Skip to content

JumpCloud 宣布推出全新的 SaaS 管理工具 助公司企業對抗揭露「影子 IT」(Shadow IT)

在日常運營中,您已經需要處理大量的核心任務:管理員工和承包商的入職和離職,維護網絡和共享資源,解決終端用戶的技術問題,抵禦安全威脅……這些工作不勝枚舉。只要您能掌握問題的全貌,並擁有應對的工具,任何難題都不會難倒一個組織良好的團隊。

然而,問題在於 IT 可能在背後悄悄運作。

「影子 IT」聽起來像是一部恐怖電影的名字,但它在現實中確實存在,並且通常是由於員工想提升工作效率、表現更好。他們會尋找幫助他們提高生產力的解決方案,但這些解決方案往往是在沒有 IT 部門監控的情況下被採用。現代「影子 IT」主要是由 IT 部門未監管的 SaaS 應用程式組成,這可能導致營運效率低下、成本增長以及安全漏洞的出現。

為了幫助您的公司企業更好地管理這些未經授權的 SaaS 應用程式,JumpCloud 宣布推出全新的 SaaS 管理工具。

這款新工具能幫助 IT 管理員發現所有受管理設備上使用的 SaaS 應用程式,讓您清楚知道哪些應用被使用,以及使用者是誰。JumpCloud 的 SaaS 管理工具有助於控制 SaaS 增長,防止「影子 IT」,擴大單一登錄(SSO)的覆蓋,降低 SaaS 成本,確保公司企業內部的 SaaS 使用安全、合規並經過優化。

為什麼選擇 JumpCloud SaaS 管理?

如今,許多公司企業難以管理跨部門使用的 SaaS 應用程式。由於 SaaS 工具的採用相對簡單,這些應用的數量容易失控,導致 SaaS 應用的過度擴散以及潛在的安全問題。未知或未授權的 SaaS 應用,通常被稱為「影子 IT」,可能會繞過安全政策,造成安全風險、合規性問題和不必要的開支。

對於中小企業(SMEs)和為其提供服務的管理服務供應商(MSPs)來說,這些挑戰尤為明顯。有限的資源使他們很難實施和維護 SaaS 管理。中小企業和 MSP 通常缺乏專門的 IT 人員和工具來有效地跟蹤和管理眾多的 SaaS 應用程式,導致數據洩露、知識產權的損失以及難以滿足監管要求。

儘管一些 MSP 使用防火牆或路由器報告等解決方案來應對這些風險,但隨著混合辦公和遙距工作的普及,這些方法變得不再那麼有效。JumpCloud 提供的幾乎實時的 SaaS 使用信息,能幫助 IT 管理員更好地掌控 SaaS 使用情況,並與客戶共享。

JumpCloud 的 SaaS 管理解決方案使 IT 團隊能夠有效保護和管理公司企業內的 SaaS 應用程式。公司企業可以利用 JumpCloud 簡化 SaaS 應用的發現,防止「影子 IT」,擴展 SSO 覆蓋範圍,並在一個綜合平台上實現合規要求。

SaaS 管理的關鍵優勢

可視化和控制
通過 JumpCloud 的 SaaS 探索和監控功能,您可以在安全性和生產力之間找到最佳平衡。


您可以全面了解已授權和未授權的應用程式,包括 SSO 登錄,從而掌控公司企業內部的數據散佈,幫助 IT 管理員將傳統的手動 SaaS 跟蹤方法轉變為精確的自動化流程。

改善 SaaS 成本
JumpCloud 讓 IT 管理員可以輕鬆檢測未授權或未充分利用的 SaaS 應用程式。

通過整合和追蹤授權,IT 管理員可以協商更好的合同條款,了解使用趨勢,重新分配資源,減少不必要的開支,確保每個 SaaS 應用程式都與公司企業的目標和預算相符。

保護 SaaS 訪問與使用
確保員工的工作不被打斷,並在無縫的工作體驗中享受安全保障。

IT 管理員可以在用戶存取未經批准的 SaaS 網域時自動警告或直接阻止,並提供安全的替代方案。用戶可以安全、順暢地存取經授權的 SaaS 工具。

主要功能

發現「影子 IT」
管理員可通過 JumpCloud 瀏覽器擴展來識別和追蹤 SaaS 應用程式及帳戶
阻止訪問未授權應用
管理員可阻止對未經 IT 部門批准的應用程式的存取,並建議替代方案。透過警示和政策來引導員工採取適當行動,降低安全與合規風險
擴展 SSO 覆蓋範圍
管理員可確定哪些應用已與 JumpCloud SSO 整合,並識別可新增的應用以擴展安全 SSO 存取
追蹤 SaaS 使用
管理員可監控 SaaS 應用程式的使用情況,並報告員工的參與度,從而減少在未充分利用的應用程式上的不必要支出

