Skip to content

Scale Computing Named a Finalist in CRN’s 2024 Tech Innovator Awards

Scale Computing Autonomous Infrastructure Management Engine Honored in Edge Computing/Internet of Things Category 

INDIANAPOLIS — July 31, 2024 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced that CRN®, a brand of The Channel Company, named Scale Computing as a finalist for the 2024 CRN Tech Innovator Awards. Scale Computing was recognized for its Scale Computing Autonomous Infrastructure Management Engine (AIME) in the Edge Computing/Internet of Things category.

Scale Computing Autonomous Infrastructure Management Engine (AIME) is the orchestration and management engine that powers Scale Computing HyperCore (SC//HyperCore), the award-winning self-healing platform that identifies, reduces, and corrects problems in real-time. AIME handles day-to-day administrative tasks and maintenance automatically, monitors the system for security, hardware, and software errors, and remediates those errors where possible. It identifies the root cause and minimizes the impact of those issues when it cannot repair them automatically, notifying users with specific problem determination and action, versus just sending a stream of data that must be interpreted.

“Our mission is to deliver innovative, intelligent, and simple solutions that enable our partners and customers to successfully and reliably save time and resources with their IT infrastructure. AIME drastically reduces the amount of effort required to deploy, secure, manage and maintain on-premises infrastructure. It’s a core feature of SC//HyperCore, which is the ideal solution for MSPs as it saves time and valuable resources because software, servers, and storage are in one fully integrated platform,” said Jeff Ready, CEO and co-founder of Scale Computing. “Scale Computing is honored to be recognized by CRN and remains committed to providing our partners and customers with solutions that bring simplicity and scalability together, replacing existing infrastructure and providing high availability for running workloads, regardless of any hardware requirements. We’re excited to be named a CRN Tech Innovator finalist.”

This annual award showcases innovative vendors in the IT channel across 36 distinct technology categories ranging from cloud to storage to networking to security. The 2024 winners were selected by a panel of CRN editors who reviewed hundreds of vendor entries and solution provider testimonials. Standout innovators were selected as finalists based on a number of criteria, including key capabilities, uniqueness, technological ingenuity, and ability to address customer and partner needs.

“We are pleased to recognize the commitment to continuous innovation among this year’s CRN Tech Innovator Award finalists. Each of these vendors delivers cutting-edge technology that meets evolving customer needs and creates new opportunities for solution providers and the broader IT channel ecosystem,” said Jennifer Follett, VP, U.S. Content, and Executive Editor, CRN, The Channel company. “We look forward to future innovations from the recipients and to seeing how their solution provider partners use these offerings as the foundation of new, inventive solutions.”

The Tech Innovator Awards Finalists can be viewed online at crn.com/techinnovators. Winners will be announced on crn.com on August 7, 2024 and will be featured in the August issue of CRN.

To learn more about the award-winning Scale Computing Autonomous Infrastructure Management Engine and Scale Computing HyperCore, please visit scalecomputing.com/sc-hypercore.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

How to find VMware/Broadcom ESXi installs on your network

Latest Broadcom ESXi vulnerabilities 

Broadcom has disclosed a vulnerability in their ESXi product that involves a domain group that could contain members that are granted full administrative access to the ESXi hypervisor host by default without proper validation.

CVE-2024-37085 is rated medium with CVSS score of 6.8 and allows an attacker with sufficient Active Directory (AD) permissions to bypass authentication.

What is the impact?

A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group (‘ESXi Admins’ by default) after it was deleted from AD. The three ways this can be exploited are:

1. Creating the AD group ‘ESX Admins’ to the domain and adding a user to it (known to be exploited in the wild)

2.
Renaming another AD group in the domain to ‘ESX Admins’ and adding a new or existing user to it

3.
Refreshing the privileges in the ESXi hypervisor when the ‘ESX Admin’ group is unassigned as the management group.

Are updates or workarounds available?

Product

Version

Fixed Version

Workarounds

ESXi

8.0

ESXi80U3-24022510

KB369707

ESXi

7.0

No Patch Planned

KB369707

VMware Cloud Foundation

5.x

5.2

KB369707

VMware Cloud Foundation

4.x

No Patch Planned

KB369707

 

How to find potentially vulnerable systems runZero

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

os:ESXi

Additionally, using the runZero VMware integration, use the following query to locate virtual machines running inside VMware, which could be potential sources of exploitation:

source:vmware or source:broadcom

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Why passwordless authentication is the way forward

Moving beyond passwords

Passwords have been the go-to method for securing access to online accounts and data from the early days of the Internet. However, as cyberattacks grow increasingly sophisticated, relying solely on passwords may no longer suffice.

Hacker-controlled machines are now too good at cracking them, particularly because many people use weak or reused passwords across multiple accounts, unaware that this practice makes the attackers’ job effortless.

And so, the time has come to move beyond passwords and adopt more modern standards to safeguard digital assets. In other words, it’s time to go passwordless.

What is passwordless authentication?

