Skip to content

How Accrete Inc. prepared for failover to protect the sensitive data of high-profile clients

Accrete Inc. is an artificial intelligence company that specializes in a variety of sectors. Its wide range of products supports government, entertainment, financial services, and consumer packaged goods. The company has established a reputation for its innovative supply chain analysis and social media aggregation solutions. 

Profile of Accrete Inc.Peter Bierfeldt, the Chief Information Security Officer, oversees the security of the company’s intellectual property, customer data, and overall reputation. He shared how working with governmental and other high-risk clients requires a focus on layered security and how Accrete Inc. achieved it using NordLayer.

The challenge

Securing cloud environments for high-risk data clients

Accrete’s unique position in the market, dealing with sensitive government contracts and a global workforce, posed significant cybersecurity challenges.

The company works with a diverse range of clients, including the US Department of Defense. This requires them to follow stringent security standards like FedRAMP and NIST 800-171.

“We knew it’s a good practice to have a VPN solution in place to have everybody enter our client cloud network through an allowlisted IP, whether you’re talking AWS GovCloud or AWS commercial production.”

Click to tweet

The primary concern was securing a virtual, cloud-based network environment against potential threat actors, particularly in high-risk countries.

“We are a virtual company with no on-premise network. We don’t have anything like that. We are 100% in the cloud, and protecting that cloud is really, really important.”

Click to tweet

Additionally, Accrete faced challenges in managing a globally dispersed team with offices in the U.S. states and India, requiring secure and reliable access to the network from various locations worldwide.

The solution

Combining multiple security functionalities for the best result

Accrete Inc. chose NordLayer as their cybersecurity partner, transitioning from their previous VPN provider.

“Accrete Inc. needed one more piece of the puzzle for getting into our network, an additional layer of security that you can put in place to protect your production and entire network.”

Click to tweet

The company’s network security combines layers of different capabilities and functionalities. It includes virtual private gateways, IP allowlisting, SSO and MFA implementation, strong passwords, and antivirus protection. Thus, it must have been not only just a VPN but a solution that does more.

“Our old VPN didn’t do anything beyond being a VPN. We looked for a solution that secures the network when connected to untrusted Wi-Fi and is reliable regarding performance.”

Click to tweet

As Peter notes, different from free tools, the company is paying for the service to protect their information. Having government customers dealing with financial services and insurance, Accrete Inc. must ensure that nobody’s snooping on their traffic, and with a company like NordLayer, they don’t have to worry about it.

Why choose NordLayer

NordLayer was selected for its robust VPN solutions, global points of presence, and seamless integration with existing systems like Okta SSO providers.

“Our clients must know that we don’t relax our security. An outage and going down temporarily is an issue with high-sensitivity data, but with failover, we don’t need to worry about it.”

Click to tweet

One of the main objectives for Accrete Inc. was to establish a failover in case of an outage. Deploying at least two private servers ensured high service availability. This approach means security isn’t compromised, even if one of the virtual gateways flatlines for a few minutes.

A solid mesh of security and business continuity measures established with the NordLayer tool

The key reasons for this choice were:

  • NordLayer’s global network infrastructure provided low-latency, secure connections for their international team, which was particularly beneficial for the office in Mumbai.

  • The ability to establish failover systems ensured uninterrupted access and network resilience.

  • NordLayer’s reputation for reliability and security compliance aligned with Accrete’s needs for protecting sensitive government-related data.

  • The ease of onboarding and user-friendly nature of NordLayer’s services minimized IT overhead and facilitated smooth integration into Accrete’s operations.

The outcome

Complete team protection to enable full network security

Implementing NordLayer resulted in a strengthened cybersecurity posture for Accrete Inc. The new system enhanced network security without compromising on performance, even for remote and international team members.

Accrete Inc. added VPN gateways to cover both the United States and India, supporting all staff.  VPN usage mitigates the risk of leakage of even relatively benign information like email addresses and user names.

