Skip to content

Pentasecurity 參加中東和非洲最大的展覽會 GISEC 2025

GISEC 2025

GISEC 2025 洞察:數據主權與智慧城市如何形塑中東網路安全的未來 

Penta Security 已成功結束其在 GISEC 2025 的參展活動,該展覽是中東及非洲地區規模最大的網路安全展覽會,為我們提供了親身洞察全球最具活力的數位市場之一的機會。在杜拜舉行的這次活動,凸顯了該地區的快速轉型,並揭示了由此而生的關鍵安全挑戰與機遇。

中東的網絡安全市場正經歷爆炸性增長,預計年增長率為 9.6%。我們在 GISEC 的參與揭示了此增長背後的兩大主要驅動力:一是對數據主權的新監管指令,二是宏大的智慧城市計畫所帶來的巨大安全需求。

新的監管指令:數據加密已成必然要求

我們與區內銀行、政府機構和企業交流後的一個主要收穫是,新的資料保護法規帶來了深遠影響。隨著如阿拉伯聯合大公國《個人資料保護法》(PDPL)等法規的全面實施,各機構正從基礎安全防護轉向優先考慮全面的資料保護。這催生了由合規驅動的、對穩健資料加密方案的迫切需求。我們的 D.AMO 密碼學平台所獲得的濃厚興趣證實,保護核心數據已不再是「可有可無」的選項,而是該地區業務營運的基礎要求。

保護智慧城市的願景

該地區宏大的數碼轉型和智慧城市計畫,正在創造一個由互聯服務、應用程式和 API 組成的龐大新生態系統。這些計畫在推動創新的同時,也急遽擴大了數碼攻擊面。我們觀察到與會者普遍認為,這些新的公共和金融領域服務從一開始就需要穩健且專業的保護。這印證了市場對全面性網站應用程式與 API 保護(WAAP)解決方案(如我們的智慧型 WAPPLES 平台)的需求,以及對敏捷、易於部署的安全方案(如我們的 Cloudbric WAF+ SaaS 解決方案)的需求。

成為數碼未來的策略夥伴

從 GISEC 2025 獲得的洞察證實,Penta Security 專注於基礎安全 —— 即資料加密和應用程式保護 —— 的策略,與中東和非洲地區的策略性需求完全契合。在與具潛力的合作夥伴及客戶進行了高效的會談後,我們比以往任何時候都更加致力於擴大業務版圖,並作為關鍵合作夥伴,為該地區實現數位雄心的安全保駕護航。

About Penta Security

Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Penta Security Expands Cloudbric Managed Rules for AWS WAF to Two New Regions

Penta Security, a leading cyber security company and provider of web application security in the Asia-Pacific region, has expanded the service region for Cloudbric Managed Rules for AWS WAF to two new regions this year.

Cloudbric Managed Rules for AWS WAF (CMR) is a managed rule groups service for AWS WAF. Managed rule groups offer a preset of security rules for users and are provided by AWS and Independent Software Vendors (ISVs). Penta Security currently offers six CMR products on the AWS Marketplace, which users can subscribe to and implement on AWS WAF. CMR is based on the core technologies of Penta Security’s proprietary Web Application and API Protection (WAAP) solution and has been validated by a third-party IT solutions comparative testing firm, The Tolly Group, for its top-tier detection rate.

Following AWS’s expansion to Calgary, Canada in December 2023 and Malaysia in December 2024, Penta Security promptly onboarded these new regions, aiming to help users with the challenge of creating their own security rules when using AWS WAF.

Taejoon Jung, Director of the Planning Division at Penta Security commented, “Defining and managing security rules can be a complex task for AWS WAF users if they do not have security expertise, and Cloudbric Managed Rules were specifically designed to address these challenges. By swiftly onboarding new AWS regions, we aim to foster a safer environment for AWS WAF users.”