註: JumpCloud SaaS 管理工具目前支援 JumpCloud Go 擴展功能。


立即使用 JumpCloud SaaS 管理工具

現有的 JumpCloud 客戶和 MSP 合作夥伴現在即可開始使用 JumpCloud SaaS 管理功能,無需額外費用,並且可以獲得 Platform Prime 的更多功能。

如果您是 JumpCloud 的新用戶,請註冊免費試用,親身體驗 JumpCloud SaaS 管理工具的優勢。

 

關於 JumpCloud

JumpCloud® 提供一個統一的開放式目錄平台,使 IT 團隊和 MSP 能夠輕鬆、安全地管理公司企業中的身份、裝置和存取權限。通過 JumpCloud,用戶能夠從任何地方安全工作,並在單一平台上管理其 Windows、Apple、Linux 和 Android 裝置。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

JumpCloud 推出「流動裝置信任」功能 提升員工生產力並保障安全

JumpCloud Inc. 正式宣布推出「流動裝置信任」(Mobile Device Trust)功能。透過此功能,JumpCloud 的客戶現在可以限制使用者僅能透過安全的企業擁有裝置(COD)和個人自帶裝置(BYOD)存取公司資源。這項功能不僅提升了公企業的安全防護,也提高了使用者的工作效率。

JumpCloud 產品總監 Khanh Tran 表示:「我們很高興能夠推出許多客戶期待的流動裝置信任功能。企業需要確保員工隨時隨地安全地存取敏感資源,而 IT 管理員則希望擁有能靈活管理企業擁有裝置的工具。同時,終端用戶也需要簡單易用、無干擾的流動體驗。JumpCloud 的流動裝置信任功能滿足了這些需求,秉持我們提供安全、便捷存取的承諾。」

未受管理的流動裝置是企業安全的主要漏洞之一。流動裝置信任功能利用 JumpCloud GoTM 提供抗釣魚憑證,加強了流動裝置的安全性。用戶可在 Apple MDM 或 Android EMM 註冊的裝置上安裝 JumpCloud ProtectTM 應用,透過 JumpCloud Go 註冊裝置,並建立信任關係。該功能還透過取消密碼需求,改善用戶體驗,提升企業安全性,同時不影響員工的工作效率。

主要功能與優勢包括:

  • 裝置管理條件:這些預設政策確保 JumpCloud 可以管理裝置並驗證其可信度。IT 管理員可以強制執行密碼規範,並在裝置遺失、被盜或員工離職時移除公司資料或取消存取權限
  • 作業系統限制:允許 IT 管理員根據經批准的作業系統限制裝置的資源存取
  • 磁碟加密增強:確保裝置具備所需的磁碟加密(基於文件或元數據)
  • 裝置證明:保護裝置免受以下威脅:
    ○ 裝置遭破壞後偽報其狀態
    ○ 裝置使用過期的證明信息
    ○ 裝置冒用其他裝置的識別碼
    ○ 提取私鑰供惡意裝置使用
  • 裝置信任儀表板:此儀表板為桌面、iOS 和 Android 裝置的設置提供可見性,讓 IT 管理員輕鬆查看企業中設置的策略,並強調運用裝置管理條件的條件式存取策略。

流動裝置信任功能現已向所有 Platform Prime 客戶開放。對於希望從單一平台管理 Android 和 iOS / iPadOS 裝置的企業,現在可以向 Version 2 申請免費演示。

關於 JumpCloud

JumpCloud® 提供一個統一的開放式目錄平台,使 IT 團隊和 MSP 能夠輕鬆、安全地管理公司企業中的身份、裝置和存取權限。通過 JumpCloud,用戶能夠從任何地方安全工作,並在單一平台上管理其 Windows、Apple、Linux 和 Android 裝置。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Storware Backup and Recovery: A Trustworthy Alternative to Acronis

When it comes to safeguarding critical data, your backup solution should be dependable, user-friendly, and backed by stellar support. Unfortunately, many users of popular services like Acronis are finding that these solutions fall short, especially in moments when reliable recovery matters most. The following case highlights a severe issue with Acronis and makes a strong argument for why Storware Backup and Recovery is the superior choice.

