Skip to content

Web Net Com Ltd: MSP-Driven Success Through Unified Detection & Response

Web Net Com Ltd is a leading remote IT company for small to mid-sized businesses that provides exceptional quality services, cutting-edge software solutions, and top-tier cybersecurity. By prioritizing excellence, innovation, and customer satisfaction, they build lasting partnerships that empower their clients to achieve their business objectives. In collaboration with Guardz, they have significantly enhanced their security infrastructure, ensuring the highest level of protection for their clients’ digital assets and allowing them to confidently focus on their core business goals.

How has Guardz changed your day-to-day operations and peace of mind?

Guardz has significantly streamlined our operations and provided unparalleled peace of mind. Instead of spending hours filtering through false alarms, I now start my day with a clear list of actual threats. Recently, we connected one of our new clients to Guardz, and it helped us scan their cloud presence, discovering over 800 files shared publicly, some containing sensitive corporate data. With Guardz’s help, we closed a major data leak before it caused any harm. This reliable protection allows me to focus on strategic initiatives like developing a new cloud migration service that has already attracted several new clients. The efficiency and security Guardz offers are truly invaluable.

Can you recall a moment when Guardz really proved its worth to you?

Absolutely, I can recall a moment when Guardz truly proved its worth. We faced a highly sophisticated malware attack that slipped past our previous security measures. Guardz detected it almost instantly, neutralizing the threat before it could do any damage. This incident reaffirmed our decision to partner with Guardz and highlighted the critical role it plays in safeguarding our clients’ data. It was a clear demonstration of Guardz’s advanced capabilities and our commitment to maintaining top-tier cybersecurity.

How has Guardz impacted your client relationships?

Guardz has significantly enhanced our client relationships by making our proactive efforts more transparent. Its detailed reports clearly show the threats we neutralize, helping clients appreciate the value of our work. For instance, last quarter, we used Guardz’s visual ROI report to present a cyber risk assessment to our manufacturing client. The clear data helped them identify security gaps, leading to a substantial budget increase for additional protective measures. These reports are now crucial for showcasing our value and building stronger, more trusting relationships with our clients.

How has Guardz helped you scale your business?

We’ve grown our client base by 20% since implementing Guardz, and we’ve done it without adding to our team.

What would you tell other MSPs about Guardz?

To fellow MSPs, I can confidently say that Guardz has revolutionized our cybersecurity offerings. Its AI-driven threat detection is impressively accurate, catching issues that previously went unnoticed. The 24/7 monitoring feels like having an elite security team on duty around the clock. What sets Guardz apart is their exceptional support team, working with us as true partners. Since implementing Guardz, our threat response has become faster and more precise, driving our business growth and keeping us ahead of the competition. If you want to elevate your cybersecurity services, I highly recommend Guardz. It has transformed our business.

How do you see your partnership with Guardz evolving in the future?

I envision our partnership with Guardz as a long-term collaboration. Their innovative approach aligns perfectly with our goals, and I’m excited about the potential to grow together. I’m confident that Guardz will continue to push the boundaries of cybersecurity, helping us stay ahead in an ever-evolving landscape.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

Portnox Survey Reveals CISO’s Surprising Views on Job Security, Zero Trust, Multi-Factor Authentication, and More

The survey of hundreds of CISOs at large enterprises paints a picture of a cybersecurity world under siege heading into 2025.

 

Austin, TX – Oct. 8, 2024—Portnox, a leading provider of cloud-native, zero trust access control solutions, today unveiled the results of its latest survey, “CISO Perspectives for 2025,” revealing critical insights into the challenges faced by Chief Information Security Officers (CISOs) at large enterprises.

The survey, which polled 200 CISOs from companies with annual revenues exceeding $500 million, highlights growing concerns around the effectiveness of Zero Trust, the limitations of Multi-Factor Authentication (MFA), and the looming threat to job security amidst an increasingly complex cybersecurity landscape.

The results present a stark picture of a cybersecurity world under siege, where security leaders must constantly balance ironclad defenses with user-friendly experiences while navigating regulatory demands and soaring cyber insurance premiums.

Key Survey Findings:

  • Job Security on the Line. Nearly all CISOs (99%) are worried about losing their positions if a breach occurs, with a striking 77% of CISOs being very or extremely concerned. This underscores the immense pressure they face in protecting their organizations.
  • MFA Under Fire. While MFA has become a cornerstone of many organizations’ security strategies, 85% of CISOs expressed concerns that it’s not keeping up with increasingly sophisticated attacks. Common issues include password fatigue, insider threats, and phishing exploits.
  • Passwordless Gaining Steam. Passwordless authentication represents the agreed upon method for stronger security, but only 7% of organizations have fully implemented it, citing cost, complexity, and employee resistance as key barriers.
  • NAC Investment is Growing. CISOs unanimously agree that Network Access Control (NAC) is a critical component of any Zero Trust framework they put in place. Reliance on NAC is growing, as more than 4 in 5 are increasing their investment in the next year.
  • Zero Trust Skepticism. Every CISO surveyed (100%) agreed that Zero Trust Network Access (ZTNA) has not fully lived up to its promise, with many organizations still in the early stages of adoption.
  • Compliance Challenges. As regulations like NIS2 loom, 90% of CISOs feel overwhelmed by constantly shifting compliance demands, making it difficult to ensure they’re always up to date.
  • Cyber Insurance Gaps. With 58% of CISOs unsure whether their cyber insurance policies adequately cover critical threats such as supply chain attacks, many organizations are left exposed to potentially devastating risks.
  • Breaches Remain a Top Concern. Despite the challenges, 86% of CISOs are laser-focused on preventing breaches. However, many concede that their current defenses may not be enough to withstand today’s advanced threats.

