Skip to content

Simply NUC and Scale Computing Continue to Join Forces to Deliver Next Generation Edge Solutions

Simply NUC and Scale Computing Announce Integration on the Onyx NUC

AUSTIN, Texas; BELFAST, United Kingdom; DUBLIN, Ireland — May 29, 2024 Simply NUC, a leading provider of customized computing solutions, announced an exciting collaboration with Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, enabling Scale Computing Platform (SC//Platform) certification and integration on the Simply NUC Onyx PC. This announcement marks a significant milestone between Simply NUC and Scale Computing in delivering superior computing and management capabilities on an expanded offering of compact hardware tailored for edge computing applications.

Edge computing, a paradigm shift in the IT landscape, demands efficient and reliable infrastructure that can handle diverse workloads while ensuring seamless management. Recognizing this need, Simply NUC and Scale Computing have come together to empower enterprise businesses with a robust solution that combines the power of Scale Computing HyperCore (SC//HyperCore) with the performance and flexibility of the Simply NUC Onyx PC.

The Onyx NUC is purpose-built for edge computing environments, offering a compact yet powerful computing solution that fits seamlessly into diverse deployment scenarios. With SC//HyperCore and Scale Computing Fleet Manager (SC//FleetManager) licenses pre-integrated on v9 and v5 units, businesses can now leverage the combined strengths of both technologies to achieve unparalleled efficiency, scalability, and manageability at the edge.

Key benefits of this collaboration include:

  1. Superior Computing Performance: The Onyx NUC, equipped with SC//HyperCore and SC//Fleet Manager, delivers exceptional computing power tailored for edge workloads, ensuring smooth operations even in demanding environments.
  2. Efficient Management: SC//Platform on Onyx NUC enables simplified management of edge infrastructure, allowing businesses to streamline operations and reduce overhead costs.
  3. Scalability: With the ability to scale resources dynamically, businesses can adapt to evolving workload demands without compromising performance or reliability.

“We are thrilled to collaborate with Simply NUC to bring this expanded and innovative small form factor hardware solution to market,” said Craig Theriac, VP of Product Management, of Scale Computing. “By combining Scale Computing’s innovative software with the Onyx NUC, we’re empowering businesses to unlock new possibilities in edge computing, enabling them to achieve greater agility, efficiency, management and performance.”

Scale Computing brings together simplicity and scalability with an edge computing platform that is easy to use, easy to manage, and easy to deploy. Scale Computing Platform (SC//Platform) replaces existing infrastructure, empowering enterprises to run applications and process data outside centralized data centers, at the edge of their networks, closest to where data is created and utilized. With SC//Fleet Manager, the industry’s first cloud-hosted monitoring and management tool built for hyperconverged edge computing infrastructure at scale, customers can quickly identify areas of concern using a single pane of glass, scaling from 1 to over 50,000 clusters. Zero-touch provisioning allows administrators to centrally monitor and manage hundreds or thousands of distributed edge infrastructure deployments with few or no on-site IT personnel.

This certification represents a commitment from both Simply NUC and Scale Computing to deliver best-in-class small form factor solutions tailored for the unique challenges of edge computing. Together, they aim to redefine the edge computing landscape and empower businesses to thrive in a rapidly evolving digital world. For more information, visit simplynuc.com/scale-computing/.

About Simply NUC

Formed in 2015 and headquartered in Round Rock, Texas, Simply NUC, Inc. is a global systems integrator and OEM specializing in customized small form factor PCs. Simply NUC provides fully configured, warrantied, and supported PC systems to businesses, as well as end-to-end NUC project development, custom operating system installations, and NUC accessories. For more information about Simply NUC visit http://www.simplynuc.com.

About Scale Computing

Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Using patented HyperCore™ technology, Scale Computing Platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime, even when local IT resources and staff are scarce. Edge Computing is the fastest-growing area of IT infrastructure, and industry analysts have named Scale Computing an outperformer and leader in the space, including being named the #1 edge computing vendor by CRN. Scale Computing’s products are sold by thousands of value-added resellers, integrators, and service providers worldwide. When ease-of-use, high availability, and TCO matter, Scale Computing Platform is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, G2, and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

What is a DMZ Network?

Every successful businessperson knows the value of strategic disclosure. Most, if not all, would advise you to share only that information with the public that is essential for success, only some things that can be shared. This principle applies to your private life as well. For instance, you don’t invite everyone into the intimate sections of your home. Instead, you carefully select the individuals permitted into your inner circle and the specific areas of your home where you engage with them. 

Similarly, in the digital realms, you can establish dedicated virtual zones where outsiders can interact with only as much information as you deem appropriate. This is where the term ‘DMZ’ comes into play.

