Skip to content

Empire Airlines Soars to New Heights with Scale Computing

At Scale Computing, the success of our customers is our priority. Whether they are on land, air or sea, we have the ability to provide our customers with the technology they need to power their IT infrastructure across industries, regardless of size or location.

Founded in 1977, Empire Airlines in Hayden, Idaho flies 50 aircraft for FedEx, as well as passenger and cargo aircraft for Hawaiian airlines. In addition to its air carriers, Empire Airlines has a maintenance repair overhaul facility in Idaho, where the company takes airplanes apart and puts them back together.

According to Melanie Ellingson, director of IT at Empire Airlines, the company was looking to upgrade its legacy IT infrastructure with a virtualization solution. Ease of use was a priority for Ellingson, who said she wanted a simple solution that did not require additional training or specialized personnel to maintain the IT infrastructure. After researching competitors, Ellingson selected Scale Computing, remarking, “With Scale Computing, you plug it in, turn it on and you’re running. That’s all there is to it.”

How Empire Airlines Leveraged Hyperconverged Infrastructure

Hyperconverged infrastructure (HCI) solutions like the HC3 virtualization platform eliminate the need to combine traditional virtualization software, disaster recovery software, servers, and shared storage from separate vendors to create a virtualized environment. The HC3 all-in-one appliance architecture makes it easy to deploy fully integrated, highly available virtualization out of the box. With HCI, you can more easily deploy your virtualization architecture to consolidate servers in your environment and eliminate the need for storage appliances like SAN and NAS. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects problems in the infrastructure in real-time, enabling applications to achieve maximum uptime even when local IT resources and staff are scarce.

The platform combines self-healing with intelligent automation, empowering Scale Computing customers to spend less time on infrastructure maintenance and more time focusing on strategic projects to grow their business. Since implementing Scale Computing HC3, Ellingson said she and her team save time bringing up servers, adding, “If I need something, it’s there instantly. Before, I had to research hardware, get it delivered, put it in a rack. Now we have time to work on other projects.”

At Scale Computing, our HC3 architecture combines hyperconverged infrastructure for everything from centralized data centers to widely distributed edge computing use cases, and comes fully equipped with a number of built-in disaster recovery capabilities. Even in an emergency with the failure of hardware components or entire appliances, HC3 infrastructure lets you keep critical apps – and your entire organization – up and running.

After one drive failure, Ellingson said the combination of the HC3 platform and Scale Computing support team ensured Empire Airlines had minimal downtime. Ellingson noted, “HC3 alerted us, we called Scale Computing’s support team, they sent a new drive to us the next day, we put it in and we were done. I can’t stress how easy it is.”

Driving Performance with Edge Computing

With 16 locations across the U.S., Empire Airlines also benefits from an edge computing solution. Scale Computing HC3 brings simple, available, and affordable infrastructure to edge computing. The solution meets the company’s demands for operating a distributed enterprise with its highly available features that make it ideal for multiple industries. The HC3 platform also provides the flexibility, ease of use, and scalability that many customers require to create reliable and efficient working environments.

With HC3, organizations are able to improve the availability of critical workloads, rapidly scale their infrastructure, enhance disaster recovery capabilities, and do it all more simply and easily. HC3 is modern infrastructure for modern companies across industries. For more information on Scale Computing HC3, visit here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Cyberattack: another big company is a ransomware victim

Another cyberattack with devastating consequences for financial institutions. The target now was BancoEstado, one of the three largest Chilean banks, which was affected by ransomware on September 6. According to a statement to Chile’s Cybersecurity Incident Response Team (CSIRT), the cyberattack is believed to have involved the Sodinokibi ransomware, also known as Revil.

On the 6th, the bank informed through a statement that it had detected malicious software in its operating systems and that their platforms could have some kind of unavailability due to the incident. However, ATMs and Internet Banking were not affected, nor were the resources of its customers or the institution itself. It is believed that the attack, again, was orchestrated through Social Engineering, when one of the bank’s employees opened an Office document infected with the virus.

By compromising the employee’s machine, the attacker was able, through lateral movement, to infect more than 12,000 endpoints and affect the operations of all 416 branches of the Chilean bank.

After detecting the cyberattack on the 5th, Saturday, BancoEstado reported the incident to the Comisión para el Mercado Financiero (CMF), the equivalent of our Securities and Exchange Commission (CVM), which soon issued an alert to the Chilean banking system.

Long lines formed in the days following the cyberattack in front of BancoEstado branches. Account holders have complained on Twitter about various anomalies in their accounts, such as uncredited transfers to destination accounts, as well as lack of access to investment accounts, and inconsistent data in the amount totals. At the same time, there are reports that cybercriminals have started spam campaigns on behalf of the bank to capture customer credentials.

An attack of this magnitude indicates major flaws in the control of access to internal networks, including an efficient monitoring and response system. This involves the lack of computational and human resources for adequate response to incidents.

Another organization victim of the same ransomware that hit BancoEstado, in July this year, was Telecom Argentina, the country’s largest telephone operator. In this specific case, the required amount was US $ 7.5 million.