To further address the challenges of managing and maintaining security, Penta Security has also recently launched Cloudbric WMS, a usage-based SaaS managed service for AWS WAF, now available for subscription on the AWS Marketplace.

 

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Cloudbric Managed Rules for IP Reputation Management

In establishing security through solutions such as firewalls, IP Reputation is a crucial metric for identifying and blocking malicious traffic. It assesses the risk of an IP using factors such as traffic volume, traffic type, presence of malware, and whether the IP has been involved in illegal activities like hacking or phishing. Managing IP Reputation is an important aspect of web security as traffic can be allowed or blocked based on the credibility of IPs, which is determined by their history.

Cloudbric Managed Rules for IP Reputation Management

Penta Security provides a solution for managing IP Reputation through “Cloudbric Managed Rules.”

🛡️ Malicious IP Protection

Cloudbric Managed Rules for AWS WAF – Malicious IP Protection was created to protect the websites and web applications against the traffic originating from various threat IPs. It utilizes the Threat DB of Cloudbric Labs, which collects and analyzes the threat intelligence from 700,000 websites in 148 countries to create a Malicious IP Reputation list and respond to the Malicious IP traffic.

🛡️ Anonymous IP Protection

Cloudbric Managed Rules for AWS WAF – Anonymous IP Protection provides integrated security against Anonymous IPs originating from various sources including VPNs, Data Centers, DNS Proxies, Tor Networks, Relays, and P2P Networks. It utilizes the Anonymous IP list, managed and updated by Cloudbric Labs, to detect and respond to Anonymous IPs that can easily be exploited for malicious purposes and prevent threats such as geo-location based fraud, DDoS, or license and copyright infringements.

 

Cloudbric Managed Rules for AWS WAF

Cloudbric Managed Rules for AWS WAF is created based on the security technologies and expertise of WAPPLES which has protected the web services for enterprises since 2005. Cloudbric Managed Rules have recently proven its performance by displaying a detection rate of 97.31% against other Managed Rules, which has been validated through a report (Penta Security Cloudbric Managed Rules – Comparative Effectiveness of the API Security-Related Managed Rule Groups for AWS WAF) published by an independent third-party IT testing, validation, and analysis organization, The Tolly Group.

✅ Expertise in Security

Cloudbric Managed Rules for AWS WAF utilizes the latest threat intelligence collected and analyzed by Penta Security’s own Cyber Threat Intelligence (CTI) to respond to web threats against web applications and APIs.

✅ Continuous Security Management

Cloudbric Managed Rules respond to the latest threats and maintain a stable level of security through continuous updates and management by security experts with over 20 years of experience in the field.

✅ Official Partner of AWS

Penta Security is an official launch partner for AWS WAF Ready, provider partner of AWS Activate, and AWS Public Sector Partner, and all Cloudbric products provided in AWS Marketplace by Penta Security have been validated by AWS through the Foundational Technical Review.

 

If you are looking to establish a safe web security environment without the need of security expertise, subscribe to Cloudbric Managed Rules for AWS WAF today!

👉 For more information
👉 To subscribe to Cloudbric Managed Rules

 

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Anonymous IP: Why You Should Block It and How.

AnonymousIP(1)

In February 2016, the global content streaming service, Netflix, officially announced that it would block all VPNs and proxy use on its platform. This decision came as a response to the abuse of Anonymous IPs, which had been a persistent issue for the service. Although many users would employ Anonymous IPs for privacy and security reasons, some exploited them for illegal purposes. One example was Netflix users using VPNs to bypass the geo-restrictions on contents that are not available in their region. The geo-restrictions were put in place due to licensing agreements, but users soon discovered that accessing the platform through an IP from another country allowed them to stream the geo-restricted content. As a result, Netflix was forced to address the issues related to license and copyright infringement.