What is a DMZ network, exactly?

Generally speaking, a DMZ (Demilitarized Zone) network is an isolated network segment that works as a buffer between an organization’s internal network and the external, untrusted network. So, when somebody asks, ‘What is DMZ in networking?’, you can explain that it’s like a safety zone for the company’s online services, keeping them separate from the internal network so it is protected against potential threats from the internet.

A DMZ network serves as an additional layer of security, allowing you to host things like your website or email server in this semi-secure area.

How does a DMZ network work?

In the context of DMZ cybersecurity, a typical configuration involves positioning the DMZ between two firewalls, forming what is commonly known as a “dual firewall” architecture. These firewalls are used to enforce security policies or, more precisely, to determine which types of traffic are allowed to pass through based on predefined rules.

This means that, for instance, web or email servers in the DMZ may be accessible, but direct access to internal resources is blocked. This two-firewall approach helps organizations establish a strong security perimeter, protecting sensitive internal networks from external threats while still enabling access to public services.

Another popular approach is the ‘single-firewall DMZ,’ where only one firewall separates the DMZ from both the external and internal networks. This firewall is configured with rules to control traffic entering and leaving the DMZ, allowing specific types of traffic to reach public-facing services while restricting direct access to internal resources.

While simpler and more cost-effective than a dual firewall setup, a single-firewall DMZ may provide less rigorous security measures, potentially increasing the vulnerability of internal networks to external threats.

Here’s a quick comparison of the two discussed DMZ network architectures:

Dual-firewall design:

  • Uses two firewalls, one that separates the internal network from the DMZ, and the other that separates the DMZ from the external network.

  • The so-called ‘outer firewall’ filters incoming traffic, allowing only specific types to access the DMZ.

  • The ‘inner firewall’ monitors outgoing traffic from the DMZ and blocks unauthorized access to the internal network.

Single-firewall design:

  • Uses only one firewall deployed between the internal network and the DMZ.

  • First, internet traffic reaches the firewall. Then, based on predefined rules, the firewall directs appropriate traffic to either the DMZ or the internal network.

Benefits of using a DMZ network

As you can imagine, based on what we’ve discussed so far, there are many benefits to using a demilitarized zone network. Still, three are especially significant: Enabling access control, preventing network reconnaissance, and blocking internet protocol spoofing.

The first one, enabling access control, involves regulating and monitoring incoming and outgoing traffic to ensure only authorized users and data can access your internal network. This is done, of course, to reduce the risk of unauthorized access.

Preventing network reconnaissance helps companies conceal the details of their internal networks from potential attackers. This protection is crucial because it stops attackers from gathering information about the network’s structure and vulnerabilities.

Last but not least, blocking IP spoofing ensures that malicious entities cannot disguise their identity to gain unauthorized access and launch cyber attacks. This is essential for maintaining the integrity of network communications and preventing security breaches.

Why are DMZs important?

DMZ networks are crucial for enhancing network security by creating that additional layer between an organization’s internal network and external networks. By isolating specific services, such as web and email servers, from the internal network, they reduce the risk of broader breaches if these services are compromised. So, by acting as a buffer zone, DMZ networks, often implemented through a dedicated DMZ server, provide an extra obstacle for attackers, improving an organization’s overall security posture.

Examples of DMZs

Here are a few demilitarized zone network examples that can help you better understand how they can boost an organization’s cybersecurity.

Web servers

These servers host websites and web applications and act as the interface for online services that interact with external networks. By placing them in a DMZ, organizations can allow access to web content while reducing the risk of direct attacks on internal networks.

FTP servers

FTP servers, commonly employed for transferring files across networks, frequently store confidential information. Including them in a DMZ network allows external users to securely access files without jeopardizing the security of the internal network.

DNS servers

DNS servers are essential for internet communication, translating domain names into IP addresses. Putting them in a DMZ network can help prevent DNS attacks and reduce the likelihood of unauthorized access to sensitive network resources.

Proxy servers

When placed between clients and external servers in a DMZ architecture, proxy servers allow organizations to control and monitor internet traffic, safeguarding internal resources from potential threats by avoiding direct exposure.

VoIP servers

VoIP servers, which enable voice communication over the internet, are placed in a DMZ to ensure the security and reliability of voice services while shielding internal networks from unauthorized access and potential cyber-attacks.

How a password manager fits in the context of DMZ networks

Using a DMZ network to host various services and data is a great way to boost your organization’s cybersecurity. However, it’s not the only step you should take. Being cyber secure involves effectively addressing many challenges associated with keeping things private. For instance, while you can place email servers in the DMZ, it doesn’t mean individual company emails will be fully protected from potential hacks and data breaches.

