Skip to content

Scale Computing Named a Winner for CRN’s 2021 Tech Innovator Award

INDIANAPOLIS – November 8, 2021 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, announced today that CRN®, a brand of The Channel Company, has named Scale Computing as a winner for the 2021 CRN Tech Innovator Awards. Scale Computing is being recognized for its HC3 Video Surveillance in the Edge Computing category.

Scale Computing expanded its Edge Computing offerings earlier this year by introducing HC3 video surveillance and security solutions, optimized to consolidate video storage, video management, access control and analytics workloads. HC3 Video Surveillance offers autonomous self healing, providing both hands-off resiliency to keep VMS records and access to recorded data even when hardware components fail.

Video surveillance implementations are critical to organizational security and monitoring, as traditional video management systems, monitoring, and new IoT technologies for video analytics and artificial intelligence continue to be a major challenge for organizations. Today’s complex infrastructure environments – both in the data center and at the edge – require simpler deployments with affordable and easy-to-deploy infrastructure solutions.

“As technology further pushes its way into every part of the business, the need for edge computing to support an application-driven world is expanding,“ said Jeff Ready, CEO, and co-founder of Scale Computing. “We are honored to be recognized by CRN and remain dedicated to delivering innovative solutions, like HC3 Edge technology, to bring simple, available, and affordable infrastructure for applications in places where IT resources are impossible.”

As technology further pushes its way into every part of the business, the need for edge computing to support an application-driven world is expanding

This annual award program showcases innovative vendors in the IT channel across 47 different technology categories, in key areas ranging from cloud to storage to networking to security. To determine the winners, a panel of CRN editors reviewed hundreds of vendor products using multiple criteria, including key capabilities, uniqueness, technological ingenuity and ability to address customer and partner needs. This recognition follows the ARC awards Scale Computing won this summer from CRN®, a brand of The Channel Company, in both the Edge Computing category and the Hyperconverged Infrastructure category. The company also swept all of the subcategories including Product Innovation, Support, Partnership, and Managed & Cloud Services in both Edge Computing and Hyperconverged Infrastructure.

This annual award program showcases innovative vendors in the IT channel across 47 different technology categories, in key areas ranging from cloud to storage to networking to security. To determine the winners, a panel of CRN editors reviewed hundreds of vendor products using multiple criteria, including key capabilities, uniqueness, technological ingenuity and ability to address customer and partner needs. This recognition follows the ARC awards Scale Computing won this summer from CRN®, a brand of The Channel Company, had named Scale Computing a winner of the 2021 CRN Annual Report (ARC) Awards in both the Edge Computing category and the Hyperconverged Infrastructure category. This was the third consecutive year Scale Computing has been recognized as a CRN ARC Award winner. The company also swept all of the subcategories including Product Innovation, Support, Partnership, and Managed & Cloud Services in both Edge Computing and Hyperconverged Infrastructure.

“CRN’s annual Tech Innovator Awards acknowledge technology vendors that display their ongoing commitment to empowering and enabling end users, while also promoting continuous business growth for solution providers, with cutting-edge, purpose-built products and services,” said Blaine Raddon, CEO of The Channel Company. “I’d like to personally congratulate each and every one of this year’s CRN Tech Innovator Award winners. We are proud to recognize these best-in-class vendors that are driving transformation and innovation in the IT space.”

The Tech Innovator Awards will be featured in the December issue of CRN and can be viewed online at crn.com/techinnovators.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

We have 5* support!

Safetica Support in 2021: New Support Center and Knowledge base


We have had a busy year. We decided to create a single starting point for accessing all available resources. Meet our new Safetica Support Center. This page will help you navigate to available documentation, knowledge base articles and e-learning courses. Our partners will also appreciate links to sites dedicated to the process of implementation.  
Our Knowledge base has gone through major changes also. We completely redesigned it, posted new articles and sorted them into a new category scheme. You can search for answers in six main areas that cover our products. In addition, the knowledge base has a new search engine, so it delivers accurate results. You can access our new Safetica Support Center at support.safetica.com. 
We also started Support Extended hours – so you can contact us until 10 pm CET (extended from 5 pm). We also added a US telephone number to improve your support experience and comfort even more.

  

SoftwareReviews  


According to the comprehensive market reviews compiled by SoftwareReviews, Safetica has earned its place in the DLP Leaders’ quadrant. Placing just behind the overall quadrant winner McAfee, Safetica was praised for providing exceptional support. Download the whole report here

Databite support
 
Our happy customers 
We received 95% positive feedback to our work and our Customer Effort Score is 6.76/7. What touched us the most, was a message from Christos Tsoulfas:

Best support ever, they took every necessary step for customer satisfaction and I’m sure they even went above their normal working schedules in order to assist us. Especially when they gathered people to help us on short notice (SQL Admin who happened to work from home at that time if my memory serves me right). Overall, I wish every Customer Service Support team worked like them.”

