Skip to content

訊連科技FaceMe® AI臉部辨識引擎獲日本NEC個人電腦公司採用 打造具備臉部辨識功能之All-in-One個人電腦

202004月21日,台北訊】多媒體領導廠商訊連科技(5203.TW)宣布,旗下FaceMe® AI臉部辨識引擎獲日本NEC個人電腦公司(NEC パーソナルコンピュータ社)採用導入於LAVIE Home All-in-One個人電腦之「LAVIE 人工智慧助手」軟體,透過FaceMe®臉部辨識辨別使用電腦之家庭成員及啟動專屬之使用介面及常用軟體。

LAVIE Home All-in-One為日本NEC個人電腦公司於日本市場上市之全新系列,搭載第 10 代 Intel® Core™處理器,並預載日本NEC個人電腦公司開發之「LAVIE 人工智慧助手」軟體。透過「LAVIE 人工智慧助手」,家庭成員可註冊臉部資訊及設定常用之應用程式,於使用LAVIE Home All-in-One時,透過臉部進行登入、並啟動該成員專屬之 “ Hey LAVIE常見應用”。

「臉部辨識技術是近年來熱門技術,除了各式IoT/AIoT應用外,臉部辨識也可大幅提升消費性電子的方便性。」訊連科技黃肇雄執行長表示:「日本NEC個人電腦公司與訊連在消費性多媒體軟體有長期的合作關係。透過導入FaceMe®臉部辨識,NEC LAVIE Home All-in-one及LAVIE 人工智慧助手可提供家用用戶更方便、快速,且安全性高的臉部辨識。」

FaceMe®為專為邊緣運算(Edge Computing)打造的臉部辨識引擎,可支援Windows、Linux、Android和iOS等多種作業系統。FaceMe®AI臉部辨識引擎,擁有高達99.70%的辨識率,在全球知名NIST臉部辨識競賽中,名列全球最精準且最快速的刷臉技術之一,也是台灣於該項臉部辨識競賽中表現最佳之廠商。除了可以支援功效強大的工作站或個人電腦,亦可針對IoT/AIoT物聯網設備中的輕量、低功耗設備進行優化。彈性SDK解決方案,能建構智慧安控、智慧零售、智慧辦公室、智慧警政和智慧金融等應用。已被國內外多家知名廠商採用,發展以臉部辨識技術為核心之新一代智慧應用。

 

關於訊連科技

訊連科技(5203.TW)創立於1996年,為全球首屈一指的多媒體影音軟體及服務,以及AI臉部辨識技術開發商。訊連科技的產品及服務涵蓋數位內容創作、多媒體影音播放、視訊會議及直播與遠距教學、行動應用、AI人臉辨識等多樣化解決方案,滿足消費性、商務、教育等跨領域多媒體應用。旗下威力導演、相片大師、PowerDVD等電腦軟體和行動APP,透過零售、訂閱式服務及預載等方式,提供個人電腦品牌多樣化應用軟體,於全球累積了超過3億名用戶。

訊連科技亦深耕人工智慧及臉部辨識領域,透過深度學習法開發FaceMe® AI臉部辨識引擎,提供智慧零售、智慧門禁、智慧城市、智慧家庭等垂直應用市場可靠、準確之AIoT人臉辨識解決方案。

 

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

ESET-funded, Slovak-made diagnostic kit for COVID-19 receives regulatory approval in the Slovak Republic, with 100,000 tests ready for delivery

A new COVID-19 diagnostic kit developed by Slovak scientists is registered by Slovakia’s State Institute for Drug Control (ŠUKL). The first 100,000 tests, donated to the Slovak Republic by the ESET Foundation, are ready to be handed over to state diagnostic laboratories.

BRATISLAVA – Slovak scientists from MultiplexDX, the Biomedical Research Center of the Slovak Academy of Sciences (BMC SAS), the Comenius University Science Park in Bratislava, Lambda Life and ProScience Tech joined forces to develop and register the first Slovak-made diagnostic kit for COVID-19. The ESET Foundation supported the development and production of the kit and donated the first 100,000 tests to the government of the Slovak Republic.

