Skip to content

Actiphy Inc. Unveils the Latest Version of ActiveImage Protector’s System and Data Protection Solution, a Proven Countermeasure that Safeguards Backup Files from Ransomware

Tokyo, Japan, Sep 7, 2023 – Actiphy Inc., a prominent provider of backup, disaster recovery, and virtualization software, proudly announces the release of their updated version of “ActiveImage Protector 2022”. This latest release introduces innovative features that substantially reduce backup times while improving backup data security.

Background

Companies today are constantly threatened by the looming menace of ransomware attacks. This pervasive threat compels them to divert resources to bolster security measures and instills a sense of apprehension and uncertainty. In an actual attack, the consequences are much more severe and include data loss, financial damages, and disrupted business operations. 

Implementing efficient disaster recovery and protective countermeasures is paramount, and with a strategic backup strategy (that includes StorageServer), another layer of security is added that protects the backup image files from being compromised by a ransomware attack.

This updated version with the StorageServer option is available in both Windows and Linux.

What’s New in ActiveImage Protector 2022 Update
StorageServer Option

“Actiphy StorageServer” , a newly developed product in the ActiveImage Protector Solution Suite, has adopted an advanced protocol that not only secures data transfer but also safeguards that data in storage.
Additionally, Actiphy’s StorageServer has been engineered to take advantage of cache devices to increase performance during data transfer thereby substantially reducing backup time.
StorageServer in effect, achieves increased data security and provides faster data transfers than the traditional Windows-shared folders or NAS based storage.

– New Tracking Driver with no Reboot Required

Our newly developed tracking driver eliminates the need for a reboot after installation or upgrading, enabling users to install or upgrade ActiveImage Protector with no service interruptions.

QuickRecovery

Use QuickRecovery, a pre-prepared recovery environment to undo recent changes that have caused system instability due to a software or OS update. Select a specific restore point from the backup that was created prior to the current state of the system for an immediate recovery.

Recovery Media Maker

Create bootable recovery media with the backup source machine’s image embedded for an ideal disaster recovery (DR) solution should the backup destination become inaccessible. This feature accommodates various media, including DVD/Blu-ray, USB HDD, and USB Memory. One button click from the booted media will initiate recovery from the embedded image file.

Support for VMware First Class Disk (FCD)

Direct backup and recovery of VMware’s FCD formatted disks.

ActiveImage Protector 2022 is a backup and recovery solution that protects physical and virtual Windows and Linux environments. ActiveImage Protector includes all the tools necessary for enterprise-level deployment and management of backup, recovery, virtualization, standby switch-over, and migration.

All other brands and product names mentioned in this news release are trademarks or registered trademarks of their respective holders.For more information about ActiveImage Protector.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Strengthen Your Network Security Today! Don’t Risk a Data Breach!

Strengthen Your Network Security Today! Don’t Risk a Data Breach!

Scale Computing Awarded 19 Badges in G2 Fall 2023 Report

User Reviews Rank Scale Computing High Performer in Hyperconverged Infrastructure and Leader in Server Virtualization

INDIANAPOLIS – September 12, 2023 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, today announced it has been awarded 19 badges for its customer satisfaction and market reputation in the G2 Fall 2023 Report, including a Leader badge in the Server Virtualization and a High Performer badge in the Hyperconverged Infrastructure categories. G2 is the world’s largest and most trusted software marketplace, with more than 80 million people relying on the platform’s authentic peer reviews to make software decisions.

Within G2’s Hyperconverged Infrastructure and Server Virtualization categories, Scale Computing Platform earned multiple additional badges, including High Performer, Highest User Adoption, Most Implementable, Best Relationship, Best Results, Best Usability, Easiest to Use, and Fastest Implementation.

“SC//Platform is purposefully engineered to be simple to use and manage, eliminating complexity, lowering costs, and significantly reducing management time for our customers,” said Jeff Ready, CEO and co-founder of Scale Computing. “We’re exceptionally proud to receive these 19 badges based on user reviews, because it means we’re doing what we set out to do — make customer success a top priority. Being recognized by G2 means real, verified users chose Scale Computing over similar products, and that is an honor we’re proud to have achieved.”

Scale Computing Platform brings together simplicity and scalability, replacing the existing infrastructure and providing high availability for running workloads in a single, easy-to-manage platform, while leveraging patented self-healing technology to maintain maximum uptime for all applications. The zero-touch provisioning feature reduces deployment time by 90 percent or more, enabling administrators to centrally configure clusters of edge computing infrastructure prior to nodes arriving on-premises with cloud-like simplicity.

“Rankings on G2 reports are based on data provided to us by real software buyers,” said Sara Rossio, Chief Product Officer at G2. “Potential buyers know they can trust these insights when researching and selecting software because they’re rooted in vetted, verified, and authentic reviews.”

To learn more about what real users have to say about Scale Computing, visit G2’s SC//Platform review page. View the entire list of badges awarded in G2’s Fall 2023 Report on Scale Computing’s website.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Healthcare Orgs Warned of Extended Post-Breach Downtime

It’s now common knowledge that successful cyberattacks result in severe consequences for organizations – financial loss, disruptive system downtime, and hefty reputational damage. However, in some industries, these consequences can be even more dire. For example, The Joint Commission, a leading authority in healthcare accreditation, recently advised hospitals to plan for at least a month of post-breach downtime following a cyberattack as part of its new cybersecurity management guidelines.