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

WHAT’S NEW Pandora FMS 758

What’s new in the latest Pandora FMS release, Pandora FMS 758

Let’s check out together the features and improvements related to the new Pandora FMS release: Pandora FMS 758. Remember this is an LTS version, we only have two of them a year, in April and November and they are stable.

NEW FEATURES AND IMPROVEMENTS

Network Configuration Manager

We added for the first time in Pandora FMS a new network computer management system, which allows you to distribute configuration changes in a customized way to network computers, differentiating by model and provider. You may back up configurations and recover them or see the differences compared to the previous backup. In future versions you will be able to deploy mass changes to network computers, apply firmwares and more features.


Improvements in IPAM

Our improved IPAM includes network export/import, new options for working with subnets (sorting, adding networks to supernets from the first range available, etc.), as well as new tree views in supernet maps and network usage statistical graphs. New IPAM reports have also been added to see the list of used/unused IPs as well as those assigned to an agent.

Network usage statistical graphs

Supernet display in tree format

New service list widget

A new widget has been added, where you may choose to see the services view and choose what type of view you want to see.

New visual console element: Simple graphs

The visual console supports a new type of element that displays the graph in a simplified format, providing a label with the value of the last data collected in a very visual way, creating a new world of possibilities for creating dashboards.

New Alert server

The new Pandora FMS alert server allows parallelization of the alert execution load in another component, so that monitoring processing is not affected in alert storm situations. This new server is optional and it is not activated by default.

Open Source network maps

At the request of our user community, we opened the network map editor feature for the OpenSource version. It can now be used without limits in the community version.

IPv6 support for Satellite server

Since this version, both the Satellite server and the Enterprise Network Server support IPv6 in all its advanced features. High-performance code previously only supported on IPv4 now applies to IPv6 as well, enhancing existing polling capabilities.

New Enterprise plugin: Apache Spark

The Apache Spark plugin creates an agent for each app that has finished or is running on the server with the data of all its executors. More information in our library.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

Safetica Awarded Best DLP Vendor of the Year at Future Enterprise Awards in the Middle East

Safetica, as an ESET Technology Alliance Partner, received the Best DLP Vendor of the Year award at the annual Future Enterprise Awards in the Middle East. CPI Media Group, a prestigious publishing house in the UAE, hosted this event on October 17, 2021 at the Dubai International Financial Centre. The awards were held on the first day of GITEX, the annual consumer computer and electronics conference, to honor the companies and individuals in the Middle East who have demonstrated phenomenal excellence in the field of IT and technology.

Demes Strouthos, General Manager, ESET Middle East

“We are proud to be representing Safetica during the annual Future Enterprise Awards 2021 to celebrate the achievements of IT vendors in the Middle East region. With Safetica being a strategic partner to ESET, it is an honor to be recognized as the best DLP Vendor in the region and we look forward to continued success,”
said Demes Strouthos, General Manager, ESET Middle East when accepting the award.

“Tonight, we celebrate the titans of the IT and technology industry, who have demonstrated no fear in their mission to leverage technology to transform how we live, work, and learn. The new digital economy is fuelled by experiences and these experiences are being driven by the leaders we are celebrating tonight. It is a great honour for us to host these awards and pay homage to those responsible for creating a better society,”
said Kausar Syed, Group Sales Director at CPI Media Group for Tahawultech.com.

 Source: Tahawultech.com

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

Why Identity and Access Management is Important for LGPD Compliance

Password strength is one of the criteria considered when creating password policies. After all, this is one of the most efficient measures to prevent passwords from being breached. And worrying about this is of paramount importance for organizations today.

This is because the use of weak passwords is one of the major reasons for data leaks in Brazil, and many Brazilians still opt for passwords that are easy to discover, such as the sequence 123456, the password word itself, family and football team names.

With that in mind, we have broken down the subject in this article, explaining more details about password strength and its importance for information security. To facilitate your understanding, we divided our text into the following topics:

  • How Important is the Strength of a Password?
  • Five Steps to Create a Strong Password
  • Periodic Password Changes: Are or Are They Not Important to Ensure Security?
  • Two Tips for Memorizing Passwords
  • Use Two-Step Verification or Multifactor Authentication to Protect Credentials Are Password Strength Meters Reliable?

How Important is the Strength of a Password?

A strong password has the function of preventing your accounts from being hacked by malicious actors, as a weak password can easily be guessed by a malicious user, exposing you to data theft and extortion.

If you are at the head of an organization, you have the aggravating factor of losing data from customers, partners, suppliers, and employees, which can bring great financial damage and damage to the credibility of your company.

What’s more, with the constant evolution of technology, it is not enough to just worry about human hackers. Today, there is software capable of evaluating the behavior of users, in order to guess the chosen password.

Some programs even perform combinations of words found in dictionaries and imitate patterns based on easy-to-memorize passwords, harming password strength

We also point out that personal information exposed on social media, such as birthdays and names, also works against you and in favor of those who want to discover your passwords.

