Skip to content

23.9.10 ‘Voyager’ released

Enhancements

  • Significantly improved performance when restoring directories containing only a few files from a File and Folder Protected Item
  • Lowered memory usage when uploading to S3-backed Storage Vaults in some use cases
  • Removed the device dropdown in web UI when adding a protected item when there’s only one device

Bug Fixes

  • Fixed an issue with compatibility with Cloudflare R2 S3-compatible storage service
  • Fixed an issue with granular restore of symlinks when Comet Backup is running on a non-Windows OS
  • Fixed an issue with granular restore of NTFS partitions on MBR with an invalid partition type flag
  • Fixed an issue with inconsistent behaviour of granular restore from Disk Image backups where the partition table was not included
  • Fixed an issue with granular restore of disk images if the image is contained within a directory with certain names
  • Fixed an issue with granular restore when selecting files from a Disk Image partition extent following a deselected extent
  • Fixed an issue with missing non-disk-image files when browsing parent directories in granular restore mode
  • Fixed an issue with missing partition names for display in granular restore mode
  • Fixed a cosmetic issue with the dropdown mode selector for Hyper-V Protected Items
  • Fixed an issue causing excessive memory usage when compressing large index files during a retention pass
  • Fixed a cosmetic issue with the Disk Image restore dialog in the Comet Server web interface and the Comet Backup desktop app
  • Fixed a cosmetic issue with the Object Lock configuration in the Comet Server web interface

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Scale Computing Recognized on the 2023 CRN Edge Computing 100 List

INDIANAPOLIS – November 6, 2023 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that CRN®, a brand of The Channel Company, has named Scale Computing to its 2023 Edge Computing 100 list. The fourth-annual list highlights the key vendors providing channel partners with the technology to construct next-generation edge solutions that ultimately bring data collection and processing closer to users. The award categories encompass Edge Hardware, Edge Software and Services; IoT and 5G Edge Services; and Edge Security.

With the increasing significance of business intelligence and data analytics, the ability to swiftly gather and process such data close to the source is emerging as a crucial distinguishing factor for businesses of all magnitudes. Simultaneously, the necessity to expand corporate networks to encompass a larger number of remote and hybrid workers intensifies the importance of securing the edge.

“Today’s ever-expanding digital world demands that more and more applications run outside of the cloud or data center, closer to where they are used. But managing this sprawl of complex infrastructure running applications in distributed locations creates an escalating burden on IT departments,” said Jeff Ready, CEO and Co-founder, Scale Computing. “Scale Computing Platform allows IT managers to run applications and process data outside centralized data centers, at the edge of a network closest to where that data is created and utilized. We’re proud to be included on this year’s CRN Edge Computing 100 list as we continue to provide the most innovative edge computing and hyperconverged solutions to our partners and their customers.”

Scale Computing Platform (SC//Platform) brings simplicity, high availability, and scalability together, replacing the existing infrastructure for running VMs in a single, easy-to-manage platform. SC//Fleet Manager allows users to centrally monitor and manage hundreds or thousands of distributed edge infrastructure deployments with few or no on-site IT personnel. The award-winning SC//HyperCore software delivers on-premises edge computing with high availability and disaster recovery to remote locations at an affordable entry-level cost. All SC//Hardware can be deployed quickly, managed locally or remotely, and can self-heal almost instantly. Scale Computing provides the benefits of affordable edge computing infrastructure without sacrificing reliability, ease of deployment, and ease of use.

“The 2023 Edge Computing 100 list presents a remarkable occasion for CRN to acknowledge pioneering vendors who are providing the technology to construct distinctive edge solutions,” said Jennifer Follett, VP, U.S Content, Executive Editor, CRN The Channel Company. “These companies enable channel partners to help customers operate more efficiently and derive maximum value from their data. We extend our congratulations to all those who have been honored on this year’s list.”

The 2023 Edge Computing 100 list will be featured in a special November issue of CRN Magazine and online at crn.com/edge100. To learn more about the SC//Platform and edge computing, visit scalecomputing.com/edge-computing.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

What is remote access? An open door to productivity and flexibility

What is remote access and how has it transformed work dynamics around the world? Let’s dive in, explore and discover together how this innovative practice has reshaped conventional work structures and opened up a whole range of possibilities!

