Skip to content

Integration with Stormshield

Integration between security systems is crucial in providing ZTNA (Zero Trust Network Access). It improves customer company network resilience by providing centralized monitoring, streamlined workflows, improved threat detection, faster incident response, enhanced scalability and flexibility.

That is why one of the parts of developing the NACVIEW system is to empower it with the ability to integrate with solutions used by our current and future customers.

Tests with Stormshield firewall proved that there are many possibilities of integration:

One-Time Password (OTP) Authentication for VPN connections (Stormshield VPN Client)

To enable it Stormshield must be configured in NACVIEW as a network device. The second condition is that the user has the Stormshield VPN Client. The first stage of verifying the user’s identity is checking his credentials in the local NACVIEW database or an external one, e.g. Active Directory. If the login and password are correct, the account is active and the resource is properly configured, the second stage of validation takes place. NACVIEW sends the user an SMS with a verification code, or the code from the NACVIEW Google Authenticator or Google Authenticator app is used which must be entered into the Stormshield VPN Client. After correct verification of the code and its validity, access to specific network resources is granted.

Automatic response for incident alerts received from Stormshield.

To enable it syslog sending must be configured between Stormshield (sender) and NACVIEW (receiver) and rules (events definitions) must be configured. That integration enables organizations to detect and mitigate security threats more effectively and maintain a secure network environment. Potentially dangerous devices could be easily traced in the company network and afterward, quarantine those devices and alert notifications to the security administrator or the Security Operations Center (SOC) personnel, providing them with real-time information about the detected threat.

Stormshield can also issue a “rating” for a given computer/user, and integration via API empowers NACVIEW to quarantine noncompliant devices based on their rating.

If you would like to test more possible integration, write to us on https://community.nacview.com/

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NACVIEW
A powerful network access control (NAC) solution designed to provide organizations with comprehensive visibility and control over their network infrastructure. Developed by leading network security company, NACVIEW offers advanced features and capabilities to ensure secure and efficient network access for users and devices.

The new version of NACVIEW 2.3.18 is now available!

A new version of the NACVIEW system is now available. Version 2.3.18 introduces many expected fixes and improvements. 

One of them is the changed mechanism for upgrading the system to a newer version.

ATTENTION!

Before upgrading NACVIEW to the new version 2.3.18, for each node of the NACVIEW system from the CLI level, select option 7 – NACVIEW update installer.

NACVIEW VM Appliance

NACVIEW VM Appliance

Then the system node must be restarted.

After restarting, the update process can continue normally:

https://docs.nacview.com/en/Step-by-Step/System-update

If you have policies for wireless networks created in the system, before upgrading NACVIEW to version 2.3.18, make sure that such rules are explicitly described in the access policies as relating to wireless networks. If any rules are not configured this way before the upgrade, they may stop working. More information can be found here:

https://community.nacview.com/d/105-set-the-network-type-in-access-policies-before-upgrading

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NACVIEW
A powerful network access control (NAC) solution designed to provide organizations with comprehensive visibility and control over their network infrastructure. Developed by leading network security company, NACVIEW offers advanced features and capabilities to ensure secure and efficient network access for users and devices.

NACVIEW Integration with MICROSENS switches

NAC – Network Access Control solutions rely on switch functionality to enforce access policies in the company network. When a device connects to a switch port, the switch communicates with the NAC system to determine whether the device is compliant with security policies. This is why switches play a crucial role in the NAC implementation in the customer environment. Among the required switch functionalities is the support of authentication mechanisms such as IEEE 802.1X and MAB (MAC Authentication Bypass) to provide access enforcement, as well as support of SNMP, and SSH to provide real-time monitoring. 

Over the last few years, NACVIEW has been implemented in almost every industry. It allowed us to cooperate with a wide range of network devices’ suppliers. As an independent NAC vendor (not a manufacturer of a specific brand), we put a great effort into providing our customers with freedom of choice by letting them decide which switches best suit their needs and by creating integration and smooth support for all possible brands.

Recent implementations on the German market allowed us to configure NACVIEW with MICROSENS switches. MICROSENS is a popular supplier operating in four business areas: Enterprise Networks, Industrial Solutions, Optical Transmission, and Smart Building Solutions.

An example MICROSENS switch configuration can be found in the NACVIEW documentation at: https://docs.nacview.com/en/Device-Configuration/Microsens/Microsens-G6

If you are looking for a switch configuration, please contact our support team or start a discussion on the NACVIEW Community.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NACVIEW
A powerful network access control (NAC) solution designed to provide organizations with comprehensive visibility and control over their network infrastructure. Developed by leading network security company, NACVIEW offers advanced features and capabilities to ensure secure and efficient network access for users and devices.

NordLayer feature release: IP-based split tunneling

At NordLayer, we understand the need for network flexibility, and we’re excited to introduce our latest innovation: IP-based split tunneling. This new release is a major advancement, building upon our URL-based split tunneling feature and opening new doors for our customers’ network security and performance.

