Skip to content

UnderDefense Recognized in the 2023 Gartner® Market Guide for Ukrainian Information Technology

Recently a new report was published by Gartner titled Market Guide for Ukrainian Information Technology.   According to the report, “in 2022, Ukraine’s export of computer services grew from $6.9 billion to $7.35 billion”.The report further states, “ the sector acquired new qualities, such as ability to work under pressure, rapid innovation cycles, and heightened responsibility for people, employees and customers.”

The Key Findings of the Report are:

  • “Ukraine hosts over 90 international research and development (R&D) centers, working on cutting-edge technologies and solutions.
  • Numerous and elaborate cyberattacks triggered significant investment and research in cyber defense for Ukrainian business and government institutions, making Ukrainian IT particularly strong in cybersecurity, the Internet of Things (IoT), AI, and cloud computing.
  • Technology companies in the IT market are leveraging Ukraine’s tax policies and incentives to position and promote product development and market outreach”.

UnderDefense is proud to be mentioned by Gartner as a Representative Vendor in this report.

“Our company achieved 1.5x growth even though 2022 was the hardest year in the modern history of Ukraine. Moreover, I believe that the Ukrainian IT industry is so resilient and mature now that it will thrive whatever happens. It’s an honor for us to help protect our country’s infrastructure and businesses.” – adds Nazar Tymoshyk, CEO of UnderDefense.

The full report is available to Gartner clients via the link.

Disclaimer:

Gartner, Market Guide for Ukrainian Information Technology, Svetlana Sicular, Rajib Gupta, et al.., 10 May 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About UnderDefense
UnderDefense, a globally top-ranked firm by Gartner and Clutch, provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats. We empower clients to predict, prevent, detect, and respond to threats.

Our patent journey in the USA: From zero to 100

As cybercrime continuously evolves, so does innovation in the cybersecurity industry. Since 2010, more than 2000 patents have been created in this field, with most cybersecurity patents registered in the United States.

Having recently got our 100th US patent granted, Nord Security now holds the highest number of US patents in the Baltic States. 

Curious how we managed to achieve this so fast? Watch the video featuring Aušra Diliautaitė, Head of IP and Business Operations at Nord Security, and Karolis Pabijanskas, Staff Engineer, R&D at NordVPN, or read below to find out.

 

What is a patent?

A patent is a government-granted right that gives the patent owner the exclusive right to make, use, sell, or offer to sell the invention for a limited period of time.

To be granted a patent, an invention must meet essential criteria – it must be novel, useful, and non-obvious.

Applications for patents can be submitted to national patent offices, such as the United States Patent and Trademark Office (USPTO), the European Patent Office (EPO), or international organizations like the World Intellectual Property Organization (WIPO) for protection in multiple countries. Patents can help businesses protect their inventions and generate revenue.

The areas of most patents

Today, Nord Security has more than 100 US patents dedicated to the cybersecurity domain. They encompass a wide array of areas, including virtual private networks, data encryption, files and access management, password protection, malware detection, and beyond.

According to Aušra, the highest concentration of all patents at Nord Security are shared between its flagship product NordVPN, the leading password manager of 2023, NordPass, and the recent acquisition of AtlasVPN.

“The latest US patents are related to the features of NordVPN, the best-known product of the company, including the software functions of a virtual network called ‘Meshnet’ which allows direct access to devices located anywhere in the world through encrypted private tunnels. ‘Threat Protection,’ designed to safeguard against malicious software and surveillance tools, also features strongly. <…> Regarding NordPass, recently it developed a solution to securely store and manage passkeys – part of its ambition to contribute to the passwordless future,” shares Karolis Pabijanskas.

Aušra adds that the 100 patents milestone was driven by collaboration between various Nord Security teams and a forward-looking attitude: “The patent portfolio we have today is the result of the collaboration of tech talents from more than 15 teams. Many of them have contributed more than one idea, which has been instrumental in shaping our portfolio. Their efforts have played a key role in our innovation journey.”

The impact of having a patented innovation

We believe in shaping the future through continuous innovation and investment in developing cutting-edge solutions for a safer cyber landscape. To ensure the protection of our innovations, we take strategic measures to patent our inventions.

Besides patent safeguarding inventions, Karolis Pabijanskas adds that they play a crucial role in driving innovation culture.

Aušra Diliautaitė also adds that people who engage in this patent creation process “acquire a new and quite unique skill set” that is incredibly valuable in today’s ever-changing tech world.

Another positive factor of having patented innovations is that it helps form a positive perception not only about the company’s products but also about the company as an employer: “It attracts top tech talents, supports their growth, and boosts employee engagement. Plus, having your name on a US patent is also influential.”

Aušra Diliautaitė agrees that the impact of having a patented idea is undeniable. It helps promote a company’s products on an institutional level, which is especially important in the B2B sector.

quote bubble

Factors driving patenting success at Nord Security

Combining our focus on innovation with proactive patenting, we strengthen our competitive edge while maintaining a friendly and collaborative innovation spirit at our company. Therefore, our efforts in fostering this are visible at various levels:

  • We have a dedicated online space for fast patent generation. According to Aušra, “Ideas can be swiftly turned into patents with minimal intrusions to the main worklines of employees. This investment also contributed to the growth of IP awareness within the company.”