What is remote access?

Remote access or remote connection, itself, is a virtual portal that links your work tasks to the physical location of your choice. Instead of being tethered to a boring desk in an office, this technology allows workers to access computer systems, files, and resources from anywhere with an Internet connection.
*Picture wearing your swimsuit and typing from the Maldives.
At the heart of this revolution is the ability to interact with platforms and data through virtual interfaces, which blurs the boundaries between the traditional grid office and a more flexible work environment (and with the possibility of an afternoon at the beach bar!).

What is remote access for?

The function of remote access transcends the limits of mere convenience. It has proven to be a crucial tool for companies and workers in different circumstances. During exceptional times, such as that global pandemic, that everyone seems to have forgotten, the way we worked as we knew it changed completely. In fact, this technology became a lifeline for business continuity. A notable example is in Spain, a large and free country, where the adoption of teleworking spiked surprisingly, with 80% of companies implementing remote access to maintain productivity in the midst of chaos.

Remote connection: Go beyond geographical borders

As it is obvious, the impact of remote access is not limited to a single region. Colombia, for example, has experienced a staggering 400% increase in the number of remote workers compared to previous years. This underlines and highlights how the adoption of this practice has transcended geographical borders and has become an essential step in the transformation of the working world.

Safe remote access: A tool for security and collaboration

In a scenario where cybersecurity is a constant priority, remote access rises as a neat yet elegant solution. For those who handle sensitive or valuable information, this method provides a safe alternative to local storage on personal devices. By authenticating on enterprise platforms, workers can access data without compromising their integrity or that of the company. Security, therefore, becomes one of the indisputable advantages of remote access. Peer collaboration is enhanced by remote access, as physical barriers are no longer obstacles to communication and teamwork. Video conferencing and task management tools can be activated with ease, enabling interaction and workflow no matter the distance. Remote access technology also plays a vital role in correcting errors and delivering important projects. Even if team members are not physically present, their contribution can flow consistently and effectively, ensuring project efficiency and responsiveness in the ever-changing world of work.

Labor productivity: Transforming business dynamics

In the fabric of the work evolution, remote access has become a common thread that unites productivity with flexibility at work. As we explore this revolutionary practice further, the many benefits it offers to businesses and their workers, as well as the fundamentals of how it works, are revealed. Remote access not only redefines the way we work, but it also drives unparalleled business efficiency. Among its most notable benefits, there are substantial time and money savings. While the initial investment in remote access software may seem like an expense, financial and operational rewards are significant. By getting rid of commuting time, workers can quickly immerse themselves in their tasks, while businesses save on electricity and supply costs. The virtual office stands as a sustainable and economic alternative, where it is only necessary to turn on a computer or tablet, enter the credentials and be ready to work.

Components and operation

Remote access is built on the convergence of three key elements:

  1. Software.
  2. Hardware.
  3. Network connectivity.

Currently, these items are routinely synchronized through a Virtual Private Network (VPN)which creates a safe link between users and systems through wired network interfaces, Wi-Fi connections, or even the Internet. The VPN plays a momentous role in establishing a connection between individual users and private networks. Once the user enters the software, it encrypts the data traffic before directing it through the Wi-Fi network. This process is known as a “VPN tunnel”, which ensures the privacy of the flow of information. The data is then decrypted and sent to the specific private network. For this process to be successful, both the computer from which the user connects and the one seeking access must be equipped with compatible communication software. Once the user connects to the remote host, access is granted to a virtual desktop that replicates the conventional work environment.

Successful implementation of remote access

The journey to a successful implementation of remote access in an enterprise is an exciting journey that requires meticulous planning and attention to detail. As you embark on this journey, here are four key tips that will guide you through a smooth and safe transition.

1. Training

Training is the foundation upon which a successful implementation of remote access is built. Providing your employees with a clear understanding of how it works and how to use it effectively is essential. An organized approach, planned by areas and departments, ensures that everyone is on the same page. By encouraging open communication, doubts can be solved and obstacles overcome more easily. Remember that an investment in training not only boosts productivity, but it can also increase the company’s profit margin by 24%.

