Skip to content

內外防護兼具,X-FORT的監控防護建議

內部威脅爆發,可能造成的危害比外部攻擊帶來的損害還要大。傳統的資訊外洩防護方案,可在資料儲存、使用、傳遞等三方面提供保護。如果存取的資料都可以保留在這些端點、邊境防火牆範圍內,以往這也許是足夠的。但是,安全防護的邊界越來越不明顯,而且一旦使用超出邊界範圍,它的資訊安全政策就無法被落實。這意味著,現在的工作及供應商的合作方式,不再有明顯的界線可以分出信任區域。

 

User Activity monitoring使用者活動控制與監視

X-FORT提供用戶追蹤端作業系統、使用者操作活動記錄,違反安全規定時予以阻擋控制。

使用者活動日誌

  • 軟體執行記錄:記錄使用者執行軟體,或執行軟體視窗標題名稱變動。
  • 網頁瀏覽記錄:使用瀏覽器IE, Chrome, FireFox, Edge時視窗標題變動,記錄視窗標題與網址。
  • 檔案操作記錄:記錄透過檔案總管對檔案的操作細節,範圍包含本機檔案系統的建立、刪除、更名、移動、複製;存取網路芳鄰、外接式儲存裝置、 MTP裝置等。

作業系統相關記錄

  • 作業系統活動記錄包含系統檔案名稱異動,記錄更名前後的相關資訊,系統檔案被刪除的事件記錄與備份被刪除的檔案。

帳號管理

  • 管理用戶端的本機帳號,可新增、修改、刪除本機帳號,可啟用或停用本機帳號。

 

本機裝置控管(Host Device Control and Monitor)

  • 控制本機所有連接裝置的使用
  • 管理信任儲存裝置
  • 管理儲存裝置存取方式,包含外接儲存裝置、燒錄器
  • 控制列印裝置及列印行為,包含禁止列印、強制浮水印、暫時開放印表機;記錄及備份列印內容,備份列印檔案。

 

網路控管(Network Control and Monitor)

記錄與控制用戶端網路存取活動,包括共用資料夾控管、應用程式、網路連線、網站存取、檔案傳輸、電子郵件等。

 

應用程式控管(Application Control and Monitor)

用黑名單與白名單機制管理非授權的應用程式執行;以及保護資料夾被未經授權的程序存取。

軟體執行控管

  • 提供軟體禁用功能外,控制軟體使用時段控管軟體只能在規定的時段內被使用,其他時間禁止使用。
  • 被禁用的軟體,使用者無法自行安裝。使用者嘗試執行被禁止或非允許的軟體,留存記錄。

資料夾存取防護

  • 限制異動副檔名:限制資料夾中特定副檔名的檔案(如*.exe);該資料夾中新增、變更特定副檔名檔案。
  • 應用程式白名單:用戶端特定資料夾允許「信任程式」存取檔案,防止其他程式存取,或檔案加入。保護資料不被惡意程式存取或竄改。
  • 例外處理名單:在限制異動副檔名清單及應用程式白名單中,設定排除控管的例外名單。

 

稽核與分析(Audit and Event investigation)

記錄與資料整合分析

  • 記錄查詢結果根據分權與管轄範圍,依登入的管理者身份,檢視管轄範圍內人員或電腦的記錄;不同管理者顯示不同結果。針對人員、日期等組合篩選條件,可指定欄位(如:記錄時間)順序排列,檢視多種類記錄或資料。

儀表板

  • 自行組合多個小工具(Widget)在同一頁面,一次查看各種相關結果,即時掌握資安狀況。
  • 管理者登入系統主頁,依管理角色的管轄範圍篩選結果,呈現特定儀表板。

 

端點事件偵測與反應(Endpoint Incident Detect and Response (EDR))

  • 監視及偵測違規行為,主動反應控制風險。
  • 用戶端自動反應包含螢幕浮水印、警示、限制網路傳輸、禁用隨身碟、禁用印表機等;管理者處置包含強制關機、遠端命令等。
  • 記錄各種違規事件、反應動作與處置方式。

 

主動適應安全政策(Adaptive Policy )

解決靜態規則無法適當應對變動的環境,主動適應政策根據不同環境條件提前,建立不同對應行動計畫,可簡化團隊管理複雜度,並減低對使用者工作的干擾。安全政策依下列類型自動調整

