Skip to content

FinTech’s popularity signals that it’s time to get serious about apps

The risks surrounding mobile apps have increased, along with the complexities of the solutions they offer. Among today’s top-ranking apps are integrated banking, e-trading, cryptocurrency and even regulatory compliance solutions. These complex applications move very real, personal and valuable data. While apps with lower complexities can still be exploited by malicious actors, the consequences of security breaches from FinTech applications can be considerably worse.

ESET has put both its time and research money where its mouth is for ten years, by helping to lower risks to smartphone users. This is most evident in ESET Mobile Security (EMS), which, since its release in 2011, has performed its protective functions across the many app types in the marketplace. EMS evolved in line with the increasingly complex mix of games, social media, mobile banking, online trading and various messaging platforms that have emerged over the past decade. Based on its popularity, it has taken the sting out of many common user mistakes and carelessness with mobile apps.

Our interest in FinTech can be mapped to a long-term focus on Android banking malware, a topic ESET focused several years of its threat research and product development on. Next, moves were made to collaborate with Google to protect Google Play, and even Chrome itself. And now, we set out to protect and raise consumer and business awareness via a new source – market research. Our FinTech consumer and business surveys set out to quantify and understand the risks people are willing to take to reap the benefits of FinTech.

We surveyed 10,000 consumers and 1,200 business leaders in a variety of industries across the UK, US, Australia, Japan, Mexico and Brazil. Respondents from both consumer and business perspectives were asked an extensive series of questions on the topics of financial technology and cybersecurity, and their impacts on securing finances in a COVIDian world, particularly in light of the coronavirus lockdowns.

While apps continued to increase in popularity, no one could have foreseen the effects of the pandemic on our digital lives. Amid regional and national lockdowns, and restrictions on physical businesses, we turned to our digital devices, and apps, more than ever. The interest in using FinTech platforms and solutions has been magnified, and as a result, it is even more imperative that app security is taken seriously.

Our market research clearly illustrated the popularity of FinTech solutions for both consumers and businesses, with almost two-thirds (62%) of consumers worldwide using some form of FinTech app or platform. In addition, over two-thirds (68%) of business leaders expect their companies’ investments in FinTech to increase in 2021/2022, and 81% of senior managers surveyed agree that COVID-19 has increased the need for improved security of finances.

However, of the 42% of global consumers that use a free FinTech application or platform, half do not know if the app they use sells their data. Additionally, only 31% of people say they read the terms and conditions of a FinTech application before downloading it, and only 29% read the privacy policy. Even among the one in five consumers worldwide who rate themselves as advanced in tech proficiency, 31% do not use a password manager. Although consumers who used four or more FinTech apps were more likely to have security software installed, and therefore, be better protected, information surrounding the risks of FinTech apps is lacking. Only 17% of consumers strongly felt that the quality of information available on the potential risks related to the usage of FinTech applications – such as digital wallets, budgeting apps, or e-trading apps – is adequate​.

For businesses, FinTech solutions offer streamlined, advanced and efficient processes to manage finances, and security is clearly a key priority with 72% of businesses actively investing in new technologies for better security of finances, and 81% of senior business leaders reporting that they adopt a cybersecurity-first approach when investing in new technology solutions. Although both FinTech solutions and cybersecurity are top of mind for many businesses across the world, the risk cybercriminals pose remains weighty.

Over half (58%) of businesses surveyed are confident in their security stances, while acknowledging that they are likely to be impacted by a cybersecurity incident. Of these businesses, those in information, research, and analysis (93%), and accounting, banking, and finance (87%) industries were most likely to think a cybersecurity incident would impact them. With 45% of businesses having experienced a cyber breach in the past, the security of FinTech platforms and apps is paramount to an organization’s financial security, and perhaps more pressingly, to its post-COVID-19 economic recovery.

There is no doubt about it – FinTech apps are here to stay. Whether you’re a casual user of a budgeting app or trading platform, or a global corporation using FinTech solutions to increase efficiency and profit, the security of your financial and personal data is paramount. Applications are able to take complicated concepts and platforms and distill them into user-friendly, easily accessible platforms, and for this exact reason, it can be all too easy to overlook whose hands data is falling into, and how it can be exploited. The security and safety of applications, especially, but not limited to, FinTech, must be considered just as important as overall user experience and benefit. Without comprehensive security, the benefits of FinTech applications cannot be fully appreciated, because the consequences of botched financial security are simply too high.