Learn more: How to protect your company from insiders threats?

But, what is the Sodinokibi ransomware and how does it work?

Sodinokibi is a family of ransomware that affects Windows systems and encrypts important files, requesting a cash amount to decrypt them. The ransomware creators are also associated with other malicious software, GandCrab, which was already linked to approximately 40% of global ransomware infections before being retired by its creators in June 2019. Thus, one can already have an idea of the potential for Sodinokibi infection.

The first difference noticed by users when having their device infected by ransomware is an infection warning, when the files are already encrypted. The ransom instructions are also visible on the user’s Desktop.

More than ever, cyberattacks through ransomware are among the biggest risks for organizations of all sizes and industries. According to the Mid-Year Threat Landscape Report 2020, there was a 750% increase in attack attempts through malicious software involving ransoms. And not only is the number of these attacks increasing but so is their sophistication.

In many cases, malicious attackers use threats against their victims to leak encrypted data, something that can compel them to pay the high amounts required as a ransom. One of the causes is the heavy sanctions that organizations are subject to in case of data leaks. If the leak involves personal data of European citizens and the organization is subject to GDPR, the fine could reach up to 50 million euros. If it takes place in Brazil and the LGPD is applied, this amount can reach up to 50 million reais.

One of the ways to mitigate the risks associated with a ransomware infection is to ensure that security updates are applied as soon as they are released by developers. By doing this, one can prevent malicious attackers from exploiting vulnerabilities to infect the environment. The implementation of features such as Multifactor Authentication is another strategy that prevents hackers from moving laterally through the environment and infecting even more endpoints.

Cybersecurity teams must also perform backups of their systems, as well as periodic testing as part of their disaster recovery and incident response plans. Thus, it is possible to guarantee that the systems are recovered without the need to pay a ransom.

Deploying a PAM solution such as senhasegura is also an excellent way to mitigate cybersecurity (and business) risks associated with ransomware infection.

Through our Privilege Elevation and Delegation Management solution, senhasegura.go, one can segregate access to sensitive information, isolating critical environments, and correlating events to identify any suspicious behavior. By controlling lists of authorized, notified, and blocked actions with different permissions for each user, senhasegura.go allows reducing the risks linked to the installation of malicious software and abuse of privilege, which can compromise the environment. Finally, through senhasegura, one can overcome the challenges of implementing controls for data protection legislation such as GDPR and LGPD, as well as PCI, ISO, SOX, and NIST regulations, with the automation of privileged access controls to achieve maturity in the audited processes.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

ESET CEO Richard Marko to help the Cybersecurity Tech Accord and UN offices bring innovative digital solutions as a judge on Apps 4 Digital Peace competition panel

Bratislava – Richard Marko, CEO of ESET, a global leader in cybersecurity, has been invited to judge the first-of-its-kind Apps 4 Digital Peace Competition organized by the Cybersecurity Tech Accord, the United Nations Office for Disarmament Affairs (UNODA), and the https://www.un.org/youthenvoy/.

The competition was created in response to the dramatic increase in the malicious use of information and technology by state and non-state actors. Given the possible threat to international peace and security, these organizations felt a need to encourage the brightest young minds to help develop technology solutions to limit the use of the internet as a domain of conflict, and to increase the security and stability of our online environment.

Through ESET’s involvement as a signatory of the Cybersecurity Tech Accord, Mr. Marko will join a panel of distinguished judges to help stimulate new and ethical thinking from young innovators across the world. The other members of the panel are Alex Stamos, director, Stanford Internet Observatory and former Facebook CISO; Damir “Gaus” Rajnovic, cybersecurity manager of Panasonic; Kim Zetter, award-winning journalist covering cybersecurity and national security issues; Liis Vihul, CEO, Cyber Law International; and Jayathma Wickramanayake, the UN Secretary General’s Envoy on Youth.

Five finalists are in the running to receive both cash prizes and networking opportunities that will help get their ideas off the ground. The winners will be invited to attend the Cybersecurity Tech Accord’s annual meeting to present their Apps 4 Digital Peace submission to some of the world’s leading technology companies committed to improving security online for users everywhere.

“It is a privilege to serve on the judging panel for the first-ever Apps 4 Digital Peace Competition,” said Mr. Marko. “At ESET we are passionate about making technology safer for everyone, and we are proud to empower the leaders of tomorrow in creating and developing innovative solutions that promote digital peace.”

“I’m excited to see what these bright, young minds create to tackle the many challenges that the cyber world brings,” said Tony Anscombe, Chief Security Evangelist at ESET. “Our youth innovators are the future of cybersecurity. Their contributions will help form cyber hygiene practices, protect infrastructure and promote responsible online behavior, creating a positive impact in our online world.”