  • Role based(使用者): 依登入使用者身分生效,在其他裝置上登入也具備相同政策。
  • Location based(地理位置): 所在地理區因基礎建設完善度不一,可能安全性不足等顧慮。
  • Host based(電腦政策):固定政策,不受登入使用者身分影響。
  • Site Based (跨廠區工作):受工作區管轄,配合當地的安全管理政策。
  • Telework(遠距工作):以公司裝置利用VPN 存取公司的服務、以自用裝置RDP 連入公司裝置、以公司裝置RDP 到另一台公司裝置。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於精品科技
精品科技(FineArt Technology) 成立於1989年,由交大實驗室中,一群志同道合的學長學弟所組合而成的團隊,為一家專業的軟體研發公司。從國內第一套中文桌上排版系統開始,到投入手寫辨識領域,憑藉著程式最小、速度最快、辨識最準等優異特性,獲得許多國際大廠的合作與肯定。歷經二十個寒暑,精品科技所推出的產品,無不廣受客戶好評。

A new business offering for a new business world

As the coronavirus pandemic has changed the world around us, organizations have had to adapt to a new, remote way of working, and in response, many have shifted to focus on cloud-first strategies. To streamline this transition, ESET is launching ESET PROTECT, which provides a single pane of glass to gain centralized visibility, management, and insight across the security of your endpoints. The ESET PROTECT platform is available either in the cloud to accommodate businesses looking for affordable and easy deployment, or on-premises for increased control.

Recognizing the move away from standard software and traditional forms of licensing, ESET PROTECT empowers users with the flexibility of a subscription-based service. As an organization grows and changes, so too do its security needs – and with a wide range of subscription bundles, ESET can protect your business throughout its entire journey.

Save, save, save As some businesses find their budgets increasingly squeezed in the face of renewed lockdown restrictions, optimizing the use of your money is even more necessary. It may be tempting to leave security aside but moving to the cloud can provide the much-needed savings on cost.

ESET PROTECT Cloud, for example, takes away the typical cost of server provisioning required for on-premises solutions. Instead, imagine getting rid of hardware – physical servers, backup servers, failover clusters – and not worrying about software updates – server software updates, software component updates, console updates – because that’s all handled by ESET.

Continue to imagine that your business doesn’t need a team of IT administrators to set up and maintain your servers, databases, software and other on-premises infrastructure. Applications that are known to have common vulnerabilities, and which require diligent patching, are no longer your problem.

As a simple, cloud-based subscription, ESET PROTECT Cloud needs just one IT administrator sitting at the console to quickly deploy an entire suite of advanced security solutions that can protect your business from attack.

Seamless, convenient, flexible Aside from financial benefits, ESET PROTECT offers a wealth of other benefits. With an easy and quick setup process, admins can log in the console and start protecting machines in a matter of minutes. ESET PROTECT’s live installers and wide range of deployment methods enable organizations to install endpoint protection seamlessly across all devices in even the largest corporate network.

Adjusting to each customer’s individual needs, the solution is scalable, allowing businesses to enlarge or reduce the coverage according to the size of their workforce, whether this is in-house or remote. Convenient, customizable reports allow IT admins to communicate effectively and can be adapted to fit the dynamically changing needs of large or small organizations. All this is achieved without the need for specialized IT personnel, extensive training, or additional hardware – and ESET specialists are on hand to provide additional support whenever necessary.

Everything you need in the same place Not all businesses are the same, and ESET is offering a selection of business subscriptions that ensure businesses of all sizes are equipped with the right solutions.

Figure 1: ESET business subscriptions

ESET’s business subscriptions all include an endpoint management console – either cloud-based or on-premises – along with endpoint protection by default. ESET PROTECT Mail Plus covers the needs of organizations looking for an advanced mail security solution.

Providing endpoint protection against ransomware and zero-day threats, alongside data protection via full disk encryption, the ESET PROTECT Advanced subscription is perfect for SMBs and MSPs. The solution is designed to detect suspicious encryption-like activity commonly employed by ransomware and can run machine learning analyses on high performance machines in the cloud to more quickly discover novel malicious software aiming to evade detection by endpoint security products.

For large organizations, the ESET PROTECT Enterprise option provides comprehensive visibility right down to the techniques commonly used by advanced persistent threat groups. This is because the subscription offers a highly sophisticated endpoint detection and response solution with rule-based detection, threat hunting and remediation capabilities. By subscribing to ESET PROTECT Enterprise, enterprise customers get all the benefits of ESET PROTECT Advanced plus endpoint detection and response.