“Investing in 100% user coverage in the organization makes sense. When people get used to using the VPN, it limits network exposure  and mitigates the impact of compromise to our network even if an endpoint is compromised.”

Click to tweet

Accrete Inc. successfully met the compliance requirements for their government contracts and ensured the integrity of their intellectual property and customer data.  FedRAMP requires that only trusted devices access the network.  By combining allowlisting via the VPN to access the network via Okta, Accrete Inc. was able to address several FedRAMP controls.

“NordLayer plays very nicely with Okta. It integrated well with the onboarding process, making it easy and simple as we’ve got other systems with much more overhead and hand-holding.”

Click to tweet

The shift also demonstrated a commitment to utilizing leading-edge technology solutions to address complex security challenges.

Pro cybersecurity tips

We talk with our clients not only to learn their experience using NordLayer but also to understand how cybersecurity experts perceive online security. Thus, we asked the Chief Information Security Officer at Accrete Inc. to share his personal favorite tips for building digital hygiene habits.

Accrete Inc. is a perfect example of how a layered approach to security can ease and improve your network protection journey. NordLayer is a solution that takes granular control of establishing different security measures, so they create a robust mesh against digital threats.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

China-aligned Evasive Panda leverages religious festival to target and spy on Tibetans, ESET Research discovers

  • ESET Research discovered a cyberespionage campaign that leverages the Monlam Festival — a religious gathering — to target Tibetans in several countries and territories. ESET attributes this campaign with high confidence to the China-aligned Evasive Panda Advanced Persistent Threat (APT) group.
  • The attackers compromised the website of the organizer of the annual festival, which takes place in India, and added malicious code to create a watering-hole attack targeting users connecting from specific networks.
  • ESET also discovered that a software developer’s supply chain was compromised and trojanized installers for both Windows and macOS were served to users. 
  • The attackers fielded a number of malicious downloaders and full-featured backdoors for the operation, including a publicly undocumented backdoor for Windows “Nightdoor.”
  • Targeted users were located in India, Taiwan, Hong Kong, Australia, and the United States (including at Georgia Tech).

BRATISLAVA, MONTREAL — March 7, 2024 — ESET researchers have discovered a cyberespionage campaign that, since at least September 2023, has been victimizing Tibetans via a targeted watering hole (also known as a strategic web compromise), and a supply-chain compromise to deliver trojanized installers of Tibetan language translation software. The attackers aimed to deploy malicious downloaders for both Windows and macOS to compromise website visitors with MgBot as well as a backdoor that has not been publicly documented yet; ESET has named it Nightdoor. The campaign by the China-aligned Evasive Panda APT group leveraged the Monlam Festival — a religious gathering — to target Tibetans in several countries and territories. Targeted networks were located in India, Taiwan, Hong Kong, Australia, and the United States.

ESET discovered the cyberespionage operation in January 2024. The compromised website abused as a watering hole (the attacker infests a website that the victim likely or regularly uses) belongs to Kagyu International Monlam Trust, an organization based in India that promotes Tibetan Buddhism internationally. The attack might have been intended to capitalize on international interest in the Kagyu Monlam Festival that is held annually in January in the city of Bodhgaya, India. The network of the Georgia Institute of Technology (also known as Georgia Tech) in the United States is among the identified entities in the targeted IP address ranges. In the past, the university was mentioned in connection with the Chinese Communist Party’s influence on education institutes in the U.S.

Around September 2023, the attackers compromised the website of a software development company based in India that produces Tibetan language translation software. The attackers placed several trojanized applications there that deploy a malicious downloader for Windows or macOS.

In addition to this, the attackers also abused the same website and a Tibetan news website called Tibetpost to host the payloads obtained by the malicious downloads, including two full-featured backdoors for Windows and an unknown number of payloads for macOS.