2. The right tools

Equipping your employees with the necessary tools is a crucial step. Make sure everyone has a desktop or laptop with the remote access software installed. It’s critical to check your team’s preferences and provide viable alternatives. Each contributor must have a user configured with VPN connectivity to ensure safe access.

3. Remote access security

Security is the pillar that underpins any successful company. *Safety and the coffee machine. In the world of remote access, it is reinforced by two-factor authentication. This multi-factor authentication approach adds an additional layer of protection, reducing vulnerability to security breaches and information leaks. Options such as physical token, mobile phone authentication, or biometrics, such as fingerprinting, are effective ways to ensure that only authorized people have access to sensitive information.

4. Connectivity

The safe and efficient connectivity is the backbone, which is not a pillar, we have already used that analogy before, of a successful implementation of remote access. Installing a wireless access point backed by a robust firewall is a critical step. Leading enterprise firewalls not only protect against cyber threats, but also offer advanced capabilities such as network monitoring and support for mobile connections. These firewalls can be a vital defense to ensure information integrity and maintain operational continuity.

Exploring the Horizon: Remote access tools

As you get deeper into deploying remote access, there is a world of tools available to make this change effective and beneficial for your organization. Compiling a list of options and comparing their features can help you make informed decisions. Each tool has its own advantages, so it’s important to find the one that fits the size of your company, the number of collaborators, and the type of industry you’re in.

We advise you Pandora RC

As a culmination of our exploration in the world of remote access, we present a revolutionary solution that simplifies and enhances this essential practice:
Pandora RC, a computer management system that supports MS Windows®, GNU/Linux ® and Mac OS®, is the bridge that connects users with their computers anywhere and at any time, all through a web browser and without the need for direct connectivity. Rooted in careful planning and effective implementation, Pandora RCreveals its magic with a simple process. Before you can remotely access a device, you need to install an agent and register it on the central Pandora RC server. This process requires a valid user on the platform. Once the agent is configured with a user and activated, it will be provisioned and ready for remote connection.
The user portal will display the provisioned devices, each identified with a unique Key ID. This identifier, designed for accurate identification, ensures collaboration between users and enables efficient tracking in internal inventory systems.

Safety is critical at Pandora RC.
Each agent can have an individual password configured during installation or later. This password is interactively entered at each access, ensuring that sensitive information is protected and not stored on Pandora RC central servers. Pandora RC architecture ensures seamless connectivity. Agents connect to servers on the internet, and if necessary, they can be configured to use a proxy in case they cannot connect directly.

Conclusions

In a world where technology transcends boundaries and creates new horizons, remote access stands as an open door to productivity and flexibility. This concept has transformed global labor dynamics, blurring physical barriers and redefining how and where we work. Remote access has proven its vitality in exceptional situations, as it did in the pandemic and will do so in the apocalypse, by maintaining business continuity and enabling businesses to thrive in changing environments. From Spain to Colombia, mass adoption has marked a milestone in labor evolution, showing how collaboration and efficiency know no geographical boundaries. Security, a constant concern in the digital age, is addressed with advanced authentication and encryption solutions in remote access. In addition, this practice makes remote collaboration easier, driving seamless videoconferencing and workflows.
The successful implementation of remote access requires training, adequate tool supply, enhanced security, and robust connectivity. This process can be catalyzed by solutions such as Pandora RC, which has taken the remote access experience to the next level, democratizing the connection with machines and getting rid of location limitations. Ultimately, remote access not only changes the way we work, but redefines efficiency, security, and collaboration in today’s workplace landscape. A digital revolution that invites us to navigate towards a future where productivity has no borders and flexibility is the standard.

Want to learn more about Pandora RC?

El equipo de redacción de Pandora FMS está formado por un conjunto de escritores y profesionales de las TI con una cosa en común: su pasión por la monitorización de sistemas informáticos.

Pandora FMS’s editorial team is made up of a group of writers and IT professionals with one thing in common: their passion for computer system monitoring.

 

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×