An Escalating Threat Landscape

In healthcare, a successful cyberattack can compromise patient data, interrupt critical care, and even jeopardize lives. The reliance on the Internet of Medical Things (IoMT) devices and electronic health records makes healthcare systems particularly vulnerable. At the same time, patient data, which is inherently sensitive, is considered incredibly lucrative. Lastly, the healthcare industry is the most likely to pay up during a ransomware attack. This combination of factors makes healthcare organizations high-stakes targets for malicious actors.

As a result, hospital breaches have surged in recent years. For example, August 2023 saw an incredibly destructive ransomware attack on a 16-hospital system based in California. The onslaught caused ambulances to be diverted, outpatient services to close, and emergency departments to shutter. And the bigger picture is even more alarming – US healthcare organizations suffered an average of 1,410 weekly cyberattacks per organization in 2022, up 86% compared with 2021.

Post-Breach Downtime

Three to Four Weeks to Restore Critical Systems

Getting critical systems back online isn’t a quick fix; it’s often a lengthy process. The national adviser for cybersecurity and risk at the American Hospital Association estimates that restoring essential systems can take three to four weeks. And for noncritical systems? Expect an even longer recovery period.

The stakes are high; even a few staff members falling for a phishing scam can set off a chain of events with severe, far-reaching consequences.

In this context, a month-long downtime isn’t just an inconvenience. It’s a critical period where patient care may suffer, and lives could be at risk.

Why So Long?

Three to four weeks of system downtime is incredibly disruptive, especially in an industry with such high stakes. So why does it take so long to restore essential systems?

  • Complexity and Interconnectedness: Hospitals operate on intricate, interdependent networks that are challenging to untangle or repair. One compromised system can affect several others, making restoration a coordinated and complicated endeavor.
  • Forensic Analysis and Software Patching: Identifying the scope of the breach and fixing security vulnerabilities is a meticulous process. It involves not just a deep dive into what happened but also patching software flaws, which can be especially time-consuming if specialized or custom software is involved.
  • Hardware and Data Integrity: Cyberattacks can corrupt both hardware and data. Replacing or repairing hardware and verifying data integrity are labor-intensive and time-consuming tasks, often requiring specialized expertise.
  • Compliance and Legal Obligations: Restoring systems isn’t just a technical challenge; it’s a legal one. Hospitals must adhere to strict regulatory guidelines when handling breaches, including patient notifications and coordination with authorities, which divert resources and add time to the recovery process.
  • Patient Safety Concerns: The foremost priority is ensuring the restored systems are functional and safe for patient care. Rigorous testing is required before these systems can be put back into operation, adding an additional layer of time and caution to the process.

How Healthcare Organizations Fall Victim to Cyberattacks

Phishing

Phishing is a significant weak point. In these attacks, cybercriminals send seemingly legitimate emails that may mimic the appearance of trustworthy sources like medical suppliers, governmental health agencies, or internal departments. These emails often contain malicious links or attachments. Once an employee clicks on these, they may inadvertently provide access to sensitive data such as patient records or login credentials.

Because healthcare workers are often under time pressure and may lack comprehensive cybersecurity training, they are more susceptible to falling for phishing scams. This makes it easier for attackers to penetrate otherwise secure networks.

Internet of Medical Things (IoMT)

IoMT devices like patient monitoring systems, MRI machines, and wearable fitness trackers expand the attack surface for cybercriminals.

Many IoMT devices lack robust built-in security measures, making them easy targets. Additionally, these devices are often overlooked during security audits and may not be included in regular network monitoring. As a result, attackers can exploit vulnerabilities in these medical devices to gain unauthorized access to healthcare systems, potentially manipulating device functionality and compromising patient safety. According to Cynerio’s State of Healthcare IoT Device Security 2022 report, 53% of connected devices are at risk of a cyber-attack.

Ransomware Attacks

Ransomware attacks have seen a sharp rise in frequency and sophistication across all sectors, but they are particularly crippling for healthcare organizations. In these attacks, malicious software encrypts essential files and systems, rendering them inaccessible. Data recovery becomes an arduous task, often requiring specialized expertise and tools.

Cybercriminals often favor ransomware attacks over other types of cyberattacks when targeting healthcare institutions for several reasons. First, healthcare organizations manage sensitive and critical data essential for patient care, making them more likely to pay the ransom quickly. Second, the healthcare sector is generally focused on patient care rather than cybersecurity, creating potential vulnerabilities that make ransomware attacks easier to execute. When weighed against the cost and complexity of data recovery, especially during a time-sensitive medical emergency, paying the ransom often seems to be the lesser of two evils, perpetuating the cycle of attacks.

Final Thoughts

Healthcare organizations can’t afford to skimp on cybersecurity. The stakes are incredibly high, ranging from financial loss to endangering lives. Investing in robust cybersecurity measures is crucial to mitigate the risk of attacks and prevent the devastating, time-consuming aftermath of system downtime.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×