On May 14, the State Institute for Drug Control (ŠUKL) approved the kit, which is called vDetect COVID-19 RT-qPCR. The first 100,000 tests will be delivered to state diagnostic laboratories. “The State Institute for Drug Control dealt with the application for registration of the test as a matter of priority, and the final decision was issued within four working days of receiving the application. With the technical dossier and validation tests meeting the necessary criteria, the registration went smoothly. This is the first registration of an IVD test by the State Institute for Drug Control that was designed, manufactured, and registered in Slovakia,” says the director of ŠUKL, PharmDr. Zuzana Baťová, PhD.

During the process of test validation, Slovak researchers from MultiplexDX came up with a way to increase the test’s sensitivity, which slightly delayed the regulatory submission. “When we performed a forensic analysis, we found that the primers used to confirm the test results according to the Charité protocol were not designed optimally. Therefore, we prepared a new version of primers that increased the sensitivity and, consequently, the accuracy of the test. Then it was necessary to repeat testing and, due to this, the original date of the test’s registration was postponed,” explains Pavol Čekan, PhD, founder of MultiplexDX. The tests underwent validation showing a 100% match with the samples already evaluated.”

Blind validation tests, performed at two independent laboratories on 92 clinical samples, showed identical results in comparison with the reference method, as well as with each other. This demonstrates the high reliability of the test directly on clinical samples,” says RNDr. Boris Klempa, DrSc., from BMC SAV.

The ESET Foundation supported the development of the tests, donating the first 100,000 tests to the state. ESET also covered the financing and coordination of activities related to the test’s production and registration.

“The development of the new diagnostic kit confirms that science in the Slovak Republic is being pursued at a high level and, at the same time, demonstrates the ability for science to bring solutions to societal problems. That’s why we have been supporting science for a long time. ESET’s involvement in the development of the coronavirus diagnostic tests has also been an interesting challenge for us because we have been detecting virtual viruses since our founding as a company,” comments Richard Marko, CEO of ESET.

Throughout the test’s development and validation, the team of RNDr. Tomáš Szemes, PhD from the Charles University Science Park in Prague, also participated: “We worked with the team on optimization and validation, and I was surprised at how quickly and smoothly the process went, including registration.” The final documentation for registration at ŠUKL was prepared by Roman Oravec from the non-profit organization CCCT SK.

The Slovak companies Lambda Life and ProScience Tech were also involved during the entire preparation of the diagnostic kit. “With the cooperation of numerous talented scientists and domestic companies, we not only received approval for the first Slovak-made PCR test for COVID-19, but also developed a top product in difficult conditions, one that will help the country when it needs it most. It was by no means an easy task, and I am happy that it succeeded in the end,” concludes Róbert Mistrík from the Slovak government’s permanent crisis team. 



About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

GREYCORTEX CEO ON HOW TO MINIMIZE THE RISK OF RANSOMWARE ATTACK

13+1 PRINCIPLES FOR THE SECURITY OF YOUR NETWORK

Ransomware – a term that we were already aware of a few years ago but most of us rather took it as a “not-our-problem” kind of thing. However, cybercriminals didn’t see it the same way and it was just a matter of time before that kind of extortionate vermin came to do harm in our land, too. And even though the attacks on Benešov Hospital and OKD were not among the first ones, their coverage definitely raised awareness of the topic. Then, the emergence of coronavirus has actually created new opportunities of phishing and ransomware campaigns for cybercriminals; hugely supported by the massive transition of office workers to home office.

There have been many confirmed cyber attacks just in Czechia in the past three months (the real number of organizations that fell victim to a cyber attack in Czechia is likely to be higher but not all the information gets published): Prague Castle AdministrationUniversity Hospital BrnoPsychiatric Hospital Kosmonosy, Vltava River Basin Management and Prague 3 City District Administration. Recently, having its branches in Czechia, the medical company Fresenius has also been attacked.

Now that the topic of cybercriminals and the possibilities of protection against them gets more publicity, it could come in useful to refresh a few rules which may significantly minimize the risk of an attack on your infrastructure. I’m going to try to summarize them in this article without getting too technical and complex so that anybody can understand. Hopefully, successfully 🙂

Rule number 1
Don’t try to find a single solution to the whole area of cyber security – there’s nothing like a “Silver Bullet” or “Holy Grail” (i.e. a single “cover-it-all” or “save-it-all”) solution. Simply not. Just as in cars, with a lot of various features that increase the safety (the sole car construction ensures passive safety, then there are the safety belts, airbags, ABS and other electronic systems), it’s their combination that will make you more likely to survive an accident, or get away without getting injured. The same applies to cyber security – it takes various “layers” of security and their correct combination to ensure the maximum degree of protection.