For more insight into FinTech for business and consumers, check out our blog. For security tips around FinTech, read more at WeLiveSecurity.com.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Scale Computing’s Marlena Fernandez Recognized for Second Consecutive Year on CRN’s 2021 Women of the Channel List and Channel Power 100 List

INDIANAPOLIS – May 10, 2021 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, announced today that CRN®, a brand of The Channel Company, has named Marlena Fernandez, vice president of marketing, to its 2021 Power 100 list, an elite subgroup of standout individuals selected from the annual CRN® Women of the Channel list, for the second consecutive year.

The women honored on this year’s list pushed forward with comprehensive business plans, marketing initiatives and other innovative ideas to support their partners and customers, helping them through the uncertainty brought on by the global COVID-19 pandemic. CRN celebrates these exceptional women for their leadership, dedication and channel advocacy.

The CRN editorial team chose the annual Power 100 honorees based on their contributions, expertise and dedication to supporting IT channel success. The Power 100 award recognizes a select group of incredible women who have gone above and beyond — inspiring their peers through their leadership and unwavering commitment to the success of their partners, customers and the entire IT channel.

Fernandez joined the Scale Computing team in 2019 and was the first executive to be named to the CRN Women of the Channel list and the Power 100 list. Over the past year, she helped shift the company’s focus to give Scale Computing’s partners a broader solutions portfolio to share with their end customers. Fernandez was instrumental in driving the company’s commitment to growing its business with the partner community and better enabling them to successfully meet their end users’ IT infrastructure needs. She also played a critical role in expanding Scale Computing’s partner base by nearly double, growing customers and revenue by 45% in 2020.

“Marlena is a key influential member of our executive team, bringing insights from her years of results-oriented global marketing experience to help Scale Computing reach its strategic goals,” said Dave Hallmen, chief revenue officer at Scale Computing. “Her continued commitment to growing our business through our award winning Scale Computing Partner Community and strong leadership makes Marlena very deserving of this recognition for the second consecutive year. For the remainder of 2021 she will help lead our continued focus on bringing edge computing and hyperconverged solutions to large enterprises, solution providers and select industry segments.”

“CRN’s 2021 Women of the Channel list acknowledges accomplished, influential women whose dedication, hard work, and leadership accelerate channel growth,” said Blaine Raddon, CEO of The Channel Company. “We are proud to honor them for their many accomplishments and look forward to their continued contributions to the IT channel.”

The 2021 Women of the Channel and Power 100 award will be featured in CRN Magazine on May 10th and online at www.CRN.com/WOTC.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Colonial Pipeline Attack Spells Fuel Pipeline Shutdown and Highlights the Need for Increased OT Security

On May 8th, news broke that Colonial Pipeline, one of the largest fuel pipelines in the US, was forced to stop all operations due to falling victim to a ransomware attack. The attack on Colonial Pipeline, which supplies close to half of the oil and gas used on the East Coast, is just the latest example of why cybercriminals target the oil and gas sectors. 

Colonial Pipeline Struck by Ransomware

According to a report by The Wall Street Journal, Colonial Pipeline, the operator of the biggest gasoline pipeline in the United States was forced to shut down operations late May 7 following a ransomware attack. The cybercriminals threaten to roil energy markets and upend the supply of gas and diesel to the East Coast. 

Colonial Pipeline is a key passage for the eastern half of the United States.  It’s one of the main sources of gasoline, diesel and jet fuel for the East Coast with a capacity of close to 4 million barrels a day.  They published a statement Saturday saying they were victims of a ransomware attack that affected their corporate IT network.  This attack didn’t exploit their operational network that controls its pipelines and distributes fuel which is separate from the corporate network. Colonial Pipeline announced they did indeed shut down the pipelines as a precaution to prevent the attack from spreading.

Initial thoughts led many people in the security industry to believe that this was another attack by a foreign government. However, Bloomberg published a report on Saturday, May 8th that the attack appeared to be spearheaded by the ransomware group called DarkSide. Known for their “double-extortion” schemes, Darkside took nearly 100 gigabytes of data from Colonial’s network in just two hours on Thursday.