For more information on ESET PROTECT, and other security offerings from ESET, visit our website here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Go hack yourself: How to thwart network hacks by cybercriminals, like Iran’s state-sponsored Pay2Key attacks

Whether motivated by geopolitical power, personal gain, or mere curiosity, cybercriminals are currently embracing a renaissance. Like drifting bandits in the once-lawless American West, hackers are striking corporations and individuals with relative impunity. There’s no shortage of incidents to point to; the spate of Pay2Key ransomware attacks on Israeli companies at the end of 2020 by state-sanctioned Iranians hackers serves as a recent example of such activities.

What we know today is that social engineering, email phishing, unpatched firewalls, password stuffing, malware and ransomware make up the bulk of these attacks. And it goes without saying: leaked data can be costly. Today the average cost of a data breach is nearly $4 million. Larger corporations aren’t the only targets. Nearly half of all network breaches target small businesses that simply can’t afford to absorb these losses.

Unfortunately, you don’t need to hold a doctorate in Computer Science from MIT to learn how to identify and take advantage of network vulnerabilities and cause widespread damage to companies and individuals. Look at the Fortinet VPN hack, for example. With 50,000 hosts representing hundreds of thousands of compromised accounts belonging to some of the world’s largest banks, telecoms and government entities released into the Dark Web, even the weekend hacker has the intel and direction needed to cause destruction.

There’s much to be learned and applied from these hacks, however. So, while it’s unlikely we’ll be able to eliminate these incidents in their entirety, there are ways we can mitigate network breaches.

Preventing lateral movement

Lateral movement is a technique used by cybercriminals to dig deeper into a network in search of sensitive data and other valuable assets. Once they’ve gained access to a network, hackers will typically maintain ongoing access by moving through the network and obtaining increasingly elevated levels of privilege.

There are a variety of steps that, when used in conjunction with one another, can help to prevent lateral movement. Critical among these steps is implementing adaptive network access controls. “Adaptive” effectively means several things: (1) you can monitor the risk posture of connecting devices and block/allow access based on the perceived risk level; and (2) you can block/allow access to the network based on a user’s geolocation. These types of adaptive access controls, when paired with MFA — multifactor authentication — and strong password policies, can help to fortify your network.

Segmenting the network

Network segmentation is the practice of dividing up a network into smaller parts, in which only assigned people have access to different parts of the network depending on their role and responsibilities. Network segmentation effectively reduces a cybercriminal’s vantage point into your larger network.

Segmenting your network can be done broadly or granularly. In effect, you want to be able to ensure that application and resource servers do not trust one another, and that any attempt to cross between them requires MFA, adaptive access control and session monitoring. Implementing microsegmentation means looking at the context of the user or device – their role, location, application, etc. – and defining access privileges based on that holistic profile.

Where to go from here

There’s a lot to unpack here. At the end of the day, to truly mitigate network breaches requires implementing a network access control (NAC) solution that can discover, authenticate and segment users across the network, while monitoring the risk of their connected devices, remediating those devices in real-time should they fall out of compliance. By leveraging NAC, organizations can deter further exposure, potentially saving themselves millions of dollars in the process.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

訊連科技FaceMe®與美國Vypin結盟 打造具備口罩偵測及人臉辨識的安控防疫自助服務機

【2021年3月9日,台北訊】全球頂尖AI臉部辨識領導廠商訊連科技(5203.TW) 宣布與美國Vypin策略結盟,將訊連FaceMe® SDK整合至美國Vypin的eScreener™防疫KIOSK自助服務機,打造具備人臉辨識、口罩偵測、感應式手部消毒及偵測體溫功能的非接觸性安控防疫解決方案。

訊連科技FaceMe®與美國Vypin結盟 打造具備口罩偵測及人臉辨識的安控防疫自助服務機

Vypin推出的eScreener™健康偵測站為結合防疫與安控的KIOSK自助服務機,可以非接觸性方式,對進入場域之人員進行額溫量測、檢查是否配戴口罩及進行身分辨識,可支援記錄高達100,000筆資料,用作出勤管理使用。可應用於飯店業、零售店、辦公室等各式場所。

「COVID-19後防疫時代來臨,使用人臉辨識技術已成為打造非接觸性防疫解決方案不可或缺的一部分。訊連科技FaceMe®是全球頂尖的人臉辨識技術,可協助各種IOT設備快速導入人臉辨識。」訊連科技執行長黃肇雄表示:「透過與Vypin合作打造的 eScreener™自助服務機能夠偵測配戴口罩與否,並在戴口罩時仍能精準辨識人臉,提供企業維持正常運作的客戶體驗及人員出勤控管。」

