission as a core compliance aspect. And here is where VPNs play a crucial role. They encrypt data during transit between different locations or systems. This encryption aligns directly with the article’s requirements to protect against unauthorized access and data tampering. With NordLayer, you’re well on your way to meeting the “technical and organizational measures” stipulated in this article of NIS 2.

In conclusion

We’ve discussed the necessity for Europe to modernize its cybersecurity laws through the NIS2 Directive. This transformation impacts not just IT teams but entire businesses. As the EU unfolds these comprehensive new guidelines, the responsibility falls on organizations to adapt accordingly.

Don’t hesitate to reach out and explore how NordLayer can be a valuable addition to your cybersecurity arsenal, assisting you on your journey toward alignment with the EU’s evolving digital laws.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

23.9.3 ‘Voyager’ released

Changes compared to 23.9.2

Enhancements

  • Reduced memory usage when loading large index files from Comet Server Storage Role-type Storage Vaults
  • Renamed “Restore files and folders” to “Granular restore” when restoring files and folders from a Disk Image or Hyper-V backup

Bug Fixes

  • Fixed an issue with Virtual Storage Vault policy options being available incorrectly when configuring a schedule for a Protected Item
  • Fixed an issue with the list of allowed Storage Vault types not being immediately visible when editing admin permissions in the Comet Server web interface for an admin user with the “Restrict available Storage Vault types” setting enabled
  • Fixed an issue with a non-existent empty Protected Item being shown in the Comet Backup desktop app after restoring a snapshot from other device
  • Fixed an issue with the Restore dialog in the Comet Backup desktop app showing snapshots from another devices as if they were from the current device

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

CyberLink Partners with TERMINOLOGY to Enhance Point of Sale Terminals with FaceMe Facial Recognition, Facilitating More Secure and Convenient Transactions

Taipei, TAIWAN – September 27, 2023 – CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technologies announced today it has integrated and established a strategic partnership agreement with TERMINOLOGY, INC a US and Canadian Point of Sale (POS) terminal and kiosk-as-a-Service company. CyberLink’s AI and facial recognition technology coupled with TERMINOLOGY services enables fintechs, banks, acquirers, POS systems, digital wallets, and other industry ISVs, to facilitate faster check-in and check-out experiences for both consumers and merchants.

Woman using her face to pay at a Point of Sale Kiosk

The CyberLink and TERMINOLOGY strategic partnership accelerates the adoption of AI and facial recognition technology by providing an optional digital age and ID validation at the point of purchase for various industry providers seeking biometric POS terminals and kiosk solutions. Leveraging the combined technologies can help to engage and improve on-premise security, improve compliance, customer enrollment and experiences, and onboarding of banking, financial, payments and retail lending services. 

In addition to advancing commerce, CyberLink and TERMINOLOGY add valuable shopping and behavior data insights for casinos, wineries, governments, retailers, hospitality, payments, POS and other providers. Other use cases our combined technologies optimize include transportation and regulated industries such as alcohol, tobacco, cannabis, firearms, and night clubs.   

Anthony Ribas, TERMINOLOGY’S CEO stated, “CyberLink and TERMINOLOGY recognize these trends and have begun proactive initiatives to modernize payments with the use of biometric check-in and check-out integrations with products and service partners utilizing data over sound and proximity modalities to enhance industry sectors ahead of this trending curve”. 

CyberLink and TERMINOLOGY welcomes new and existing payment industry service providers, merchants and innovators seeking to integrate and deploy biometric payments experiences.  

Contact sales@terminologyinc.com to explore our capabilities, become a distribution partner, integrate with us and or participate in a pilot.  

About TERMINOLOGY, INC.   

TERMINOLOGY is a biometrics, tap to phone, point of sale terminals, kiosk and embedded (FaaST) finance-as-a-service tech firm based in the US and Canada. We are a partner driven fintech and payment technology company who strives to achieve our clients’ objectives. Our white label hardware, software, technologies, services and strategies help maximize profitability, reduce operating and acquisition costs while optimizing our client’s retention and revenue goals. 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

×

Hello!

Click one of our contacts below to chat on WhatsApp

×