To solve this problem, you’ll need to utilize other tools. For instance, a robust password manager like NordPass offers advanced encryption and secure storage for your email account credentials. It also includes features such as the Password Generator and Data Breach Scanner, which help create strong, unique passwords for each email account and allow you to check if your email credentials have been compromised in a data breach.

Developing a DMZ network is not the end of the line. It’s just a part—albeit very significant—of improving an organization’s security posture. Therefore, if you want to ensure that your company is well protected against cyber threats, you also need to use other solutions, like password managers, to further enhance your cybersecurity strategy.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Browser Vulnerabilities: A Threat to Small Businesses MSPs & IT Service Providers

Highlights:

  1. Small businesses and Managed Service Providers (MSPs) are particularly vulnerable to browser exploits, such as CVE-2024-4761.
  2. The impact of such vulnerabilities can be devastating, potentially leading to data breaches, financial loss, and reputational damage.
  3. Practical steps can be taken to mitigate these risks, including regular updates, managed browser policies, and proactive security measures.

Browsers are an essential part of modern business operations, enabling access to the internet and various intranet resources. With Chrome, Safari, Firefox, and Edge dominating the market, it’s easy to see why maintaining browser security is crucial. For small businesses and Managed Service Providers (MSPs), the implications of browser vulnerabilities like CVE-2024-4761 can be particularly severe.

Understanding the Impact

Small businesses often lack the extensive IT infrastructure and dedicated cybersecurity teams that larger organizations have. This makes them attractive targets for cybercriminals, who exploit vulnerabilities in widely used software. The CVE-2024-4761 vulnerability in Chrome is a prime example. This flaw, present in versions prior to 124.0.6367.207, allows remote attackers to execute arbitrary code via a crafted HTML page, exploiting an out-of-bounds memory write in the V8 JavaScript engine.

For MSPs, the stakes are even higher. MSPs manage IT services for multiple clients, meaning a single vulnerability can compromise numerous businesses. An exploit like CVE-2024-4761 could lead to widespread data breaches, jeopardizing client trust and causing significant financial and reputational damage.

Consequences for Small Businesses and MSPs

  1. Data Breaches: Exploiting browser vulnerabilities can give attackers access to sensitive information, including financial records, personal data, and proprietary business information. This can lead to identity theft, financial loss, and intellectual property theft.
  2. Financial Loss: The costs associated with a data breach can be staggering. Small businesses may face fines, legal fees, and the costs of implementing additional security measures. For MSPs, the financial repercussions are multiplied across their client base.
  3. Reputational Damage: Trust is a cornerstone of business relationships. A breach can erode customer trust, lead to loss of business, and damage the reputation of both small businesses and MSPs.

Practical Tips for Staying Protected

To mitigate the risks associated with browser vulnerabilities, small businesses, and MSPs should implement the following measures:

  1. Regular Updates: Ensure all browsers are up-to-date with the latest security patches. Automated updates can help maintain the most current protection.
  2. Managed Browser Policies: Utilize managed browser solutions to enforce security policies across all user accounts. This includes configuring safe browsing settings and restricting access to risky websites.
  3. Comprehensive Security Solutions: Employ robust security software, including antivirus programs and firewalls, to add layers of defense against potential exploits.
  4. Employee Training: Educate employees about the risks of browser vulnerabilities and safe browsing practices. Regular training can help prevent accidental exposure to malicious websites.
  5. Vulnerability Management: Conduct regular vulnerability assessments to identify and address potential security gaps. Use tools to monitor browser versions across the network and ensure compliance with security policies.
  6. Incident Response Plan: Develop and maintain an incident response plan to quickly address and mitigate the impact of any security breaches.

By staying vigilant and proactive, small businesses and MSPs can significantly reduce the risk posed by browser vulnerabilities like CVE-2024-4761. Ensuring robust security practices not only protects sensitive data but also upholds the trust and integrity of their operations.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

24.5.0 ‘Enceladus’ released

Enceladus is the latest entry in our quarterly rollup series. It branches off from our main rolling Voyager development into a fixed target for our partners to qualify and build upon. 

Enceladus is a moon of Saturn and is named after the giant Enceladus of Greek mythology. There are a few worlds that are thought to have liquid water oceans beneath their frozen shell, but Enceladus sprays its ocean out into space where spacecraft can sample it. From these samples, scientists have determined that Enceladus has most of the chemical ingredients needed for life, and likely has hydrothermal vents releasing hot, mineral-rich water into its ocean. Enceladus is about as wide as Arizona, and it also has the most reflective surface in our solar system. Because it reflects so much sunlight, the surface temperature is extremely cold, about minus 330 degrees Fahrenheit (minus 201 degrees Celsius).

