Skip to content

ESET Threat Intelligence increases cybersecurity visibility through Elastic integration

  • ESET announces strategic integration with Elastic Security, enhancing cybersecurity analytics and visibility through advanced threat intelligence feeds.
  • The integration offers deduplicated, highly curated feeds based on proprietary ESET research and telemetry.
  • Elastic users will benefit from enhanced geographical visibility, reduced false positives, prevention of IoCs, and contextual investigations.

BRATISLAVAMay 3, 2024ESET, a global digital security company, has announced another strategic partnership and integration, thanks to its unified API gateway. This development facilitates seamless connections with various cybersecurity vendors, such as the recent integration with Elastic, a leading search AI company. This move is part of ESET’s broader strategy to support multi-vendor integrations aimed at strengthening overall cybersecurity defenses. By working with Elastic, ESET aims to provide organizations with enhanced analytics tools and greater visibility to enable more effective preventive measures against cyber threats.

Through this strategic partnership, Elastic’s users gain access to ESET’s advanced threat intelligence feeds, offering real-time data on indicators of compromise (IoCs), such as botnets, malicious domains, files, URLs, and IPs. These feeds also provide deep insights into the operations of notorious APT groups, sourced from ESET’s extensive malware and threat research. This integration enriches Elastic’s SIEM product, enabling security operators to leverage globally sourced threat data for unprecedented geographical visibility, dramatically reduced false positives – allowing for more accurate threat detection and analysis – and contextualized threat investigation.

The collaboration brings to the table ESET’s deduplicated and highly curated feeds, ensuring maximum effectiveness. Unique insights are drawn from proprietary ESET research and telemetry, not reliant on third-party sources. For optimal integration and interoperability, these feeds are delivered in the widely recognized TAXII/STIX 2.1 format.

ESET’s technological framework continuously scans for threats across various layers, from pre-boot to the resting state, providing global telemetry on emerging threats. This automation, supported by ESET’s leading cybersecurity team and 13 R&D centers worldwide, accelerates threat investigation and response. While machine learning aids in automating decisions, it’s ESET’s human expertise that underpins the evaluation and interpretation of threats, ensuring unparalleled accuracy and reliability.

“Our collaboration with Elastic not only marks a milestone in threat intelligence integration, but also represents a shared commitment to securing the digital landscape,” remarked Trent Matchett, ESET Director of Global Strategic Accounts. “By combining our unique insights and unparalleled expertise with Elastic’s analytical prowess, we’re setting a new standard in cybersecurity, empowering organizations to improve their security posture and make crucial decisions faster.”

For more information on how the ESET and Elastic integration is redefining cybersecurity threat intelligence, and to learn more about the benefits it brings to organizations, please read here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

April 2024: What’s New?

Written by Callum Sinclair – Product Engineering Manager

What’s New? is a series of blog posts covering recent changes to Comet in more detail. This article covers the latest changes in Comet over April 2024. 

There were three Comet releases during April – two in the Voyager release series, plus one update for our Mimas release series.

We’ve landed a few large and exciting features this April:

Hyper-V CBT (Changed Block Tracking)

Hyper-V CBT is now available in our Voyager series. Hyper-V CBT performs efficient backups of Hyper-V Virtual Machines by only reading blocks of a virtual disk that have changed since the last backup job. This means Comet only needs to upload the data that has changed inside the VM without having to read and upload every byte.

You will find two new Hyper-V Backup Mode types when setting up a Hyper-V Protected Item. These are Latest VM State (Changed Block Tracking) and Latest VM State (Standard). You can read more about what these new modes do in our documentation here

Under the hood our two new Hyper-V Backup Mode types use WMI (Windows Management Instrumentation) and RCT (Windows Resilient Change Tracking) to perform the backup. This is a completely new way for Comet to backup Hyper-V VMs as our old implementation used Windows VSS (Windows Volume Shadow Copy Service).

New Hyper-V Backup Option One: Changed Block Tracking using WMI and RCT

New Hyper-V Backup Option One: Hyper-V Backup using WMI

Hyper-V Changed Block Tracking Using

This enhancement improves our Hyper-V backup offering, ensuring faster backups of your Virtual Machines while also needing to upload less data.

Impossible Cloud Storage Templates

We’re pleased to announce that Impossible Cloud is now available as a built-in Storage Template in our Voyager series. If you enter top-level credentials into the Storage Template, Comet can use them to provision private buckets with separate credentials for each user, allowing seamless direct-to-cloud backup.

Impossible Cloud IAM Storage Template

Impossible Cloud IAM Storage Template with Object Lock

Impossible Cloud Partner API Storage Template

As a quick reminder – when using the Storage Templates, it’s likely you’ll want to configure cleanup for cloud buckets that are no longer being used by any user account. Comet’s solution for this problem is called Constellation Role, and it’s available from the settings page of your Comet Server. In Constellation, you can enter the same credentials for it to search through. When a Constellation report runs, it finds all your buckets; checks all the user accounts; cross-references the users’ Storage Vaults with the available buckets; and deletes any discovered buckets that are not in use by any user account.

Constellation Role is designed to scale up to clusters of multiple Comet Servers, with any mix of server replication, Storage Role, or direct-to-cloud buckets created by the Storage Template feature. You should have exactly one Constellation Role server amongst your entire cluster of Comet Servers.

Comet-Hosted Single Sign On

Users can now sign into Comet-Hosted servers using their account.cometbackup.com accounts. This feature simplifies access to Comet-Hosted servers, allowing users to utilize their existing Comet Backup account credentials for authentication. To enhance security, users are encouraged to set up two-factor authentication (2FA) on account.cometbackup.com.

This feature has already been enabled, and will be used the next time you click the login button from the My Services page on account.cometbackup.com.

In addition, once you have clicked the login button on the My Services page you will notice the new “Login with Comet Account Portal” button appear on the login screen of your Comet-Hosted server. This button will only appear on browsers where you have clicked the My Services login button before. We have done this to ensure we don’t break any rebranding you have configured by showing a big “Login with Comet Account Portal” button.

Comet-Hosted London Region Now Available

We are pleased to announce that Comet-Hosted is now available to be hosted in the London region. Comet users now have the choice of four geographically diverse locations to choose from when selecting where their Comet-Hosted server should be located.

Continued Comet Improvements

Throughout April, we rolled out over twenty fixes and enhancements aimed at improving the overall quality and performance of Comet. These updates underline our commitment to providing a reliable and efficient backup solution for our users.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

[重要通知] 伺服器將於 2024-05-08 (2:30 pm) 至 2024-05-08 (6:30 am) 進行定期維護

重要通知!

ESET 計劃進行維護工作,將於香港時間 2024 年 5 月 08 日(星期二)下午 2 時 30分 至 下午 6 時 30分之間進行,維護時間大約為 4 小時。

在此段期間,客戶可能無法進行續期購買、啟動及生產授權。

不便之處,敬請原諒。

技術支援熱線: (852) 2893 8186 或電郵至: support@version-2.com.hk

IMPORTANT ! 

ESET planned to maintain which will take place on
Tuesday, May 8th, 2024, from 2:30 PM to 6:30 PM, Hong Kong Time lasting 4 hours.

It means in certain time within the maintenance window, customers might not renewal purchase, activate license or generate license, etc.

Sorry for any inconveniences caused.

Support Hotline: (852) 2893 8186
Or email to support@version-2.com.hk

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×