Skip to content

Perforce Offers Enterprises a Supported, Cost-Effective Alternative to Proprietary Kafka Platforms

 

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET helps MSPs by integrating with the Kaseya VSA X RMM solution

  • ESET launches a new integration of its ESET Endpoint product with the Kaseya VSA X remote monitoring and management (RMM) solution.
  • MSP admins will find their workloads simpler, due to less time spent managing multiple solutions, giving them more space for their daily tasks.

BRATISLAVAApril 16, 2025 — ESET, a global leader in cybersecurity solutions, today announced the launch of another major integration, this time, with the Kaseya VSA X remote monitoring and management (RMM) software.

ESET has worked with MSPs for a long time, creating successful programs such as the ESET MSP Program, with subscription flexibility (pay only for what’s in use, no flat rates, no long-term commitment), co-management (independent seat count adjustment and subscription management), or  tier-based volume pricing (the more licenses sold, the better the unit price), among others.

Thus, we understand the needs of our partners as well as their clients. Among these is an interest in running efficient workloads, cutting down on time spent in “swivel chair” operations, and simplifying their use of multiple products, while not sacrificing on their security postures.

Such results are only achievable through integrations, which ESET identifies as a key contemporary trend. As a partner- and channel-focused cybersecurity vendor, we understand this, and we develop and maintain support for all the most prevalent RMM and PSA tools out there, now joined by Kaseya VSA X, a leading RMM product.

Thanks to this new integration, users of Kaseya VSA X can now also serve organizations that use ESET. In essence, it enables MSPs to deploy and manage ESET Endpoint products directly from within the Kaseya VSA X interface, so they can perform their necessary management actions without having to log in to a separate console.

With support for additional workflows, MSPs can set up automatic actions for common scenarios. For instance, a workflow can be used to automatically deploy ESET to a freshly provisioned machine, or a workflow could be configured to provide a notification in case a threat is detected on an endpoint.

Some other key features are:

  • “One Click” or automated deployment of ESET Endpoint products
  • Monitoring of endpoint health (product, version, protection status)
  • On-demand tasks such as scanning and activation

“We’ve been working with MSPs for a very long time, and ESET is a favorite vendor among thousands of MSPs across the world,” said Rob Jones, Global Channel Business Developer at ESET. “With the features provided through our new integration with Kaseya VSA X software, MSP administrators will unlock extensive benefits, such as simpler workflows, easier monitoring, as well as enhanced time savings. We know what MSPs need, and with this integration, we are directly addressing multiple pain points to make their businesses more efficient.”

Version 1.0 of this integration will support Windows endpoints that are running ESET Endpoint Antivirus, Endpoint Security, or Server Security.

ESET will be continuing its integration journey, so stay tuned for more updates in the future. In the meantime, feel free to check out our ESET integrations webpage to see the list of our existing partners and connections.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Storware Recognized in 2025-26 DCIG TOP 5 VMware Backup – MSP Edition Report

We’re thrilled to announce that Storware has been recognized in the recently released 2025-26 DCIG TOP 5 VMware Backup – MSP Edition Report. This report provides critical insights for Managed Service Providers (MSPs) seeking robust and reliable VMware backup solutions, and we’re proud to be included.

The DCIG report highlights the evolving landscape of VMware backup, emphasizing key trends such as the increasing importance of AI-driven anomaly detection, cross-hypervisor capabilities, and advanced cybersecurity features. Storware’s commitment to delivering comprehensive data protection solutions aligns perfectly with these trends.

At Storware, we understand the unique challenges MSPs face in protecting their clients’ virtualized environments. Our solutions are designed to provide:

  • Robust VMware Backup: Ensuring reliable protection for critical VMware workloads.
  • Advanced Data Protection: Incorporating key modern backup features.
  • Flexibility and Scalability: Adapting to the dynamic needs of MSP operations.

This recognition from DCIG reinforces our dedication to providing MSPs with the tools they need to ensure data integrity and business continuity.

We invite you to learn more about how Storware can empower your MSP business. Contact our sales team for more information.

To gain more information about the report, you can visit the DCIG website.