  • We provide full organizational support for the patent development process. Aušra shares that it involves a dedicated patent department, which “sources patentable ideas across the company,” and multiple teams across the organization, such as Research & Development, Product and Business. They all work together to streamline the patenting journey and ensure that “the patent strategy and its outcome are properly aligned with the company’s overall objectives.”

  • Our workspace inspires innovation. From hacker and music rooms to silent zones for those seeking quiet, our office is thoughtfully designed for Nord people to foster their inventiveness.

  • We nurture continuous growth with various learning and development programs, helping generate ideas and turn them into impactful realities.

  • We regard every misstep not as a failure but as a learning opportunity and a stepping stone to success. This perspective enables us to cultivate an environment where innovation thrives.

  • We’re a team of future shapers, constantly searching for the next big innovation and unafraid to push the boundaries.

This blend of future-shaping ambition, continuous learning, innovative workspace design, a growth mindset, and robust organizational support allows us to tackle the challenge of securing patents head-on and succeed.

7 tips for a successful invention patenting

The truth is that the patenting journey is not an easy one, yet the rewards for protecting our innovations make the effort worthwhile. With an impressive portfolio of 100 patents, our experts, Aušra Diliautaitė and Karolis Pabijanskas, shares some practical tips that can help simplify this process:

1. Don’t dismiss your ideas too early: You might think that assembling a bunch of known fixes to solve a problem is only a “hack” and not worth exploring further. But often, it’s these combinations that offer a novel way of solving a problem. A rough idea just waiting to be refined could be gleaming within.

2. Seek challenging problems, and solve them: If you run into a problem that has no clear-cut solution, it might be a perfect candidate for a patent.

3. Collaborate and network across disciplines: The most patentable and impactful solutions stem from problems that cannot be solved alone. Brainstorm with colleagues from various backgrounds and see where the fresh inspiration takes you. Taking an off-the-shelf solution for your task can feel like fitting a square peg into a round hole, while tools from other fields could just fit the bill.

4. Stay updated: Keep yourself well-informed on the latest advancements and technologies in your field. This knowledge might spark fresh ideas and ensures you remain at the cutting edge.

5. Keep detailed records: Maintain thorough records of your ideas. Documentation is crucial when applying for patents, as it establishes a clear timeline of the invention’s development.

6. Analyze and evaluate: Conduct patent searches to identify potential areas where your innovation could be novel and patentable. Assess the market demand and commercial viability of your ideas.

7. Consult with the patent team: Seek professional advice to understand the patenting process better and get guidance on how best you can leverage your inventive potential.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Reinstalling ESET for peak performance

NOTE: This blogpost is a revised version of an article requested from the author by Lenovo. This version has been updated with additional information specific to ESET software, as well as more general information about other computer manufacturers. Click here to view the original article.

If you are a regular reader of WeLiveSecurity or the ESET Blog, you may use ESET software on your computers to protect them against malicious software. ESET has several different security programs for this purpose depending on which operating systems you use and the type of security you need. While this article is focused on the consumer versions of ESET software for Microsoft Windows, the ideas and concepts behind it apply to other operating systems and even to security software from other vendors.

ESET software normally falls under the “set it and forget it” category, with the default settings used during installation being optimum for the overwhelming majority of users. It’s one of the reasons people keep renewing their software year after year—it just works out of the box, so to speak. But the past few years of work have been anything but normal. COVID-19 required a massive shift for many, from working at an office or going to school, to working and learning from home. And the changes to support that might also have included making changes to your security software.

If you have been using the same computer for a couple of years (or more) after switching to a work-from-home or learn-from-home situation, it is entirely possible that you have made some changes to your security software, especially if it is self-managed. You may have created an exclusion to download a new videoconferencing client, created new firewall rules to allow it internet access, and so forth.

While these various changes and rules may have been necessary at the time, as you go back to the office or school, or finally settle on which set of tools to use for group chats, videoconferencing, and so forth, you can end up with a lot of changes made to your security software for programs that are no longer installed on your computer and for networks you no longer access. While this may not be causing any observable problems with your computer, it could have some security consequences that may not be apparent at first:

  • If hostnames, IP addresses, or ports are excluded (left open or bypassed) from scanning, an attack or probe that would typically be blocked could succeed.
  • The performance of the security software may be decreased due to increased processing overhead for rules that apply to software that is no longer used or installed.
  • The effectiveness of the security software may be decreased due to issues involving its misconfiguration, such as disabling an entire protective layer or feature to provide compatibility for software that is no longer used or installed, or a rule created for software that is in use but instead is applied to the entire system and so forth.

Obtaining peak performance from your security software

So, with all of this in mind, what can you do to get your security software back in optimal shape? You could spend time looking for and reverting all those changes. However, if your computer is in good working order, it is often quicker and easier to uninstall your security software and then reinstall it.