 

Anonymous IP utilizes methods such as VPNs, Tor Nodes, Proxies, and Data Centers to mask the IPs and the geolocation to protect the privacy of the user and provide a secure access to the web. However, it is also a double-edged sword that can very well be used for illegal activities such as:

  • Manipulation of public opinion or reviews.
  • Distribution of malware while concealing the distributor’s identity.
  • Bypassing geo-pricing, which violates company policy.
  • License and copyright infringement.
    As such, detecting and blocking Anonymous IPs can be a smart move for companies and organizations of all industries to reduce the risk of cyber threats.
    Many companies and organizations already make use of various solutions to respond to Anonymous IPs. Like Netflix, a significant number of content streaming services and other companies in the media & entertainment industry have adopted Anonymous IP-related solutions to protect their media contents. Some companies use Anonymous IP-related solutions to prevent DDoS attacks carried out by zombie PCs infected via Data Centers. Online game companies block illegal access to geo-blocked servers, and finance companies, including cryptocurrency platforms, prevent fraud by blocking attempts to bypass the geolocation restrictions.
    Such solutions are largely categorized into two types: IP Reputation Database (often referred to as “IP Reputation Checkers”) and IP Reputation Filters. There are pros and cons to both types of solutions, and the choice between them depends on the available resources and the needs of the user.
    IP Reputation Database IP Reputation Filters
    • Focuses on providing detailed information about the IPs.
    • Such information includes the method of creating Anonymous IPs, geolocation data, and domain information.
    • The IP Reputation Database is constantly updated.
    • The user is given more flexibility as the user can utilize the information to configure the security settings as fit.
    • However, a deep understanding of security is required for the user to configure a robust security.
    • Because the IP Reputation Database is constantly updated, the user has to subscribe to the database service, and in many cases, the user may be charged per query.
    • Focuses on providing a proactive security solution by detecting and blocking the traffic based on the Anonymous IP list.
    • IP Reputation Filters are often included in a Web Application Firewall (WAF) solution, and do not provide as much flexibility as the users configuring the security settings themselves.
    • The performance of the IP Reputation Filter may depend on the source of the Anonymous IP list, update cycle, and the performance of WAF.
    • However, users do not need expert-level security knowledge.
    • Security measures can be quickly implemented.
    • Resources required in configuring the security settings are greatly reduced.
    •  
      • Penta Security’s direction in responding to Anonymous IPs is IP Reputation Filters. Penta Security currently provides a managed rule group, Cloudbric Managed Rules for AWS WAF – Anonymous IP Protection, in the AWS Marketplace.
    •  

    AnonymousIP(2)

    •  
      • Taking advantage of the characteristics of managed rule groups for AWS WAF, which enables the user to quickly adopt the security rules predefined by security vendors simply through subscribing to the product, Penta Security provides a quick and easy solution for AWS WAF users to detect and block any threats that can be caused by Anonymous IPs. Penta Security’s Cloudbric Managed Rules for AWS WAF – Anonymous IP Protection is defined based on the Anonymous IP List, which is continuously updated with the latest IP Reputation data, collected and analyzed by Penta Security’s own Cyber Threat Intelligence (CTI). With a cost efficient, pay-as-you-go pricing, users are able to implement a robust security solution against Anonymous IPs without the need for security expertise by subscribing to the product.
    •  
      • Cloudbric Managed Rules for AWS WAF – Anonymous IP Protection is available at

    👉link.

     

     

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

APIs are Everywhere. Are You Protected from API Attacks?

 

API security has become a major focus in cybersecurity in recent years. The global research firm, Gartner recognized the importance of API security and proposed a new model of web application security, which they named Web Application and API Security (WAAP). API, which stands for Application Programming Interface, is a mechanism that enables two software components to communicate with each other using a set of definitions and protocols. APIs are generally used to provide access to data and services, allowing the developers to build new applications and tools by leveraging existing data and functionality.