We are proud to be a part of the solutions that are helping MSP’s to protect their clients data.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

Scale Computing and Veeam Partner to Bring Enterprise-Class Data Protection to Scale Computing Platform

Collaboration brings Veeam data resilience solutions to Scale Computing’s edge and core infrastructure, with live demonstrations of SC//Platform at VeeamON 2025

Indianapolis — April 16, 2025 — Scale Computing, a leader in edge computing, virtualization, and hyperconverged solutions, today announced a new strategic collaboration with Veeam® Software, the #1 leader by market share in Data Resilience. As part of the Veeam Integrated program, Veeam and Scale Computing have joined forces to bring customers full support for the Scale Computing Platform (SC//Platform) within the Veeam Data Platform, expanding backup and recovery capabilities across Scale Computing’s rapidly growing installed base of edge and core infrastructure deployments.

With more businesses deploying distributed applications at the edge and modernizing their IT infrastructure at the core, SC//Platform offers the industry’s most efficient, scalable, and cost-effective virtualization platform for IT leaders looking to move away from VMware. With native integration into the Veeam Data Platform, organizations can take full advantage of Veeam’s powerful data protection, ransomware recovery, and workload mobility, ensuring business continuity across any environment, from retail branches and factory floors to centralized data centers, showcasing this collaboration for Veeam users who are looking to transition away from VMware.

“The partnership between Scale Computing and Veeam delivers the best of both worlds: streamlined, autonomous IT infrastructure from Scale Computing and the industry’s most trusted data resilience platform from Veeam,” said Jeff Ready, CEO and co-founder of Scale Computing. “Our customers and partners have long asked for deeper integration with Veeam, and we’re proud to meet that need while strengthening cyber resiliency for both core and edge deployments.”

Live demonstrations of the Scale Computing solution will be featured at VeeamON 2025, taking place April 21-23, 2025 at booth #G5 in San Diego, CA.

Key Benefits Expected with SC//Platform and Veeam Integration Include:

  • Immutable Backups at the Edge and Core: Prevent data loss from ransomware or human error with hardened, tamper-proof backup repositories and optional air-gapped media support—available across all SC//Platform deployments.
  • High-Performance VM Protection: Advanced changed block tracking (CBT) and SC//HyperCore’s unique snapshot architecture enable fast, low-impact VM backups and rapid recovery across the full infrastructure lifecycle.
  • Simplified Data Management: Unified, browser-based management through Scale Computing Fleet Manager, along with seamless integration with Veeam Backup & Replication within the Veeam Data Platform, streamlines operations at scale—from 1 to 50,000 clusters.
  • Flexible Storage & Recovery: Choose from a variety of Veeam-compatible backup targets, including object storage, tape, and cloud, and leverage full VM and granular file recovery from SC//Platform to any supported environment.
  • Workload Mobility with Confidence: Migrate and restore workloads between SC//Platform, VMware vSphere, Microsoft Hyper-V, and major public cloud environments without compromising performance or security.

“As our customers expand their edge and core environments, ensuring data resilience becomes increasingly complex,” said Shiva Pillay, Senior Vice President and General Manager, Americas at Veeam. “This collaboration with Scale Computing further strengthens Veeam’s mission to empower organizations to protect and ensure the availability of their data at all times and from anywhere, delivering cyber recovery and data portability across a purpose-built platform tailored for the unique needs of edge IT.”

The announcement follows growing demand from Scale Computing’s enterprise and midmarket customers for integrated, cost-effective backup and recovery across increasingly distributed environments. Whether modernizing legacy infrastructure, replacing expensive virtualization solutions, or extending capabilities to the edge, SC//Platform with Veeam provides a compelling solution with unmatched simplicity, scalability, and protection.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cybersecurity in the gaming industry: a business-centric approach

Summary: Cyber threats to gaming companies are growing fast. Discover why cybersecurity is essential for protecting player trust, revenues, and gaming operations.

The gaming industry is booming—and it’s easy to see why. With exciting innovations in online gaming and global player engagement soaring, revenues keep climbing. Experts estimate the industry will hit over $300 billion in annual revenue by 2028. That’s more than double its value back in 2019.

As gaming continues to grow, cybercriminals see opportunities too. Online gaming platforms handle enormous amounts of sensitive information, from payment details to login credentials and personal player data. With so much valuable information stored digitally, gaming companies have become prime targets for cyber threats.