“CISOs today are under immense pressure to do more with less, while the stakes have never been higher,” said Denny LeCompte, CEO of Portnox. “The survey results underscore a clear reality: security leaders need tools that not only protect their organizations but also provide peace of mind in an increasingly hostile environment.”

To view the full data from the survey, including a complete breakdown of respondent demographics please visit: www.portnox.com/2025-ciso-perspectives-report-data/

Methodology

The Portnox Survey was conducted by Wakefield Research (www.wakefieldresearch.com) among 200 US CISOs at companies with a minimum annual revenue of $500m with representative quotas set for company size, between August 29th and September 9th, 2024, using an email invitation and an online survey.

Results of any sample are subject to sampling variation. The magnitude of the variation is measurable and is affected by the number of interviews and the level of the percentages expressing the results. For the interviews conducted in this particular study, the chances are 95 in 100 that a survey result does not vary, plus or minus, by more than 6.9 percentage points from the result that would be obtained if interviews had been conducted with all persons in the universe represented by the sample.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

ESET Research: GoldenJackal APT group, with air-gap-capable tools, targets systems in Europe to steal confidential data

  • GoldenJackal, an advanced persistent threat (APT) group, used a custom toolset to target air-gapped systems at a South Asian embassy in Belarus since at least August 2019. 
  • In another attack, GoldenJackal deployed a highly modular toolset in Europe on various occasions between May 2022 and March 2024 against a government organization in a European Union country.
  • These toolsets provide GoldenJackal with a wide set of capabilities for compromising and persisting in targeted networks. Victimized systems are given different roles in the local network, from collecting interesting – likely confidential – information, to processing the information, distributing files, configurations, and commands to other systems, or exfiltrating files.
  • The ultimate goal of GoldenJackal is very likely to be stealing confidential information, especially from high-profile machines that are intentionally isolated from the internet.

MONTREAL, BRATISLAVAOctober 7, 2024 — ESET researchers have discovered a series of attacks that took place in Europe from May 2022 to March 2024, where the attackers used a toolset capable of targeting air-gapped systems, in a governmental organization of a European Union country. ESET attributes the campaign to GoldenJackal, a cyberespionage APT group that targets government and diplomatic entities. By analyzing the toolset deployed by the group, ESET identified an attack GoldenJackal carried out earlier, in 2019, against a South Asian embassy in Belarus that targeted the embassy’s air-gapped systems with custom tools. The ultimate goal of GoldenJackal is very likely to be stealing confidential and highly sensitive information, especially from high-profile machines that might not be connected to the internet. ESET Research presented their findings at the 2024  Virus Bulletin conference.

To minimize the risk of compromise, highly sensitive networks are often air-gapped – isolated from other networks. Usually, organizations will air gap their most valuable systems, such as voting systems and industrial control systems running power grids. These are often precisely the networks that are of interest to attackers. Compromising an air-gapped network is much more resource-intensive than breaching an internet-connected system, which means that frameworks designed to attack air-gapped networks have so far been exclusively developed by APT groups. The purpose of such attacks is always espionage.

“In May 2022, we discovered a toolset that we could not attribute to any APT group. But once the attackers used a tool similar to one of those already publicly documented, we were able to dig deeper and find a connection between the publicly documented toolset of GoldenJackal and this new one. Extrapolating from that, we managed to identify an earlier attack where the publicly documented toolset had been deployed, as well as an older toolset that also has capabilities to target air-gapped systems,” says ESET researcher Matías Porolli, who analyzed GoldenJackal’s toolset.

GoldenJackal has been targeting governmental entities in Europe, the Middle East, and South Asia. ESET detected GoldenJackal tools at a South Asian embassy in Belarus in August and September 2019, and again in July 2021. More recently, according to ESET telemetry, another governmental organization in Europe was repeatedly targeted from May 2022 until March 2024.

With the level of sophistication required, it is quite unusual that in five years, GoldenJackal managed to deploy not one, but two separate toolsets designed to compromise air-gapped systems. This speaks to the resourcefulness of the group. The attacks against a South Asian embassy in Belarus made use of custom tools that we have only seen in that specific instance so far. The campaign used three main components: GoldenDealer to deliver executables to the air-gapped system via USB monitoring; GoldenHowl, a modular backdoor with various functionalities; and GoldenRobo, a file collector and exfiltrator.

“When a victim inserts a compromised USB drive in an air-gapped system and clicks on a component that has the icon of a folder but is actually a malicious executable, then GoldenDealer is installed and run, starting to collect information about the air-gapped system, and storing it on the USB drive. When the drive is again inserted into the internet-connected PC, GoldenDealer takes the information about the air-gapped PC from the USB drive and sends it to the C&C server. The server replies with one or more executables to be run on the air-gapped PC. Finally, when the drive is again inserted into the air-gapped PC, GoldenDealer takes the executables from the drive and runs them. No user interaction is needed because GoldenDealer is already running,” explains Porolli.

In its latest series of attacks against a government organization in the European Union, GoldenJackal moved on from the original toolset to a new, highly modular one. This modular approach applied not only to the malicious tools, but also to the roles of victimized hosts within the compromised system: they were used, among other things, to collect and process interesting, likely confidential information, to distribute files, configurations, and commands to other systems, and to exfiltrate files.

For a more detailed analysis and technical breakdown of GoldenJackal’s tools, check out the latest ESET Research blog post “Mind the (air) gap: GoldenJackal gooses government guardrails”  on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×