The attackers threatened Colonial Pipeline that if the ransom was not paid, they would leak all the stolen data to the internet, encrypt the data on the attackers’ computers and Colonial’s network would remain locked. It’s not clear how much money the cybercriminals are asking for and how the attackers exploited their network. One thing that is clear, is that this attack is a concrete example that cybercriminals are moving their attention to attacking industrial organizations regardless of size or sector.

Oil & Gas Industry is an Attractive Target 

Over the years, the oil and gas industry has steamrolled into becoming one of the most powerful and economical global industries as it is critical for global and national economies. This has created a major target on their back, as adversaries see these sectors as valuable targets to exploit Industrial Control Systems (ICS) vulnerabilities. In the past, operational technology (OT) needed in oil and gas operations was isolated and “air-gapped,” and today these operational technology networks are connecting more often to different IT infrastructures and to the internet which has created a new door for attacks. The convergence of OT and IT environments in the oil and gas operations has created an endless amount of vulnerabilities from both the IT and the OT environments. There are also emerging risks from Internet-of-Things (IoT) devices and ongoing and growing priorities centered on compliance.

As seen in recent attacks on gas and oil organizations such as Pemex and Colonial Pipeline, it is justifying how attackers have gained an interest in the industry from understanding the different behaviors to how to exploit the organizations. This has resulted in oil and gas organizations needing to protect against any method of cyberattacks to ensure the global economy and civilian safety is not affected due to an attack.

Protecting Oil and Gas Operations

While in the case of the Colonial Pipeline attack, the details of how the adversaries successfully exploited their corporate network are not public yet, it has brightened the light that now is the time for gas and oil organizations to implement a strong OT security strategy. 

Last month, the NSA released a report describing the importance of protecting industrial control systems (ICS) and operational technology (OT) from cyber attacks. In the report the NSA states, “Without direct action to harden OT networks and control systems against vulnerabilities introduced through IT and business network intrusions, OT system owners and operators will remain at indefensible levels of risk.”

Additionally, the NSA report expressed that organizations and operators need to protect critical operations. “While OT systems rarely require outside connectivity to properly function, they are frequently connected for convenience without proper consideration of the true risk and potential adverse business and mission consequences. Taking action now can help improve cybersecurity and ensure mission readiness.”

Before the NSA released this report of their recommendations, many oil and gas organizations have taken the right measures to secure their OT systems and networks.  Over the last seven years, SCADAfence has been working with many critical infrastructure organizations, including oil & gas operators to ensure their OT networks are safe. We provide them with full network visibility, accurate detection of any anomalous behavior and malicious activities – including anomalies that originate from ransomware attacks.

Oil Example diagram in app

The above diagram shows how SCADAfence helps organizations in the Oil & Gas and pipeline industries to have full visibility between their IT and OT networks. This lets them know where the attack vectors are located and they can identify all of the connections between these networks with pinpoint accuracy. This approach has helped hundreds of organizations to successfully mitigate any anomalous activities on their operational networks, which can later turn into a cyber attack.

In an Operational Technology World, Failing to Plan = Planning to Fail

Basic cybersecurity practices can help to prevent these attacks going forward. This includes getting visibility into the entire network, as it’s hard to protect what you cannot see. Additional security practices include network segmentation or even micro-segmentation if possible, and getting continuous network monitoring is even more crucial in preventing similar attacks going forward. 

Numerous oil & gas operators have already adopted continuous network monitoring and threat detection technologies to gain increased visibility into their OT networks and keep their critical infrastructure networks secure. 

With this holistic approach, of network monitoring, anomaly detection, remote access visibility, and compliance, many oil & gas organizations are already reducing 95% of their risk level of future attacks.

A key element of these solutions is that they are all agentless, not intrusive, and can perform superhuman tasks at a fraction of the cost of one human worker.