Now more than ever, cybersecurity in gaming isn’t just an IT issue—it’s a fundamental business concern. Game developers and gaming companies must invest in strong security measures to protect data, maintain player trust, and secure their financial futures.

The biggest cybersecurity threats to gaming companies

The variety and frequency of cyber threats are increasing rapidly, presenting serious challenges for gaming companies. Attackers constantly refine their tactics, searching for new ways to breach defenses and compromise gaming accounts. Let’s break down the biggest threats the gaming industry faces today.

Threats to game delevopers

DDoS attacks and service disruption

One common threat is distributed denial of service attacks—or simply, DDoS attacks. These cyber-attacks flood gaming servers with excessive traffic, forcing them offline.

For example, in 2020, Blizzard Entertainment faced severe disruptions during major tournaments due to relentless DDoS attacks. In April 2025, they experienced a DDoS attack again. These disruptions don’t just frustrate gamers—they also lead to significant financial losses for gaming companies.

Credential stuffing and account takeovers

Many players reuse passwords across different online gaming platforms, making gaming accounts easy prey for attackers. Cybercriminals launch brute force attacks using automated tools that systematically try millions of username and password combinations.

In 2019, Epic Games had to warn Fortnite players after attackers successfully compromised millions of accounts. Securing player accounts with multi-factor authentication (MFA) significantly reduces this threat.

Phishing scams and social engineering

Attackers frequently use clever social engineering tactics, especially phishing scams, to trick gamers into revealing their login credentials or other sensitive information. Fake promotions offering in-game rewards or currency entice players to click malicious links. Falling victim may expose sensitive data or financial details to cybercriminals.

Ransomware attacks on game developers

Ransomware—malicious software designed to encrypt data and hold it hostage—also threatens the gaming industry. In 2021, CD Projekt Red suffered a massive ransomware attack, halting game development and causing serious financial and reputational damage. Companies need strong backup plans and endpoint protection to proactively guard against ransomware.

Cheating software as malware carriers

Illegal cheat programs often come bundled with hidden malware, infecting thousands of gaming devices without the user’s knowledge. Games like Call of Duty have seen cheats used to install spyware and other malicious programs, exposing players to identity theft and fraud. The gaming industry must educate players about these hidden risks.

Supply chain vulnerabilities

The modern gaming ecosystem depends on third-party providers and external tools for game developers. Unfortunately, these outside tools can introduce hidden vulnerabilities. The SolarWinds breach showed how attackers can exploit vulnerabilities in supply chains and impact industries like online gaming.

Insider threats to gaming companies

Sometimes threats come from within the organization itself. Employees or contractors with privileged access may accidentally or deliberately cause security breaches. Zynga once faced a situation where former employees stole proprietary game data, threatening both the company’s intellectual property and its reputation.

 

Why cybersecurity is critical for gaming businesses

Cybersecurity isn’t just about avoiding threats—it directly contributes to a gaming company’s overall success and profitability. Here’s why robust cybersecurity practices are essential for the gaming industry.

Cybersecurity benefits for gaming companies

Protecting revenue streams

Downtime is costly. Every minute gaming platforms remain offline, companies lose potential revenue.

DDoS attacks interrupting major tournaments or game launches can be devastating. Strong security measures, including VPNs and real-time DDoS mitigation, keep gaming services stable and protect revenue streams.

Maintaining brand reputation

The gaming industry depends on player trust. Serious security breaches can permanently damage a company’s brand. Strong cybersecurity practices prevent these disasters, preserving consumer trust and loyalty.

Enhancing player experience

Players want secure, fair, and uninterrupted gaming experiences. Malware infections, account theft, or cheating disrupt the fun, driving players away. Implementing effective cybersecurity—such as endpoint protection and proactive anti-cheat measures—maintains a positive gaming environment, encouraging player retention.

Avoiding regulatory fines

Globally, laws like GDPR impose strict penalties for mishandling sensitive data—fines can reach up to 4% of annual revenue. Compliance with data protection regulations isn’t just smart—it’s mandatory. The gaming industry must adopt stringent cybersecurity practices to stay compliant and avoid expensive penalties.

Attracting investments and partnerships

Investors and partners favor companies with secure, well-managed cybersecurity frameworks. Demonstrating a commitment to protecting data and infrastructure enhances credibility. Adopting principles like Zero Trust further strengthens security and makes companies more attractive to potential investors and partners.