The Cost of Unreliable Backup: A Real-World Example

Consider the story of a long-time Acronis customer who entrusted thousands of dollars’ worth of 3D printing STL files to Acronis for safekeeping. What happened next is a nightmare for anyone reliant on their data:

1. Data Loss: After experiencing an external hard drive failure, this user turned to their Acronis backup, only to find themselves unable to download anything from the website. Despite having an active backup, they were forced to spend money on a separate data recovery program just to recover some of their files.

2. Inadequate Support: Acronis’s customer support failed to provide timely or adequate assistance. After weeks of back-and-forth communication, remote desktop sessions, and multiple failed attempts to retrieve the data, the user was left with zero resolution. Escalations to the development team went unanswered, leaving the customer stranded.

3. File Corruption and Download Issues
: Even after figuring out how to download files in bulk, the user discovered that several files had been corrupted, showing up as 0KB in size—a devastating outcome for important, paid-for data.

4. Poor Customer Service
: Acronis failed to follow up, ignored emails, and provided no clear direction for recovery. What’s more, the user noted that dealing with Acronis was worse than their experiences with notoriously difficult industries like American health insurance.

Why Storware Is a Superior Solution

In contrast to Acronis, Storware Backup and Recovery is built to avoid the pitfalls experienced in this user’s case. Here’s why Storware stands head and shoulders above Acronis:

1. Reliable and Accessible Recovery: Storware ensures that your data is always within reach when you need it. Unlike Acronis, where this user faced download restrictions, with Storware you can easily restore data in bulk or selectively retrieve individual files. Our platform eliminates the frustration of file corruption and guarantees data integrity. Furthermore, you can store your data in multiple locations to add a layer of redundancy.

2. World-Class Customer Support: At Storware, our support team is proactive, knowledgeable, and readily available to help you in moments of need. You won’t be passed from person to person or left waiting weeks for answers. Our technical experts resolve issues swiftly, ensuring you’re never left without access to your critical data. There is therefore no first or second line of support, all team members are perfectly prepared to face the most demanding tasks. Additionally, activating the Storware Insight option allows our support team to proactively respond when reports from the client instance show any irregularities.

3. Flexible Backup Solutions: Storware offers a wide range of backup configurations, including local and cloud-based options, to suit your needs. Unlike Acronis, which forced the user to manually download each file individually, Storware offers seamless, intuitive options for bulk restoration.

4. Integrity and Transparency: We believe in keeping our customers in the loop. Whether it’s updating you on escalated cases or ensuring that you are aware of all available options during a crisis, we prioritize transparency. You will never be left in the dark with Storware.

5. Ease of Use: While Acronis’s Sync feature forced the user to painstakingly download each file or folder, Storware’s intuitive interface allows you to manage backups and recoveries with minimal effort. Our platform is designed to make your life easier, not more complicated.

Download the Storware vs Acronis battle card to learn more

Don’t Let Data Loss Ruin Your Day

The Acronis user’s experience serves as a cautionary tale. When it comes to protecting your valuable data, choosing a reliable and efficient backup solution is crucial. Storware Backup and Recovery offers a superior alternative that can safeguard your data and provide peace of mind.

Choose Storware for Peace of Mind

At the end of the day, your data is invaluable, and you need a backup provider that takes its role seriously. Storware Backup and Recovery delivers reliable protection, fast recovery, and unmatched support, so you never have to experience the frustration and losses faced by so many Acronis users.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

How to find Palo Alto Network firewalls running PAN-OS

Latest Palo Alto Networks vulnerabilities 

Palo Alto Networks (PAN) released a security advisory with multiple vulnerabilities on PAN-OS firewalls that could lead to admin account takeover.

  • CVE-2024-9463 is rated critical with CVSS score of 9.9, is an OS command injection vulnerability and potentially allows for  and execution of OS commands as root.
  • CVE-2024-9464 is rated critical with CVSS score of 9.3, is an OS command injection vulnerability and potentially allows for the execution of OS commands as root.
  • CVE-2024-9465 is rated critical with CVSS score of 9.2, is a SQL injection vulnerability and potentially allows a remote unauthenticated attacker to read the contents of the Expedition database.
  • CVE-2024-9466 is rated high with CVSS score of 8.2, and potentially allows for an authenticated user to read sensitive information including passwords and API keys.
  • CVE-2024-9467 is rated high with CVSS score of 7.0, is an XSS vulnerability and potentially allows for execution of malicious JavaScript code that could result in session hijacking.

What is the impact?

If chained together through an exploit, a firewall running the vulnerable software could be completely taken over by an unauthenticated remote attacker. For more information, the team that disclosed the vulnerabilities to Palo Alto Networks, published a detailed analysis.

According to the vendor, there is no known malicious exploitation of vulnerable systems at this time.