If your organization is looking into securing their industrial networks, download our case study with a fortune 100 Oil & Gas Industry Leader to learn how SCADAfence provides complete visibility in their OT networks and provides real-time threat detection of any malicious activities.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

阻斷勒索!端點控管讓 EDR 反應更直覺快速

要防範勒索軟體,需要注意三大重點:

  1. 事前阻斷:儘量讓資安問題不要發生。
  2. 平時備份:確保備資料的可用性。
  3. 防止擴散:萬一不幸發生勒索時,要馬上進行止災,防止問題的擴散。

一般來說, 我們就是在前兩項之間不停的循環操作;當問題發生時,進行止災防擴,最後,再將備份的資料,進行有效的還原。

 

事前阻斷

要如何進行事前阻斷呢?推薦使用應用程式控管,阻止未經授權的程序執行,經由精品資安部驗証常見的勒索軟體,都可以有效被阻擋。其中也驗證了勒索軟體大名鼎鼎的勒索軟體,例如:去年 12 月的 DoppelPaymer,對某公司的墨西哥廠勒索 10 億,而另一個 REvil 家族在上個月,竊取蘋果電腦的設計圖,讓某廠因為洩密被勒索 14 億。

我們常說:預防勝於治療,你可以把應用程式控管,想像成隨身戴的口罩,因為口罩是一種非常簡單又有效的預防機制,可以阻斷病毒入侵的管道。

應用程式控管使用全新的白名單技術,用來阻斷惡意程式的運行,也是一種非常早期的預防機制。白名單技術和以往大家熟知的黑名單技術不同,理論上,我們可以使用黑名單,來限制惡意程式的執行;但問題是全世界的程式實在太多了,而且必須事先知道那些程式是惡意的,所以實際上黑名單的設計,本身就是一個後知後覺的機制,無法有效應變惡意程式快速增長的問題。

應用程式控管威力強大,就像是一個雙面刃,不只傷人,也可能妨害自己。如果使用不當,會造成正常的工作軟體無法使用的窘境。所以一定要撘配應用程式白名單的彈性管理,才能有效管理應用程式,不會對自己業務執行人造成妨礙。

應用程式白名單的彈性管理包含下面多種的功能:

  1. 清查:由使用者或管理者發動取得電腦中的應用程式作為白名單
  2. 觀察模式:蒐集使用者執行的程式並列管
  3. 使用者自決:自行新增白名單或停止應用程式控管
  4. 繼承:動態信任應用程式所帶起的子程式
  5. 父行程:防止使用合法的應用程式做為攻擊工具
  6. 自適性:比對應用程式簽章的簽署人,部份字串相同即放行;如:使用 *Microsoft*
  7. 記錄:完整的應用程式執行記錄,可加入為白名單

應用程式控管,可以透過管理良好的白名單,控管任何程式或文件衍伸的執行動作,讓惡意程式在啟動過程中,關鍵的執行點被應用程式控管阻擋,進而達到事前預防的目標。

 

平時備份

面對勒索軟體,備份仍是必要的減災方案,我們推薦使用X-FORT的安全備份功能。

我們瞭解,使用者常常會忘了備份,安全備份定期將資料備份到本機,或是遠端的File Server,在備份的過程中,使用者幾乎沒有感覺,仍可處理日常工作。

FAC(資料夾防護)協助使用者建立安全的工作目錄,限定特定程式,才可以存取此安全的工作目錄,如果惡意程式要存取此安全工作目錄,會被阻擋。

 再把FAC的功能套用在備份的資料夾,形成防護網,確保備份資料的安全性。即使是整個硬碟被勒索軟體破壞,經由 FAC保護的資料仍可保持完好。

 

防止擴散

我們推薦使用EDR ( Endpoint Detection and Response ) 方案,讓問題發生時,可以由端點主動反應防堵,避免災害擴大。

部份的 IT 人員,面臨資安事件,常受限於人力,僅在大問題發生時,才能進行處理。而 EDR 方案,不同於傳統的被動式處理,減輕了 IT 人員的工作負擔,允許在特定的資安事件下,依照自己公司的特色,自動進行一連串的反應。

例如:A公司可以設定,當使用者連到特定國家的 IP 時,自動通知 IT、通知當事人主管,而B公司的控管更嚴格,在相同情形下,還會將此使用者的本機斷網、控管USB、甚至進一步啟動檔案操作記錄,收集使用者的操作歷程。

傳統的資安工具,其規則制定操作,限制了 IT 人員的管理彈性,而EDR 的優點之一,在於可讓 IT 人員因地制宜,在公司的授權範圍下,組合新的資安政策。EDR 的優點之二,在這些政策設定後,即可在特定事件發生時,會自動反應調整政策。不但節省大量人力,以及降低人為操作的疏失。

 