As for the software, Comet 24.5.0 Enceladus brings 6 new features and 38 enhancements, including Changed Block Tracking support for Hyper-V and adding Impossible Cloud as a Storage Template provider.

As always for a new quarterly release, there are two changelogs for 24.5.0 Enceladus depending on whether you are coming from the previous quarterly release or the previous Voyager release:

Changes compared to 24.2.3

New Features

  • Added a new restore option to only overwrite existing files if there is a difference in file content already written to the restore location
  • Added a new permission for enabling/disabling the ability for an admin account to delete a Storage Vault
  • Added new SMB Storage Vault type
  • Added Impossible Cloud as a Storage Template provider
  • Added new “Latest VM State (Changed Block Tracking)” option for Hyper-V for improved backup performance
  • Added support for selecting Windows drives by drive letter when configuring a Disk Image Protected Item

Enhancements

  • Added informational headers to job logs that are exported to CSV (now renamed to Text) or Excel. Previously these headers were only included when exporting to Clipboard
  • Added the ability to select which logs are exported from the Server Logs and Job Logs pages in the Comet Server web interface
  • Removed Object Lock options from Storage Role in the Comet Server web interface and the Comet Server Service Manager
  • Added a warning when starting the Comet Server starts if the Storage Role is detected to be using Object Lock
  • Enabled Server Self-Backup by default for new Comet Server installations. This will not affect existing Comet Servers when they are upgraded
  • Removed the File column on the Server Logs page on the Comet Server web interface
  • Added a Last Message column to the Server Logs page on the Comet Server web interface
  • Backup job logs now appear in the Console app on macOS
  • Installing the Comet Client on Linux devices no longer echoes password characters to the terminal
  • Improved the performance of the Comet Server when a large number of devices resume their live connection
  • Added “Account Name” as an additional data column to the Devices page in the Comet Server web interface
  • Improved the performance of browsing files and folders for granular restores
  • Reduced the amount of data downloaded while browsing files and folders for granular restores
  • Improved the performance of simulated granular restores
  • Implemented restoration of metadata for files and folders restored during granular restore
  • Improved the performance of granular restores when restoring directories containing few files
  • Improved error handling when a file or folder fails to restore correctly in granular restores
  • Refreshed the UI for the Protected Item wizard in the Comet Backup desktop app
  • “After” tasks will now run even for jobs which have been cancelled
  • Changed “Job History” on the Comet Server web interface to “Job Logs”
  • Added an option to the IAM-Compatible Storage Template to choose between creating buckets or subfolders
  • Added an option to the IAM-Compatible Storage Template to support Object Lock
  • Added an option to the IAM-Compatible Storage Template to support creating buckets in non-default S3 regions
  • Added “days” as a unit to the Object Lock settings field when configuring a Storage Vault with Object Lock in the Comet Server web interface
  • Improved load performance of Server Logs page on the Comet Server web interface
  • Added retrying for intermittent errors that occur when restoring data to UNC paths
  • Added the ability to configure SQL timeouts for MSSQL restores
  • Improved error message output for when a Hyper-V backup fails due to Hyper-V not being installed on the endpoint
  • Added additional threading to single file downloads from Microsoft 365, and added retry logic for when the download URL has expired. Expired URLs can cause 401 errors.
  • Added a label in the Comet Server web interface and the Comet Backup desktop app to distinguish if Protected Items are enforced via the policy
  • Added the ability to convert Windows System Backup Protected Items to Disk Image Protected Items via the Users tab and Bulk Actions dropdown in the Comet Server web interface
  • Improved Microsoft 365 Drive downloads by adding configurable account concurrency and adding concurrency to single file downloads
  • Added configuration to the Comet Server to set the maximum number of CPU cores that are allowed to be used when generating new builds of the Comet Backup client software
  • Added a new environment variable (COMETD_TMPDIR) to allow configuration of the temp directory used by the Comet Server when running in Linux

Changes compared to 24.3.9

Enhancements

  • Added Object Lock support to the Impossible Cloud Partner API Storage Template
  • Added the ability to specify MIME types and content in custom remote bucket Storage Vault templates
  • Improved Microsoft 365 account listing to handle uniqueness when multiple resources have the same display name
  • Improved Microsoft 365 account listing to check and delist accounts that are not allowed to be accessed via Graph API

Bug Fixes

  • Fixed an issue on the Comet Server web interface causing contrast issues for download icons in dark mode

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×