訊連科技FaceMe®在2021年1月最新公布的NIST測試報告中,於實境照比對測試項目(WILD 1E-5)中以96.98%辨識率,以開發團隊排名高居全球第6。Vypin旗下兩款自助服務機eScreener™ Max 及小尺寸 Pro 型號皆整合FaceMe®人臉辨識技術,滿足各產業不同使用場合需求。

「Vypin的健康偵測站與訊連FaceMe®的整合,能為不同產業的客戶提供安全、全自動的防疫解方。」Vypin總經理JT McGibbon表示:「目前COVID-19疫情仍對世界造成影響, Vypin eScreener為非接觸性的自助服務機,搭配FaceMe®精準的人臉辨識技術可讓各企業在健康、安全的環境下維持運作。」

FaceMe®為專為邊緣運算(Edge Computing)打造的臉部辨識引擎,無論是建置在搭載高階處理器及圖像加速卡的伺服器和工作站、或是搭配輕量化處理器的IoT邊緣運算裝置,皆可針對不同的硬體配置進行優化,為系統整合商帶來快速,彈性且精準的人臉辨識解決方案,並可導入各種應用領域中,如智慧安控,訪客控管,公共安全,智慧零售和智慧家庭等。針對COVID-19疫情升溫,口罩辨識及配戴口罩的臉部辨識亦是重點指標,FaceMe®亦提供口罩偵測及配戴口罩進行人臉辨識等功能,可提供高達95%的辨識率,適合運用於醫療院所、辦公室及工廠等地,進行配戴口罩時的人流偵測及門禁管制。

更多關於FaceMe®的訊息,請至: https://tw.cyberlink.com/faceme/

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

關於Vypin
Vypin以維護家庭及工作環境安全為理念,其專利精準感應技術提供多種IoT解決方案及資料服務,並可擷取資產識別、地點等訊息記錄即時狀態。更多關於Vypin的訊息,請至: www.vypin.com

World Consumer Rights Day: Protecting consumers’ rights online

On March 15, 1962, President John F. Kennedy called on Congress to enact legislation to protect consumer rights – he was the first world leader to formally address the issue. Since 1983 this date has been marked as World Consumer Rights Day. The consumer movement uses this day every year to mobilize action on important issues and campaigns, including digital marketplaces, plastic pollution, and fair mobile phone services. Simply put, celebrating World Consumer Rights Day is an opportunity to demand that the rights of all consumers be respected and protected, and to protest against market abuse and social injustice that undermine those rights.

As the world becomes increasingly digitalized and consumption moves online – with 61% of consumers worldwide shopping online, more often now than they were before the pandemic – the digital aspect of consumer rights is more important than ever. Tech development, from IoT devices to financial technology (FinTech) to new online marketplaces, has a huge impact on consumer rights. As Consumers International notes, digital has become the default way of working for the majority of businesses – and with it comes consumer rights issues, including data protection, privacy, and online scams.

When consumers are online, businesses collect and store data about their purchases and behaviors. This can be convenient, with companies recommending what you’re interested in, sharing discounts, and even reminding you when you need to buy a birthday present. Unfortunately, the downsides can be far more troubling. Organizations may have access to information that helps to influence your decisions, removing some of your free choice without you even realizing. Also, big caches of data – including personally identifiable information (PII) – are attractive to cybercriminals. If breached by hackers, the information stored by online outlets can put you at risk of identity theft, phishing attacks, and scams. This may to contribute to the fact that less than one-third of global consumers (29%) feel very secure when shopping online.

Knowing who has access to information about you is an important step in protecting your data. Mark this World Consumer Rights Day by checking where your information is stored – and what you can do to limit it. According to ESET’s new research into data security and financial technology, consumers around the world are not always aware of how their data is treated. Of those consumers who use free FinTech apps around the world, 50% do not know if these apps sell their data. Seemingly, consumers in different countries have vastly different attitudes to this. Brazil and the UK have the lowest levels of awareness, with over 60% of consumers in both countries not knowing if FinTech apps are selling their data (Brazil 62%, UK 63%). In contrast, far more FinTech users in the US are in the know about how free apps use their data – less than a third (31%) do not know if their data is being sold.

Knowing who has access to your data and how it is being used is a key aspect of protecting your consumer rights online. In President Kennedy’s words, consumers – both online and in store – deserve “the right to safety, the right to be informed, the right to choose, and the right to be heard.” To find out more about World Consumer Rights Day, visit the Consumers International website. For more information on ESET, how to keep your data safe online, and our global FinTech research, click here

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×