With IP-based split tunneling, we’re introducing a more tailored approach to network traffic management. This sophisticated method allows organizations to selectively encrypt network traffic by specifying IP addresses or subnets, ensuring sensitive data transmitted to and from those addresses remains secure and private. By separating encrypted and unencrypted traffic, we help organizations strike a delicate balance between robust security measures and uninterrupted internet performance.

What problem does IP-based split tunneling solve?

IT administrators often face the challenge of balancing network security with optimal performance. NordLayer’s IP-based split tunneling solves this dilemma by enabling selective encryption of traffic for specific IP addresses or subnets.

Click to tweet

Additionally, IP-based split tunneling addresses the issue of managing organization-based network requirements. With the ability to exclusively encrypt traffic, admins can tailor network security to meet changing needs—such as a growing organization or industry-specific compliance requirements—ensuring that critical resources are protected while adapting to dynamic organizational demands.

Pair IP-based split tunneling with granular access control rules enforced through NordLayer Cloud Firewall and you have yourself an unprecedented private resource access solution that meets everchanging business needs.

Feature characteristics: what to expect

IP-based split tunneling brings benefits to IT admins and end-users alike. Admins gain centralized control and improved network management capabilities, while employees experience seamless internet performance.

The key advantages of IP-based split tunneling revolve around enhanced productivity and performance:

  • Optimized internet performance: By selectively routing only specific subnets through the VPN tunnel, organizations can alleviate bandwidth limitations and bottlenecks. Regular internet traffic doesn’t need to be tunneled through the NordLayer gateway, resulting in improved overall network performance.

  • Enhanced VPN performance: With split tunneling enabled, employees can effortlessly access company resources and regular internet services, printers, and other local network devices alike, remaining unaware of the underlying security configurations.

  • Flexibility & control: By excluding non-essential traffic from the VPN tunnel, organizations can achieve better performance for applications and services that don’t require encryption, such as SaaS or VoIP services from globally trusted providers.

  • Security & risk mitigation: IP-based split tunneling enables organizations to balance security and functionality by directing critical internal systems through a VPN and allowing less sensitive web browsing traffic to bypass encryption while keeping the protective layer on through the use of NordLayer’s Secure Internet Access features.

How does IP-based split tunneling work?

IP-based split tunneling is a strategic feature that selectively secures parts of your network traffic. IT administrators can configure specific IP addresses or subnets for encryption, ensuring that only those specified addresses are routed through secure VPN servers.

Click to tweet

This targeted encryption approach strikes the perfect balance between security and performance—your sensitive data remains protected without any impact on the speed of web browsing.

Each dedicated server can be configured with up to 16 CIDRs at a time and there is no limit to how many servers can be used in a single Virtual Private Gateway.

Configuring split tunneling is straightforward and accessible with our Core and Premium subscription plans. This feature is particularly useful for Premium subscribers who can use the Site-to-Site capability to access private network subnets through the NordLayer gateway.

To enable this feature, follow these simple steps:

  1. Navigate to the Network section in the NordLayer’s Control Panel

  2. Select Servers and then choose Configure from the options presented

  3. From the dropdown menu, select Split Tunneling

  4. Input the desired IP addresses and subnets you wish to tunnel through NordLayer

By specifying these addresses, you ensure that only the designated traffic uses the NordLayer tunnel, while other traffic utilizes the direct internet route.

Productivity by design

Our first release, URL-based split tunneling for Browser Extension, offered flexibility by leaving certain domains unencrypted while encrypting the rest of the traffic. Now, with IP-based split tunneling for desktop and mobile apps, we’re taking it a step further, allowing organizations to pinpoint exactly which IP addresses require encryption.

The beauty of our twofold approach lies in the different strategies employed. URL-based split tunneling creates exceptions by excluding specific domains, while IP-based split tunneling includes only specified IP addresses for a more targeted encryption process. Together, they form the foundation of our VPN split tunneling feature, enhancing network efficiency, reducing congestion, and optimizing bandwidth usage.

We understand that network security can be complex, and our goal is to provide organizations with the tools they need to navigate it with confidence. Our innovative duo of URL-based and IP-based split tunneling increases flexibility, allowing our customers to customize their network security according to their needs.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Armor your Achilles’ heel. Reduce your business’ attack surface vectoring from employee mobile devices

The number of Android threats detected by ESET telemetry in the past four years has tripled. 

Trojanized chat apps, software development kits turning legitimate apps into spyware, or fake websites offering malicious mobile applications — these are just a handful of the growing number of threats targeting smartphone users in the past few months discovered and analyzed by ESET researchers.

While these threats may sound like the personal problems of private individuals using their own devices, various surveys show that smartphone equipped rank-and-file employees are in fact yet another attack surface for businesses, one that should be prioritized. 

And that’s not easy. Even with thorough cyber-awareness training, there is still a good chance that an employee will fall victim to a sophisticated attack and become the Achilles’ heel in an otherwise first-rate defense of their respective business.