“The attackers fielded several downloaders, droppers, and backdoors, including MgBot — which is used exclusively by Evasive Panda — and Nightdoor, the latest major addition to the group’s toolkit and that has been used to target several networks in East Asia,” says ESET researcher Anh Ho, who discovered the attack. “The Nightdoor backdoor, used in the supply-chain attack, is a recent addition to Evasive Panda’s toolset. The earliest version of Nightdoor that we’ve been able to find is from 2020, when Evasive Panda deployed it onto the machine of a high-profile target in Vietnam. We have requested that the Google account associated with its authorization token be taken down,” adds Ho.

With high confidence, ESET attributes this campaign to the Evasive Panda APT group, based on the malware that was used: MgBot and Nightdoor. Over the past two years, we have seen both backdoors deployed together in an unrelated attack against a religious organization in Taiwan, in which they also shared the same Command & Control server.

Evasive Panda (also known as BRONZE HIGHLAND or Daggerfly) is a Chinese-speaking and China-aligned APT group, active since at least 2012. ESET Research has observed the group conducting cyberespionage against individuals in mainland China, Hong Kong, Macao, and Nigeria. Government entities were targeted in Southeast and East Asia, specifically China, Macao, Myanmar, The Philippines, Taiwan, and Vietnam. Other organizations in China and Hong Kong were also targeted. According to public reports, the group has also targeted unknown entities in Hong Kong, India, and Malaysia.

The group uses its own custom malware framework with a modular architecture that allows its backdoor, known as MgBot, to receive modules to spy on its victims and enhance its capabilities. Since 2020 ESET has also observed that Evasive Panda has capabilities to deliver its backdoors via adversary-in-the-middle attacks hijacking updates of legitimate software.

For more technical information about the latest malicious campaign of the Evasive Panda group, check out the blogpost “Evasive Panda leverages Monlam Festival to target Tibetans” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Logsafe HRMS Integrates FaceMe® to Power Facial Recognition Time and Attendance

Taipei, TAIWAN – February 27, 2024 – CyberLink Corp. (5203.TW), a pioneer in AI and facial recognition technologies, today announces the integration of FaceMe SDK with Logsafe, India’s fastest growing human resources management system (HRMS). By combining CyberLink’s cross-platform facial recognition engine with Logsafe’s attendance management functionality, organizations can automate check-in and check-out processes with contactless, cloud-based, mobile facial recognition. 

Attendance being taken in an elementary school using facial recognition

Logsafe aims to revolutionize attendance management and streamline administrative processes securely, reliably, and cost-effectively with their innovative mobile app. To achieve this goal, Logsafe has partnered with CyberLink, a leading provider of facial recognition technology. With an impressive face recognition accuracy rate of 99.83%, top rated in NIST’s latest FATE test for presentation attack detection, and iBeta Level 2 compliant anti-spoofing technology, FaceMe SDK provides a precise, fast and frictionless user experience which is perfect for Logsafe’s customer base.

Logsafe required a solution partner that could provide compatibility with both Android and iOS. With its high accuracy, efficiency, and compatibility for both Android and iOS, FaceMe was the obvious choice to power Logsafe’s facial recognition features. Additionally, Logsafe needed support for offline facial recognition. In case of any internet connection disruption, Logsafe wanted their app to continue working seamlessly and not hinder daily operations of their clients. Optimized for edge devices, FaceMe SDK was able to fulfill this requirement and ensure Logsafe’s functions carry on.

Already in market with over 30K active users throughout India, Logsafe is currently being utilized across multiple business verticals, including public schools. Within schools, AI facial recognition and anti-spoofing is used for teacher and student group attendance. When a teacher holds the Android tablet to scan a group of 4-8 students’ faces, real-time video mode enables facial recognition identification and verification in less than 1 second, noting attendance in the HRMS. Similarly, teachers can use Logsafe on their mobile phones for facial recognition check-in/out of school.

“It is exciting to see our facial recognition technology being used in new ways,” said Mei Guu, President of CyberLink Business Unit 2. “Not only is facial recognition used in access control, but with our partner Logsafe we are seeing a new and improved way to take classroom attendance and focus more time in the classroom on learning. It’s quite exciting!”

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

×

Hello!

Click one of our contacts below to chat on WhatsApp

×