Passwordless authentication is a cybersecurity method where users can access a service or application without entering a password. How does passwordless authentication work then? It allows users to utilize alternative authentication factors such as fingerprints or face IDs to verify their identity while logging into a service.

The goal of passwordless authentication is to provide a more convenient alternative to traditional passwords that can not only maintain but also enhance the level of protection against cyberattacks.

Types of passwordless authentication

Passwordless authentication can take many forms; however, some are now more popular than others. Let’s now go through a few of the commonly used authentication techniques that do not require passwords.

Biometric authentication

Probably the most popular passwordless authentication method available today, biometrics involves using built-in scanning tools on devices to verify unique biological characteristics such as fingerprints or facial features to confirm a user’s identity. This method has become highly popular because most modern mobile phones support it. Also, fingerprints can’t be as easily stolen as James Bond movies might suggest, which makes biometric authentication a more secure option than passwords.

Authentication apps

This popular password-free authentication technique uses a dedicated app to generate time-limited codes for accessing accounts, ensuring high security. It works well because most people have their mobile phones with them, making it easier to check the app for a code than to remember all their passwords for different online accounts.

Hardware Tokens

Generally speaking, hardware tokens are physical devices that generate authentication codes or utilize cryptographic keys to grant access to systems. They are quite popular due to their reliability in providing a second factor of authentication, which significantly enhances security. Also, hardware tokens do not rely on internet connectivity or software, making them more resilient against many forms of cyber threats.

With this method, users receive a link via email that, when clicked, allows them to log in to their account without entering a password. This approach simplifies the login process while ensuring security, as the link is usually valid for a limited time and can only be used once.

Passkeys

Compared to other types of passwordless authentication described in this section, passkeys are the new kid on the block, though already quite popular. Passkeys typically involve using a pair of cryptographic keys: a private key stored on the user’s device and a corresponding public key on the website’s server. Access is granted when these keys are successfully matched in a process often initiated through biometrics. This approach enhances convenience and significantly boosts security because attackers must acquire both keys to gain unauthorized access. Stealing the private key from the user’s device is extremely difficult.

The benefits of passwordless authentication

As we’ve already covered in this article, the benefits of passwordless authentication are plenty. These advantages become even clearer when compared to what passwords can provide. So, let’s delve into each major benefit in detail, starting with…

1. Enhanced security

The first, and arguably the most important, benefit of passwordless authentication is that it provides much more protection than traditional passwords. This is because it eliminates vulnerabilities commonly associated with password-based systems, such as phishing, brute-force attacks, and password reuse. With passwordless methods like biometrics or passkeys, authentication relies on unique and difficult-to-replicate factors, significantly reducing the risk of unauthorized access. As a result, adopting passwordless authentication strengthens overall security posture and helps keep outsiders at bay.

2. Ease of use

When it comes to user convenience, passwordless authentication delivers a knockout blow to passwords, preventing them from getting back up. Firstly, the passwordless approach is much faster as it allows users to log in to a service or application with one click, whereas with passwords… well, you know the drill. Secondly, with passwordless authentication, users don’t have to remember anything, freeing their minds and preventing the frustration of repeatedly entering incorrect passwords. And thirdly, this ease of use extends to business as well, preventing account lockouts and shopping cart abandonments, and keeping customers happier and more willing to use a given service.

3. Reduced password-related support

Unlike traditional authentication methods that frequently lead to forgotten passwords and subsequent support requests, passwordless authentication effectively eliminates these issues. This significantly reduces the need for password-related support, saving time and resources while enhancing user satisfaction with a seamless login experience.

4. Enhanced regulatory compliance

Embracing passwordless authentication is a strategic way for businesses to boost their compliance with regulations on data privacy. How so? By adopting secure methods like biometrics or passkeys, organizations can meet diverse data protection requirements without compromising user convenience. This proactive approach not only helps mitigate financial and reputational risks associated with non-compliance but also builds trust among customers and stakeholders.

 

Passwordless authentication use cases

With the support of organizations such as the FIDO Alliance, which helps develop authentication standards to reduce the world’s reliance on passwords, passwordless authentication methods have become highly popular among key players across all industries.

This should come as no surprise, especially considering that, according to a study by Secret Double Octopus and the Ponemon Institute called “State of Workforce Passwordless Authentication,” organizations can save up to $1.9 million by implementing passwordless authentication methods.

This explains why Microsoft has been promoting passwordless authentication through Windows Hello; why Amazon, Apple, and Google have introduced support for passkeys in their services; why Twitter offers password-free login options through third-party authentication apps and security keys; and so on — almost everywhere you look, a password-free login option is available. As a result, passwordless authentication is used today by millions of users worldwide and is gradually pushing passwords out of the picture.

How to enable passwordless authentication on your service

If your website or application requires customers to log in but doesn’t offer passwordless options, consider adding this feature to your to-do list. The answer to whether your company and your customers will benefit from that is undoubtedly yes. The real question is: how can you integrate a password-free login option effectively?

Well, although you can hire a team of IT professionals and ask them to write passwordless logins into your code, this approach requires significant upfront investment and is rather time-consuming.