Five Steps to Create a Strong Password

Now that you know the importance of password strength, here’s what you should do to create a strong password and ensure its security:

  • Opt for long passwords: Short ones are easier to identify, so we recommend you set a password of at least 12 characters, however, we advise that the ideal is to use 14 digits or more;
  • Create a complex combination: One of the ways to ensure password strength is to gather numbers, upper and lower case letters, and symbols to make it difficult for cyberattackers;
  • Do not choose words that can be found in dictionaries, proper names, product or company names;
  • Do not reuse previously used passwords;
  • Words written backward are not an adequate solution to guarantee password complexity;
  • Think of a password you are able to memorize, even if it is difficult for others to guess.

Periodic Password Changes: Are or Are They Not Important to Ensure Security?

Periodic password change is a widely recommended measure to ensure password strength, but it has been the subject of some debate. Microsoft, for example, which used to recommend changing them every 60 days, started to consider this method useless and dangerous.

That’s because people tend to create their passwords based on easy-to-identify references, as explained above, and when they change their passwords, they make minimal changes to the words or numbers used. That is, if the hacker knows the victims’ current password, they will have many chances to discover the new code.

In addition, the malicious actor can use passwords already leaked in other security incidents to reuse them in other services. This practice is called credential stuffing, or password reuse.

Do you want to find out if your password has been breached to know if you need to replace it? senhasegura Hunter is the ideal service for you. It indicates leaked credentials and what data has been compromised. You can even make a free consultation by clicking here, with the assurance your email will be used exclusively for this purpose. 

Two Tips for Memorizing Passwords

To ensure password strength, you will have to create complex and unique passwords. Therefore, you may have difficulty remembering which numbers, letters, and symbols were chosen for each one. Therefore, we prepared some tips for you to memorize these characters. Check it out:

Use a Password Manager

We know remembering all passwords can be a burden for users. Therefore, we recommend using a password manager that allows you to store them, as well as suggest and create strong passwords. But remember you will need to remember at least one access, from the manager itself, and this must be difficult to identify, otherwise, the program could be violated and expose the other passwords.

senhasegura is one of the solutions that can be used for the proper storage and management of passwords in your company.

Create a Rule to Make Memorization Easier

You know you must use a unique password for each platform or service you access, but you can follow a single logic to create all your passwords. 

Another tip is to think of a phrase and shorten it to take advantage of its initials to create a password that is not obvious. However, do not forget the need to mix uppercase and lowercase letters, numbers, and symbols in order to ensure password strength.

By following these tips, you are more likely to memorize your accesses, even if they are complex codes. 

Use Two-Step Verification or Multifactor Authentication to Protect Credentials

When it comes to protecting your credentials, you should not limit yourself to criteria that guarantee password strength. Some features can be very efficient to ensure your cybersecurity.

One of them is two-step verification, also known as two-factor authentication (2FA). This is a mechanism that requires a second piece of data to give access to accounts, commonly in the form of codes sent by SMS or even an application token.

However, we recommend you do not use text messages, as your mobile number can also be hacked. To generate codes through a token, it is possible to use authentication applications, such as:

  • Authy;
  • Google Authenticator; and
  • Microsoft Authenticator.

Multifactor authentication (MFA) consists of a tool that uses at least two mechanisms to authorize access to online systems, inhibiting the action of criminals. The methods used are knowledge factors (passwords and codes), possession factors (tokens), and inheritance factors (such as fingerprint and facial recognition).

Are Password Strength Meters Reliable?

When you create a password and enter it on a platform, it can be classified by the password strength meter as weak or strong, receive a score, or even be associated with the colors green, yellow, and red. With this information, you have the opportunity to rethink your chosen password and adopt a more complex code.

However, it is very common for people to question the efficiency of these password strength meters, which use algorithms to tell you if the password is strong in a situation of brute force attacks. The most problematic thing is that this type of attack is already old and today there are even dictionaries with lists of the most used passwords and patterns.

One exception to the rule is zxcvbn, which includes these patterns in its analysis and, according to experts, is the best choice when it comes to a password strength meter. It is not an infallible technology, but it is certainly ahead of the rest. 

Another feature you can use to ensure password complexity is a password generator. This tool makes it possible to create different combinations of characters automatically and randomly, making it difficult for intruders to work. 

Reading this article, you had the opportunity to:

  • Learn more about the importance of password strength, one of the main recommendations when creating password policies, as it is a powerful action against intrusion attempts by malicious agents;
  • Get precious recommendations for creating strong passwords (use of long combinations of at least 12 characters; in a complex way, gathering numbers, upper and lower case letters, and symbols; without words that can be found in dictionaries, proper names, product, or company names, etc);
  • Learn about practical tips to memorize your passwords more easily, as in the case of using access managers;
  • Understand about other effective ways of protecting credentials, such as two-factor authentication (2FA) and multifactor authentication (MFA);
  • Know whether or not password strength meters are reliable.

 Did you like our content? Share it with someone else who might be interested in this information.

ALSO READ IN SENHASEGURA’S BLOG

High Availability: Technology that Guarantees Productivity and Credibility

Invest in Disaster Recovery Strategies and Avoid Damages to Your Company

Why Identity and Access Management is Important for LGPD Compliance

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×