Best practices for cybersecurity in the gaming industry

With cyber threats constantly evolving, gaming companies need comprehensive cybersecurity strategies. Here are some proven best practices every gaming company should adopt:

Protecting user data and privacy

Gamers trust companies to protect their personal data. Implement robust measures such as:

Cybersecurity best practices for the gaming industry

Preventing account takeovers

Protecting gaming accounts is crucial for player retention and security. Account theft can permanently drive loyal players away—preventing it ensures your gaming community thrives.

  • Multi factor authentication (MFA): MFA prevents unauthorized access even if login credentials are compromised.
  • Player education: Inform players about phishing, social engineering, and the importance of strong, unique passwords.

Maintaining service availability

Reliable gaming services build player loyalty and satisfaction. Just one prolonged service interruption can damage your reputation—stable services keep your players happy and engaged.

  • DDoS mitigation: Implement real-time traffic monitoring to neutralize attacks quickly.
  • Cloud security: Regularly audit cloud infrastructure to prevent vulnerabilities.
  • Cloud firewall and VPN gateways: Use strong perimeter defenses and encrypted VPN connections to secure remote gameplay, especially during high-traffic events.

Protecting against malware and ransomware

Even a single malware infection can halt game development, so defensive measures are your best line of protection. Proactively defend your infrastructure against malware:

  • Endpoint protection: Deploy antivirus and Endpoint Detection and Response (EDR) solutions across every gaming device.
  • Regular backups: Store backups separately to quickly recover after ransomware attacks.
  • System updates and patches: Regularly update software and security configurations to eliminate vulnerabilities.

Minimizing insider and supply chain risks

Trusting third-party providers blindly is risky. Vigilant security keeps your game development pipeline secure. Protect against threats from insiders and third-party providers:

  • Least privilege principle: Limit access rights to necessary functions, reducing potential internal risks.
  • Network segmentation: Separate sensitive areas to contain threats.
  • Vendor security assessments: Regularly audit third-party providers for secure coding and compliance practices.
  • Zero Trust architecture: Continuously verify all users and devices, preventing unauthorized lateral movements within networks.

Meeting compliance and regulatory requirements

Complying with regulatory standards like GDPR, COPPA, and PCI DSS is crucial for gaming companies. Strict compliance helps avoid costly fines and maintains player trust. Companies should clearly document data handling practices to ensure transparency. Regular compliance audits and risk assessments are essential. It’s important to continuously encrypt payment details and sensitive player data. Monitoring regulatory changes closely helps avoid unexpected compliance issues. Holding third-party vendors to consistent data protection standards strengthens overall security. Ultimately, transparency and strict compliance build long-term credibility with players and regulators.

Technology advances quickly, and cybercriminals continuously evolve their methods. This makes cybersecurity an ongoing challenge for the gaming industry.

Cybersecurity trends in gaming

Artificial intelligence is becoming both a weapon and a defense. Attackers use AI-driven tools to evade traditional security measures. Gaming companies respond with real-time analytics to rapidly spot these threats. Blockchain technology provides secure and transparent transactions, safeguarding digital assets from theft. Automated threat intelligence platforms help gaming companies swiftly identify cyber threats. Bug bounty programs and regular penetration testing proactively uncover vulnerabilities. These measures keep gaming platforms secure and resilient.

Enhancing gaming cybersecurity with NordLayer

NordLayer provides specialized cybersecurity solutions designed for the gaming industry. Its comprehensive offerings include:

  • Zero Trust Network Access (ZTNA) features
  • Secure VPN with NordLynx (based on WireGuard) and Site-to-Site connections
  • Advanced network segmentation
  • User identity management with popular identity providers like Okta and Google
  • Secure Web Gateway (SWG) features
  • Real-time network visibility and monitoring

For instance, Eldorado Games successfully leveraged NordLayer’s solutions to protect its remote workforce, secure critical data, and maintain smooth processes for game developers.

To learn more, explore the detailed Eldorado Games case study or check our resource on cybersecurity in software development. NordLayer helps the gaming industry effectively safeguard its operations, secure gaming platforms, and deliver reliable gaming experiences that players trust and enjoy.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×