The Apps 4 Digital Peace Competition Virtual Award Ceremony will take place on September 21 from 10:00 am to 12:00 pm EDT. Click here to register to watch the ceremony.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET Research discovers close cooperation among Latin American financial cybercriminals

BRATISLAVA, PRAGUE – ESET researchers have today published a white paper detailing their findings on the interconnected nature of Latin American banking trojan families. Even though Latin American banking trojans can be looked upon as one homogeneous group of malware, ESET reports that multiple distinct malware families can be recognized. At the same time, ESET researchers have discovered a surprising number of indicators of close cooperation among Latin American banking trojan authors. Despite the term “Latin American,”  some of the trojans have been targeting Spain and Portugal since late last year. The white paper was first published during the VB2020 localhost conference.

“Over the past year, we have been publishing an ongoing blog post series about Latin American banking trojan families. These blog posts mainly focus on the most important and interesting aspects of these families,” says Jakub Souček, one of the researchers working on Latin American financial cybercrime. “At the VB conference, we looked at these families from a high-level perspective. Rather than examining details of each family and highlighting their unique characteristics, we focused on what they have in common.”  

The first similarities ESET spotted were in the actual implementation of these banking trojans. The most obvious are the practically identical implementations of the banking trojans’ core functionalities and attack techniques via fake pop-up windows carefully designed to lure victims into providing sensitive information. Besides that, these malware families share third-party libraries, generally unknown string encryption algorithms, and both string and binary obfuscation techniques.

Other similarities can be observed in malware distribution. The trojans usually check for a marker used to indicate that the machine has already been compromised and download data in ZIP archives. ESET also observed identical distribution chains distributing several different payloads and shared execution methods.

“Additionally, different families use similar spam email templates in their latest campaigns, almost as if this was a coordinated move,” says Souček. “Since we don’t believe it to be possible that independent malware authors would come up with so many common ideas – and, moreover, since we don’t believe one group to be responsible for maintaining all these malware families – we must conclude that these are multiple threat actors closely cooperating with each other.”  

For more technical details about this spyware, read the white paper “LATAM financial cybercrime: Competitors in crime sharing TTPs” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.  

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

訊連科技推出新一代「威力導演」、「相片大師」及「創意導演」系列 全新特效、升級功能 強化多媒體創作體驗

更多AI智慧編修工具、擴充特效與內建數十萬款圖片、影片之 Shutterstock素材庫

所有創作者皆能輕鬆打造專業級作品

2020917日,台北訊】多媒體創作軟體領導廠商訊連科技(5203.TW)今日舉辦創意導演家族新品線上發表會,發布全新一代的「威力導演365」、「相片大師365」及「創意導演365」訂閱版本更新,除內建Shutterstock素材庫外,也推出各式全新特效套件、擴充內容,及採用AI等先進技術打造的全新創作工具,為使用者帶來更強大的編輯工具、豐富擴充內容及優化創作流程。

針對影音創作者的創作需求,全新版本的「威力導演365」及「威力導演19」大幅強化介面設計,透過更簡潔的編輯介面有效提升影片編輯效率,並簡化重複套用不同特效的繁複程序。此外,也提供全新的向量筆畫範本、遮罩設計師、色調調節及自訂動態圖形文字等工具,為使用者提供更快速、高效率、精準的編輯體驗,不論是剛開始接觸威力導演的使用者或專業YouTuber、影音創作者等都能輕鬆創作出吸睛作品。

「相片大師365」及「相片大師12」全新的AI人像去背工具可準確辨認相片中之人像進行去背及背景分離,可廣泛使用在圖層編輯及多種特效工具中,可加速圖文創作者、設計師人像去背流程。此外,相片大師亦新增了動態照片、碎片效果、故障特效及光線效果等,協助創作者快速打造吸睛的社群圖文創作。

「創意導演365」是全方位的多媒體創作軟體,集結最新版本之威力導演、相片大師、AudioDirector及ColorDirector等四套旗艦創作軟體,協助專業影音創作者打造專業影片、圖文創作,更可透過強大的音訊編輯工具及影片調色工具,增加影片的專業感。針對「創意導演365」、「威力導演365」及「相片大師365」之訂閱戶,除了每個月更新訂閱戶專屬的特效、背景音樂、音效等素材擴充外,更內建Shutterstock影音素材庫,訂閱用戶可由程式中瀏覽、下載超過十萬種的影片、圖像及音樂素材。

「全民創作時代來臨,無論是一般用戶或是專業的影音或是圖文創作者,都需要功能強大、簡易上手的創作工具來進行創作。此外,創作時各式影片、圖片,甚至音樂素材皆是打造吸睛作品不可或缺的。」訊連科技執行長黃肇雄表示:「此次創意導演、威力導演及相片大師的升級,除了在功能上大幅強化、優化使用者介面外,也與全球最大的專業素材庫公司Shutterstock攜手,提供訂閱用戶數十萬種的影音素材庫,讓所有使用者皆能揮灑創意不受限。」

更多創意導演家族、多媒體創作軟體資訊請上訊連科技官網: https://tw.cyberlink.com/products/index_zh_TW.html

創意導演家族已可於指定零售通路選購,並內建繁體中文、簡體中文、英文、法文、德文、義大利文、西班牙文、日文及韓文等九國語系。

2020創意導演家族新品線上發表會

活動回看連結:https://u.cyberlink.com/live/840385615882094748

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×