Being aware of this, ESET has introduced a new Mobile Threat Defense module to its comprehensive business solution ESET PROTECT, with sweet pricing available for the Advanced tier and higher. Users of ESET PROTECT Advanced and higher can enjoy one free mobile device seat per one paid seat for other devices. 

Growing numbers

To understand the scope of the problem, let’s review some key data from ESET telemetry. From the beginning of 2020 until the end of 2023, detections of Android malware rose by 222%. ESET Threat Reports provide further insight as to why this number has more than tripled in just four years.

In 2021, ESET telemetry detected a 428% annual increase in Android banking malware. The following year, the overall increase was driven by adware. And 2023 saw a significant increase in Android spyware cases.

If you are asking what it means for your business, check out the results of the surveys discussed below. 

A 2022 survey of working adults and IT security professionals from across the world revealed that half of the respondents used their employer-issued devices to check personal emails and messages. A further 45% used their work devices for reading news stories, while 32% shopped online.

Ironically, emails, online shops, and even news portals were the precise attack vectors described in several pieces of ESET research in 2023.

When it comes to employees using their own devices, 48% of organizations deploying a Bring Your Own Device (BYOD) policy witnessed malware being introduced through an employee’s personal phone, according to a Samsung 2023 survey.

If you wonder what’s behind these compromises, another 2022 survey found that the most common mistake contributing to cyber incidents is employees’ poor password hygiene and misuse of personal email.

Real-life examples

Maybe those numbers are too general, so let’s see some real examples of how a malicious app installed on an employee’s smartphone can endanger the whole company.

Last year, ESET researchers published a blog about two campaigns targeting Android users that had been active since July 2020 and July 2022, respectively, and were distributed across several app stores and dedicated websites. 

The threat actors in question patched open-source Signal and Telegram apps for Android OS with malicious code that ESET researchers later identified as BadBazaar. These malicious apps went by the name Signal Plus Messenger and FlyGram, and their purpose was to exfiltrate user data, such as contacts, call logs, and the users’ list of Google accounts.

The Signal Plus Messenger app proved even more dangerous than FlyGram with its unique capability to spy on the victim’s communications in the legitimate Signal app, an app that is often praised for its reliability and that is trusted by high-value targets, such as journalists.

However, after installing Signal Plus Messenger, threat actors were able to connect the compromised device to the attacker’s (Signal equipped) device and read its messages. Such sensitive information could be used in further spear phishing attacks against business officials.

A similar case was covered in June 2023, when ESET researchers published research on Android GravityRAT spyware. This malware was distributed within the malicious but functional messaging apps BingeChat and Chatico — both based on the OMEMO Instant Messenger app. The spyware can exfiltrate call logs, contacts, SMS messages, the device location, basic device information, and files with specific extensions, such as jpg, PNG, txt, pdf, etc.

If your company has a BYOD policy, taking an interest in Android malware, the threat behind the 89% increase in ESET telemetry detections in the second half of 2023 is a must. This increase was primarily due to a mobile marketing software development kit (SDK) that ESET identifies as SpinOk Spyware.

This SDK was offered as a gaming platform and was incorporated into numerous legitimate Android applications, including many available on official app marketplaces. Once an app with the aforementioned SpinOK SDK is installed, it operates like spyware, connecting to a command-and-control server and extracting a range of data from the device, including potentially sensitive clipboard (short-term storage) contents.

Again, this attack can impact employees who might “Game” on their smartphones, gathering sensitive data that can later be used against their company.

Other attacks

So far, we have been describing spyware detected by ESET researchers during past year, but there are also other threats to business coming from mobile devices. 

  • Other malicious apps – Not all malicious apps are spyware going after messages and files in a mobile device. Some of them, for example, try to lure victims into giving their bank account credentials or encrypt files in the victim’s device and ask for a ransom.
  • Phishing – Some of the biggest data breaches in history started with one employee falling for a phishing message, giving credentials, and letting cybercriminals enter the company’s network. 
  • Physical theft – Physical theft or loss of a corporate mobile device could be a serious cyber incident, especially if the smartphone or tablet contains sensitive information and is locked by a weak password. And such things happen often. In London alone, 90,864 phones were stolen in 2022. 
  • Vulnerabilities – If you think that you are safe with using only standard cloud-based team communications platforms such as Microsoft Teams or Slack, think twice. Vulnerabilities and bugs that can lead to a data breach don’t spare even the biggest names on the market.
  • Worms – Because laptops and smartphones use different operating systems, it is rare to see one malware that spreads and executes in different environments. However, there have been cases such as the Hamweq.A worm, which used smartphones as carriers to spread malware into Windows PCs via the USB cable.

Valuable targets

Most employees probably don’t use their mobile devices for accounting, coding, or administrative duties, but previously mentioned real-life cases clearly show that they are valuable targets for cybercriminals nonetheless. This makes them a potential liability to a business’s cyberdefenses.

This is why having complex, multilayered protection of your mobile devices within a unified cybersecurity platform is so important. If you want to protect that Achilles’ heel and are interested in ESET solutions for companies and their mobile devices, click here

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×