結論

應用程式控管、FAC、EDR 等功能,遠不止對應勒索軟體,也可以用來對應惡意程式、病毒程式,或是防止使用者執行未經授權程式等。X-FORT也提供其他的控管,如SVS安全碟(檔案加密)、控管外接儲存裝置、停用Office巨集、記錄cmd/PowerShell等功能,搭配使用更能全面性防禦勒索軟體 

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於精品科技
精品科技(FineArt Technology) 成立於1989年,由交大實驗室中,一群志同道合的學長學弟所組合而成的團隊,為一家專業的軟體研發公司。從國內第一套中文桌上排版系統開始,到投入手寫辨識領域,憑藉著程式最小、速度最快、辨識最準等優異特性,獲得許多國際大廠的合作與肯定。歷經二十個寒暑,精品科技所推出的產品,無不廣受客戶好評。

8 Tips to Protect Your Password

We are already in the month of May, and you know what we celebrate on the first Thursday of this month, rigtht? That’s correct, it is World Password Day. Celebrated since 2013, this day reminds us of adequate cyber awareness and the importance of password protection in all environments, whether professional or personal. It is not for nothing that passwords are called digital identities.

Our life has been linked more and more to the online world. Not only in relation to work, but also to learning, fun – our and our children’s, even physical activity, and much has been accomplished in digital environments, especially considering the covid-19 pandemic. And in these new times, when a large number of people perform activities remotely from devices without the proper cyber protection mechanisms, it is important to redouble the care with passwords and other sensitive data. Thus, we explain the importance of passwords and their adequate protection for users and organizations in this article.

The combination of user and password has been used as a basic defense mechanism for computer systems since the beginning of their implementation, preventing unauthorized access to data stored on systems and devices. Despite the creation of authentication mechanisms without a password, such as biometrics or one-time passwords (OTP), the combination of user and password is still widely used to access systems and devices. This is because such combination is easy and inexpensive to implement.

In a digital transformation scenario, the multiplication of systems, devices, and their respective credentials is a perfect scenario for malicious attackers to collect passwords and, thus, access data improperly. After all, remembering a password is much easier than the dozens (or even hundreds) of services that require some kind of authentication. It is estimated that the number of passwords per user is between 70 and 100.

According to Cybersecurity Ventures, the world ended 2020 with 300 billion passwords to protect. And the trend shows this number will increase dramatically. Email accounts (personal and professional), banking services, corporate systems, devices, and applications are some examples that require authentication through passwords. And with the increase in the number of data leaks, it is easy to find compromised credentials on forums on the dark web being sold for pennies.

And yes, we know that it is not easy to manage so many passwords. Even the most tech-savvy can struggle to manage and protect credentials in so many different environments. In times of personal data protection legislation, such as LGPD and GDPR, ensuring the protection of such data has become more than a security requirement – it is a business must.

Despite all the risks associated with their use, many users and companies use passwords that are easy to guess, such as numbers or sequential letters (123456 or abcdef). SolarWinds itself, the victim of a serious attack on its supply chain, was using the password solarwinds123 in its infrastructure. Certainly, your email password or mine is stronger than the one used by this American technology company.

So, on this World Password Day, here are some tips that should be considered by users to keep their data protected:

  1. Use long and complex passwords. This prevents hackers from using techniques to guess them. However, just using complex passwords may not be enough to protect them from hackers.
  2. Many devices are configured with default passwords. Change them immediately.
  3. Avoid reusing your passwords on different accounts. Also, constantly check if you have already been the victim of a data leak through senhasegura Hunter. If so, change your passwords immediately.
  4. Configure your passwords to be changed frequently. The ideal is at least every 3 months.
  5. Do not write down, store in an easily accessible place, or share your passwords with others, thus avoiding unauthorized access.
  6. Consider password management solutions, or even privileged access management (PAM), to manage the use of systems and devices.
  7. Use Multiple-Factor Authentication (MFA) mechanisms to add a layer of security to your accounts.
  8. Set up means of retrieving access, such as including phone numbers or emails.

Passwords are one of the oldest security mechanisms in the computing world and are also one of the main attackvectors by hackers. And in the “new normal” era, with increasing threats resulting from the covid-19 pandemic, it is vital that users be alert and properly protect their digital identities. In this way, we can avoid cyberattacks that can cause considerable damage not only to people, but also to companies. And on this World Password Day, remember: security starts with you!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×