Are updates or workarounds available?

According to Palo Alto Networks, “The fixes for all listed issues are available in Expedition 1.2.96, and all later Expedition versions.” They also recommended rotating all passwords and API keys after applying the latest patch to prevent future unauthorized access. Refer to the Workarounds and Mitigations section of the security advisory for information about potential workarounds and additional advice.

How to find potentially vulnerable PAN-OS systems with runZero

From the Asset Inventory you can use the following query to locate potentially vulnerable systems:

os:"PAN-OS"

CVE-2024-3400

Palo Alto Networks (PAN) disclosed that certain versions of their PAN-OS software has a vulnerability that allows for remote command injection.

CVE-2024-3400 is rated critical with CVSS score of 9.8 and indicates an unauthenticated attacker can execute arbitrary code with root privileges on the firewall. The vendor indicates that there is evidence of limited exploitation in the wild.

watchTowr has posted a detailed analysis including the details needed for exploitation. This analysis covers two separate vulnerabilities; an arbitrary file creation vulnerability in the session handler, and a shell metacharacter injection issue that leads to remote execution through the telemetry script. PAN has updated their guidance to state that “Disabling device telemetry is no longer an effective mitigation“.

What is the impact?

The following PAN-OS versions are affected by this vulnerability.

Version

Affected

Unaffected

PAN-OS 11.1

< 11.1.2-h3

>= 11.1.2-h3 (hotfix ETA: By 4/14)

PAN-OS 11.0

< 11.0.4-h1

>= 11.0.4-h1 (hotfix ETA: By 4/14)

PAN-OS 10.2

< 10.2.9-h1

>= 10.2.9-h1 (hotfix ETA: By 4/14)

Palo Alto Networks indicates that PAN-OS 11.1, 11.0, and 10.2 versions with the configurations for both GlobalProtect gateway and device telemetry enabled.

Customers may verify this by checking for entries in the firewall web interface (Network > GlobalProtect > Gateways) and verify whether device telemetry enabled by checking your firewall web interface (Device > Setup > Telemetry).

Are updates or workarounds available?

Palo Alto Networks recommends that customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 95187 (introduced in Applications and Threats content version 8833-8682) and applying vulnerability protection to GlobalProtect interfaces.

It is also recommended that telemetry be disabled until devices can be upgraded to an unaffected version of PAN-OS.

How runZero users found potentially vulnerable PAN-OS systems

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

os:"PAN-OS"

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

Storware Partners with Version 2

Storware Boosts APAC Presence with Version 2 Partnership

Storware has announced partnership with Version 2 Digital, one of the paramount IT distributors in APAC region. Cooperation between Storware and Version 2 is a sign of the right set of circumstances for scaling data protection direction to the diverse markets of the western Pacific Ocean.

With a local presence in Singapore, Hong Kong, Taiwan, and Mainland China, Version 2 has a portfolio of compatible and trusted solutions and distributes IT products, including communication systems, Internet software, security, network, and media products. Building strong relationships through a comprehensive network of channels, Version 2 deals with a variety of enterprise domains and government organizations.

 Partnership highlights:

  • Market awareness and local presence through major regional business centers of finance, trade and technology parks enhances capabilities to distribute data protection and recovery strategy to new customers.
  • Professional team with deep technical background increasingly helps APAC companies’ IT departments by delivering turnkey solutions among a large number of the world’s brands.
  • Assistance in building partners engagement and product essential knowledge of data safety.

Storware sees the growing interest and tremendous involvement in building digital environment in APAC region. We are excited to enlist the support of Version 2, our strategic partner, in establishing new opportunities for Storware Backup and Recovery on this market. Their robust expertise and confidence in product advocacy ensure comprehensive custody to deal with end-user challenges. Collaboration with Version 2 strengthens position into delivering confidence of data security and accessibility at all times to a wide range of businesses – comments Jan Sobieszczanski, CEO of Storware.

Cooperation between Storware and Version 2 reinforces assured leadership in the Asian Pacific’s technology landscape, creating new opportunities to reseller partners and confidence in delivering advanced data protection and recovery solution.

Storware’s innovative data protection solutions align perfectly with our mission to provide our clients with the most advanced and reliable technology solutions available. We look forward to working with Storware to help businesses in the APAC region safeguard their data and ensure business continuity – comments Carlos Cheng, Managing Director of Version 2 Digital. This distribution partnership combines Storware’s industry-leading data protection technology with Version 2 Digital’s regional expertise and customer-centric approach, creating a powerful synergy that will drive the adoption of best-in-class data protection solutions in the APAC market.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×