Fortunately, there are alternatives. For example, you can use Authopia by NordPass, a free tool that allows you to easily add a passkeys widget to the login form on your website or service. Here’s how it works: you receive pre-written code that even those with basic IT skills can implement, you activate the widget by registering with Authopia, and voilà — you have a password-free login option up and running!

As already mentioned, Authopia is free to use, which means you can quickly integrate passkey logins into your service and observe improvements in sign-ups and conversions today. So, don’t miss out on this opportunity!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Trello data breach: Immediate steps for users

Using Trello? Your data may have been exposed

In case you haven’t heard, Trello, the popular project management tool from Atlassian, just experienced a major breach. Hackread reports that a staggering 21.1 GB of Trello data has been leaked online, putting millions of users’ sensitive information at risk.

If you’ve used Trello recently or in the past, your data might have been affected too. We’re here to fill you in on what happened, provide tips on how to minimize the impact of the breach, and offer advice on how to protect your data effectively, whether you’re an individual user or a business.

Trello breach: what happened, exactly?

According to Hackread, a hacker known as “Emo” has leaked over 20 GB of Trello data on a cybercrime platform called Breach Forums. The hacker claims to have stolen the data back in January 2024 but did not publish it until Tuesday, July 16. The leaked data includes details on millions of Trello users, such as their usernames, legal names, email addresses, associated memberships, and status information.

“Emo” detailed how they broke into Trello by exploiting a vulnerable open API endpoint that didn’t require a login. This vulnerability allowed the hacker to link email addresses to Trello accounts, exposing the identities of Trello users. The hacker then continued to exploit this vulnerability and, as they said, spread the breach out of boredom. This resulted in data being stolen from millions of Trello users, putting everyone affected at serious risk.

How Trello users should respond

While the news of a major data breach can be alarming, it’s crucial to know that there are steps you can take right away to protect yourself and minimize the damage.

First, check if your data was compromised in the Trello breach. You can use our free online Data Breach Scanner to quickly assess your exposure. If the scan indicates that your data is safe, that’s great! However, if it shows that your information has been leaked, you’ll need to take further action.

If your data has been exposed, immediately change your Trello password to prevent unauthorized access. Also, update the passwords for any other accounts where you use the same password to keep your information secure – better safe than sorry.

Next, keep a close eye on your account activity for any unusual actions that could suggest someone else has gained control. Be vigilant for phishing emails, as cybercriminals may use your email address from the breach to send fake messages pretending to be from Trello. These could be attempts to take over your account, install malware, or trick you into providing more personal information. Stay cautious!

What should businesses do in this situation?

The Trello breach is just the tip of the iceberg. This month alone, we’ve heard of reports of two other major companies, AT&T and Disney, falling victim to cyberattacks with their data ending up on crime forums. It’s a stark reminder that no business is too big or too small to be targeted.

To prevent data leaks and unauthorized access, businesses can take a few key steps to stay ahead of threats. These include:

  • Use a data breach monitoring tool: Regularly scan your systems for vulnerabilities and potential breaches – a good breach monitoring tool will help you identify weak points in your security before hackers can exploit them.

  • Monitor account activity: Keep an eye on who’s accessing your resources and watch for any unusual or unauthorized activity that might indicate a security issue.

  • Enforce a strong password policy: Implement guidelines on password complexity to make sure all employees use strong, unique passwords for their business accounts.

  • Educate your team: Hold training sessions to make sure all employees know how to recognize phishing attempts, create strong passwords, and handle sensitive data securely.

  • Implement multi-factor authentication (MFA): Ask for an extra layer of verification beyond just passwords to make it more difficult for anyone trying to gain unauthorized access.

How NordPass can help protect you or your organization

Whether you’re just a regular user of services like Trello, or a company looking to safeguard your digital assets, NordPass is a solution that can significantly boost your cybersecurity without a hassle.

For individuals, the NordPass Premium plan offers more than encrypted storage for your passwords, passkeys, and other sensitive info. It also includes features designed to protect your digital identity. For example, you get the Data Breach Scanner that constantly searches the dark web for any mentions of your information and alerts you if it finds a match. There’s also the Password Generator that creates strong, unique passwords for you on the spot, and Email Masking, which lets you use a fake email address to sign up for newsletters and services without exposing your real one.

If you’re an organization, the NordPass Business plan has you covered with everything you need to up your security game. It lets you monitor account activity in real time, set and enforce a password policy across your organization, and use a company-wide Data Breach Scanner to check for any mentions of your company data in breaches. It also allows your team to securely share credentials over encrypted channels.

NordPass is a comprehensive solution that helps you tackle many cybersecurity challenges with just one tool. Give it a try and see the difference for yourself.

Use the promo code to get one month free

We want to help you stay protected, especially after incidents like the Trello security breach. That’s why we’re giving you the promo code “haveibeenbreached,” which you can use to get an extra free month of our Premium plan. We hope this helps you feel more secure, knowing that threats can happen anytime. It’s always better to be prepared.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×