Rule number 2
Use up-to-date versions of operating systems and update them regularly – those “once-in-a-blue-moon” updates leave enough space for an attacker to use unpatched flaws to penetrate your infrastructure. If, for some serious reason, you really have to use operating systems after they expire (i.e. their developer doesn’t issue updates anymore), at least reserve a separate segment in the network for such devices and take special care of them; however, it’s definitely better not to have such devices in the infrastructure at all. Don’t forget to regularly update any other software you use – as well as an out-of-date operating system this can also lead to the infection of your infrastructure.

Rule number 3
Use good-quality antivirus solution. Current antivirus software includes a lot of security mechanisms and their scope is rather vast so they will help you prevent plenty of problems. Nevertheless, the same rule as with operating systems applies here – update, update, update!

Rule number 4
Don’t trust the “experts” who claim that it’s enough to use common sense, not to open suspicious attachments and to behave sensibly “on the web” to prevent the infection – that’s not true anymore. Modern malware can exploit unpatched flaws not only in operating systems, but also in applications, etc., and it can use them to get into your infrastructure without you performing an action knowingly (such as opening an email attachment).

Rule number 5
Even your firewall and network elements deserve your attention and regular updates. After all, firewall or routers are also computers, i.e. hardware, which run some specialized software. And as it’s generally known and the experience has confirmed that there’s a flaw in every kind of software, it’s vital to update such devices regularly, too. If you don’t do so, you open yet another route into your infrastructure for attackers, just as we showed in practice at our conference GREYCORTEX DAY, where we demonstrated an attack on a typical network infrastructure live.

Rule number 6
Unless necessary, don’t work within the administrator account. It’s not really needed for regular work and if an attacker breaks through the security of the device you’re logged on as an admin (most probably unnecessarily), you’ll make their efforts much easier as well as their way to your data (and possibly money).

Rule number 7
If you use any kind of remote desktop at work, don’t leave it on, nor permanently open to the Internet, as it’s often the target of initial stages of an attack and you practically leave the door to your infrastructure open. In general, be careful how your colleagues or suppliers working remotely connect and which permissions they have, which parts of the infrastructure they can access and how their connection to internal tools is secured. All this is linked to the following rule:

Rule number 8
Use VPN only (Virtual Private Network) for external connection to the internal network. If you allow direct connection from the outside without using VPN, sooner or later, some attacker will abuse it. Don’t forget to cancel disused VPN accounts as there’s always the danger of abuse of a long-forgotten access. This applies in general – if you grant anyone access to anywhere and they don’t need it for work anymore, cancel it.

Rule number 9
Divide the visitor (i.e. publicly accessible) and internal / production parts of infrastructure thoroughly and consistently. This doesn’t only apply on guest Wi-Fi, but any part of the infrastructure which can be freely accessed by unknown persons. A lot of attacks on internal infrastructure start by a “visit” of an unwelcome guest from the publicly accessible part of the network.

Rule number 10
Cybercriminals keep improving and coming up with new ways how to convey harmful code to you and your colleagues, so it’s useful to get informed regularly on new ways how someone might try to trick you (or make you do something that will spread the infection) and on new dangers. It’s definitely not a waste of time or money to take part in an interesting conference on such a topic or get regular training from companies that focus on prevention. You’d have to invest a lot more time and money in removing the consequences of actions of unknowing employees. Unfortunately, the human factor will always be the weakest link in the chain of cyber security, so it pays to regularly raise awareness of what may happen.

Rule number 11
If your colleagues work within your infrastructure on their own devices (so called BYOD, Bring Your Own Device), it’s necessary to count on the fact that you’ll have to apply all the mentioned rules on such devices, which is rather a big problem. One of the possible solutions is granting these devices access only to a certain segment of the infrastructure, secure it properly and monitor, which may obviously be quite strenuous.