For instance, if a new food delivery app requires a map to display local restaurants, it would be inefficient for the developers to create a new map and gather all the restaurant data themselves. Instead, they could use an existing map API, such as Google Maps, to retrieve the necessary data for their app.

APIs are becoming indispensable in modern software development because of its;

  • Interoperability
    • APIs facilitate interoperability between software systems, and by using APIs, applications and services developed by different developers would work together, share data, and provide integrated solutions
  • Modular Development
    • APIs allow complex systems to be divided into smaller and more manageable components, making software development, testing, and maintenance easier. Developers can focus on building and updating specific functionalities.
  • Cross-Platform Integration
    • APIs enable cross-platform integration, allowing applications to work across different devices and environments.
  • Data Access and Sharing
    • APIs define a structured way for data to be exchanged between applications, usually formatted in JavaScript Object Notation (JSON) or Extensible Markup Language (XML). This standardization ensures that both the requesting application and the providing system can easily interpret and process the data.

Despite their benefits, not all APIs are built with security measures, and an increasing number of organizations have reported attacks targeting APIs, resulting in significant damage to their services. Such was the case with Duolingo. Duolingo is a company that services a vastly popular language learning application. It is estimated that by the end of Q1 2022, Duolingo’s monthly active users reached 49.2 million. Naturally, due to its massive volume of user data, Duolingo’s user database became a target for hackers. In January 2023, scraped data of 2.6 million Duolingo users appeared on the dark web hacking forum called “Breached.” The scraped data included email addresses, personal names, usernames, and other user profile information.

screenshot courtesy of FalconFeedsio

It is believed that the hacker acquired the user data by infiltrating Duolingo’s API vulnerability. Duolingo’s API provided access to user information based solely on email or username without asking for any other forms of verification. The API did not take any security measures to ensure that the requests were coming from legitimate users, thus the access to user data was not restricted. This incident would be categorized under two vulnerabilities of OWASP Top 10 API Security Risks: 

  • API2:2023 – Broken Authentication
  • API3:2023 – Broken Object Property Level Authorization (BOLA) 

As API has become a target for hackers, establishing API security became an important task for any organizations or businesses providing services that include APIs. There are already numerous solutions for API security in the market, but the important question to ask is: which of the solutions best fit my environment?

As there are a myriad of APIs for different purposes, solutions for API security can also take many different directions and approaches. For instance, some may focus on specific vulnerabilities of APIs, such as Injection attacks or Broken Authentication, while some may focus more on API Discovery. Some may even choose to focus more towards API Gateway. There is no definitive answer to what type of solution is best. Therefore, it is important that organizations and businesses carefully assess their environment and needs before adopting a solution.

Penta Security’s direction in establishing API security was to build a solution that focuses on the actual API attacks and vulnerabilities. Penta Security has recently launched a managed rule group for AWS WAF, Cloudbric Managed Rules for AWS WAF – API Protection (API Protection). Taking advantage of the characteristics of managed rule groups for AWS WAF, which enables the user to quickly adopt the security rules predefined by security vendors simply through subscribing to the product, Penta Security provides a quick and easy solution for AWS WAF users to detect and block API attacks. API Protection was created to provide security against the threats of OWASP API Security Top 10 Risk. To respond to the attacks and vulnerabilities of API, API Protection utilizes the API attack data gathered and analyzed by Penta Security’s own cyber threat intelligence (CTI) and establishes security against known API attacks. Furthermore, API Protection provides validation and protection for XML, JSON, and YAML data. API Protection was recently validated to have the highest detection rate among API Security managed rule groups currently provided in AWS Marketplace through a comparative test conducted by a third-party IT testing, validation and analysis company, The Tolly Group.

The Tolly Group – 3rd-party IT Testing, Validation, & Analysis

With a cost efficient, pay-as-you-go pricing, users are able to implement a robust API security without the need for security expertise, just by subscribing to the product.

Cloudbric Managed Rules for AWS WAF – API Protection is available at 👉link.

 

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×