While the exact steps are going to vary depending on your security program, here are the general steps to do this for the Windows versions of ESET software for the home:

    1. Before you do anything, make at least one backup copy of all important files. It is a good idea to do this regularly anyway, but it is definitely something you should do before making any significant changes to your system. For a primer on backing up your computer, I recommend reading our Backup Basics blogpost and its accompanying paper. While the paper is a little dated in terms of storage costs and capacities, it has withstood the test of time remarkably well and is still quite useful in determining how to preserve your data.
    2. Download the latest installation program for your security software and save it to a location you will remember, such as your Downloads folder or a folder on your Desktop. Here are the web pages for direct downloads of ESET software:

       

      If given a choice between downloading a smaller “live” installer and an advanced option of downloading a larger “full” installer that contains the whole application, download the full version. The live installers are “stubs” that download the remaining parts of the program from the internet, while the larger full installers contain the entire program.

      Using the full installer will allow you to quickly secure your computer when reinstalling the software without having to be connected to the internet while unprotected.

    3. Download the ESET Uninstall Tool from the ESET Knowledgebase and save it to the same location as the installer. While on the web page, you can also save or print this Knowledgebase article for reference. While it’s unlikely you will need to use this tool, having a copy of it along with instructions for its use can be helpful.
    4. Visit the ESET Knowledgebase to review the How do I uninstall and reinstall my ESET Windows home program article. You might also want to save or print this article for reference.
    5. Log into your ESET Home account and make a note of your license key. It’s located on the left side in the Overview column. Then, go to the License Usage column on the right side, select your computer from the three dots “⋮” menu icon—sometimes called the kebab icon—and choose the Disconnect option. If you do not have an ESET Home account, you can retrieve your license using the Lost License page or contact support for further assistance.
    6. Open your ESET program from its icon in the system tray notification area and select the Setup option at the left of the ESET user interface window. At the bottom of the window is an Import/Export settings option. Choose this, and export (save) a copy of your current configuration to the same location as the files you downloaded. If you need extra help, see the ESET Knowledgebase article Importing or exporting the ESET configuration settings in Windows home programs.

 

At this point, you have completed all of your preparations and are ready to begin the reinstallation process.

NOTE: Because the next set of steps involves removing your computer’s security software, it is recommended that you disconnect the computer from its network connection to minimize exposure to the internet. This could be as simple as unplugging an Ethernet cable for wired connections or disconnecting from Wi-Fi for wireless ones. If you downloaded the “live” installer instead of, as recommended, the full installer, do not disconnect the computer from the internet as the connection is required to complete installation.
  1. Disconnect the computer from the internet and uninstall your existing security software. Depending on the Microsoft Windows version installed on your computer, this can either be done by right-clicking on your security software’s icon from the Start Menu, and selecting Uninstall from the context menu that pops up, or by running the Uninstall or change a program (filename: APPWIZ.CPL) applet from the Control Panel, right-clicking on it, and selecting the option to uninstall it from the context menu that pops up.

    One (or more) restarts may be required to finish uninstallation. Even if a restart is not required, it is recommended to perform one to finish any pending disk and file operations the operating system was waiting to perform on the next restart.

  2. In the unlikely event you receive any notifications or warnings, go ahead and follow the instructions to manually run the ESET Uninstall Tool to remove any remnants of the software left over after uninstallation. Manual uninstallation tools can get rid of orphaned files, directories, and processes that can interfere with reinstallation of the security software. Again, a reboot (restart) may be required to finalize removal of these digital leftovers from the operating system as they may stay on the system until it is restarted.

    As a reminder, Windows can be restarted from the Start Menu by selecting Power and then Restart. Do not select Sleep, Shut Down, or other options, as restarting the computer is not the same as shutting it down or turning it off. Many modern computers do not fully power down when turned off but instead enter a low power mode until turned back on. This allows the computer to be ready for use more quickly, but pending changes for things like removing programs or installing software updates may not be finalized.

  3. Reinstall your ESET software using the file you downloaded earlier (refer to step 2, above), and activate it using your license information (see step 5, above). Depending on the program and type of installer, it may need to download additional updated components, so now is the time to reconnect your computer to the internet. When the installation finishes, a restart may be required for the software to be fully functional.
NOTE: Don’t delete any of the files you downloaded or information you saved for your security software just yet. In the event of a problem, they may be used to troubleshoot and restore your old settings, if needed.

And that’s it! You now have a fresh installation of your security software optimized for your computer. At this point, I recommend running your most important applications to verify that everything works properly. Depending upon how your security software works, you may be prompted to allow various programs to access your webcam or the internet, just as you needed to when the software was first installed. Go ahead and set up (allow) the rules for these as you did before.

Congratulations, your security software is running in top shape!  

If you have any questions or comments about reinstalling an ESET product, feel free to post a message in the ESET Security Forum or contact your local ESET reseller, distributor, or office.

Aryeh Goretsky
Distinguished Researcher, ESET

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×