Rule number 12
If I don’t understand something, I can’t deal with it. If you don’t have sufficient insight into the whole infrastructure and you don’t have the possibility to monitor what’s going on in it, the attacker is invisible to you and you’re practically blind (until the attack shows in its full extent, i.e. in case of ransomware data encryption). That’s why it’s convenient to use the NTA solution (Network Traffic Analysis), such as our solution GREYCORTEX MENDEL. These tools will not only allow you to see (to the tiniest detail) which devices there are in your network and what’s going on in them, but they will also enable you to get timely notifications in case there’s a suspicious and dishonest activity in the infrastructure thanks to the automatic analysis of the entire network performance and running event correlation (if you’re interested in more information, you’ll find it here). Obviously, it’s necessary to process such notifications and secure a remedy to the flaws found, but that’s well beyond this article. If there isn’t an internal department dealing with cyber security, you can get the SOC services (Security Operations Centre) at some of our partners and leave this burden with them. You’ll appreciate the NTA solution especially in case the attacker manages to disable your antivirus solution or to get through your firewall (e.g. by hiding illegitimate, harmful traffic inside the legitimate traffic and thus trick the firewall), as they can’t hide the signs of harmful behaviour from permanent analysis of network traffic. What’s more – the NTA solution will help you with forensic analysis, i.e. subsequent investigation, of where the attack came from or how the infection got inside your infrastructure, which will help you detect and remove weak spots in security.

IN SHORT – WHAT ARE THE MAIN BENEFITS OF OUR NTA PRODUCT GREYCORTEX MENDEL IN YOUR FIGHT WITH CYBER CRIMINALS?

  • It’s fully passive and it analyses the mirror of all your network traffic – it can basically monitor everything but at the same time it’s invisible to cybercriminals, they don’t know that you know about them and their activities.
  • It doesn’t send any data “home” for analysis (manual analysis by an army of analysts), but analyses everything using machine learning and other advanced methods.
  • Unlike us, people, it works 24/7/365 (plus one extra day in leap years) and it never gets tired.

You’ll find practical demos how GREYCORTEX MENDEL helps increase cyber security here.

Rule number 13
Back up, back up and back up again! Ideally, make backups on exchangeable media and take them physically away from your company’s premises (you’ll ensure continuity of work in case of fire, flood or mobilisation by doing so :), but mainly, you’ll make sure that in case of ransomware attack the backups in the same infrastructure won’t be encrypted. If, for some reason, it’s not possible or convenient to take away backups physically, make sure the servers with back-up copies aren’t connected to your infrastructure permanently and thus inaccessible to the attackers in time of an ongoing attack – otherwise they’ll encrypt even these backups and there won’t be anywhere to recover the data from.

And finally, the last rule: Even following all the above-mentioned rules may not ensure 100 % protection against an attack of your infrastructure as present cybercriminals are no “greasy teenagers” who want to prove themselves anymore, but professional groups with huge budgets and possibilities.

But if you stick to all of the above-mentioned, you’ll at least make their attempt to launch an attack immensely difficult, and because they know that the effort must be smaller than the possible profit (for their “business” to make sense), it’s highly probable they’ll attack somebody else instead, someone who’s an easier target not having followed the rules.


About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

WannaRen預警偵測通報

最近發現WannaRen勒索病毒肆虐,各處災情頻傳。Version 2 Limited為ESET總代理,彙整以下偵測預防方案,供各位參考預防、避免遭受WannaRem攻擊。

1. 以下三個已知的WannaRen勒索軟體的Hash,ESET防毒已可偵測到,並有效的阻攔。
1de73f49db23cf5cc6e06f47767f7fda
46a9f6e33810ad41615b40c26350eed8
235cca78c8765fcb5cf70a77b1ae9d02

2. 已知Windows系統中會遭受感染的檔案之Hash如下:
WINWORD.EXE CEAA5817A65E914AA178B28F12359A46
wwlib.dll 9854723BF668C0303A966F2C282F72EA
you 2D84337218E87A7E99245BD8B53D6EAB
nb.exe CA8AB64CDA1205F0993A84BC76AD894A
officekms.exe 39E5B7E7A52C4F6F86F086298950C6B8
WinRing0x64.sys 0C0195C48B6B8582FA6F6373032118DA

3. 已知會散佈WannaRen勒索軟體的位置:

4. 已知會以釣魚方式寄送郵件,誘使使用者點擊連結去下載勒索軟體的位置:
5.101.0.209、5.101.1.209、217.12.209.234、91.215.169.111、193.33.87.219

建議:
1. 於ESET防火牆或Windows防火牆中直接阻擋這些位置:



和這些IP。
5.101.0.209、5.101.1.209、217.12.209.234、91.215.169.111、193.33.87.219

2. 搜尋電腦中的WINWORD.EXE、wwlib.dll、you、nb.exe、officekms.exe、WinRing0x64.sys,並提交給ESET分析,確認是否真的已遭受感染。

3. 以上Hash或IP與網站位置,可以透過IPS/IDS製作偵測規則,透過IPS/IDS進行預警與防禦。以下是以SNORT為範例製作的偵測參考規則:
alert tcp $HOME_NET any <> $HOME_NET any (msg:”Deleted: Payload Ransomware Detected”; flow:from_server,established; content:”|0C0195C48B6B8582FA6F6373032118DA|”; depth:500; metadata:created_at 2020_05_04, updated_at 2020_05_13; priority:1; classtype:malware-cnc; sid:1002000346; rev:12;)


About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

MAGIX Software GmbH Unveils New Strategy

MAGIX Software GmbH Unveils New Strategy to Democratize Audio and Video Creation, Announces Key Organizational Changes and Appoints Jeffrey Krebs as Chief Product Officer.


05/10/23
MAGIX Software GmbH, a leading provider of audio and video software solutions, announces their new strategy and vision: Democratize audio and video creation by enabling content creators and knowledge workers with intuitive, assisted and collaborative workflows. The company aims to streamline the creative process as a whole, allowing users of any skill level to focus on creativity and produce better and faster results.Executing on this new strategy, MAGIX consolidates its product portfolio and reorganizes the company with immediate effect. Shifting from a product-based towards a capability-based organization enables a culture of efficiency, innovation and collaboration, with the goal of bringing cutting-edge solutions to the market faster. This will maximize cross-product synergies and focus investments on delivering maximum value to users of Vegas, Sequoia/Samplitude, Music Maker and MAGIX content.

Key Organizational Changes with Jeffrey Krebs as Chief Product Officer

To spearhead this shift in product strategy, MAGIX is pleased to announce the appointment of Jeffrey Krebs as Chief Product Officer (CPO) across all products, with the product leadership team reporting directly to him. Jeffrey brings a wealth of experience in the technology industry, having held leadership roles at several global tech companies, including Avid Technology, Eyeon Software, and Blackbird. Throughout his career, he has been instrumental in driving product innovation, growth, and customer success.

Jeffrey comments on his new role, “I am thrilled to be joining MAGIX and working with the development teams on its world-class video editing environment, Vegas Pro, and professional audio editing and mastering solution, Sequoia/Samplitude and the #1 downloaded DAW Music Maker. The company’s dedication to innovation and customer-centric approach aligns with my vision for the future of digital content. I am eager to contribute to the mission of democratizing audio and video creation, and I look forward to delivering cutting-edge solutions that empower creative minds around the world.”

“We are excited to welcome Jeffrey to the MAGIX family and are confident that his leadership and vision will help us deliver on our ambitious goals.” says Denis Burger, CEO of MAGIX Software GmbH.

“Our new strategy and vision will empower all users to unlock their full creative potential and to achieve high quality audio and video editing fast and easily. With Jeffrey’s guidance, we look forward to accelerating our product innovation and driving customer success across the globe.”

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About VEGAS
Today, millions of VEGAS Pro and VEGAS Movie Studio users benefit from global industry-leading video editing technologies. Now, VEGAS launches into a new era. In May, 2016, MAGIX acquired the multiple award-winning VEGAS Pro and VEGAS Movie Studio product lines, along with other video and audio products. VEGAS Creative Software stands poised to take video editing to a new level. Our development teams in the US and Germany are working on innovative solutions to old problems, and building tools that push the boundaries of what’s currently possible. The VEGAS Creative Software mission: to make VEGAS software faster, more efficient, and even more intuitive. Our goal: to provide users at all levels–from video editing amateurs to creative professionals–tools that are perfectly suited to their needs and demands.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×