Skip to content

ESET 推出全新消費者解決方案 多項重要更新,滿足客戶更複雜、更進階的安全需求

2023 年 11 月 24 日,全球領先的網絡安全公司 ESET 宣布推出全新消費者解決方案。作為擁有超過 30 年經驗的公司,ESET 將其廣受市場歡迎的家用產品重新整合。今次推出兩個以家庭用戶為中心的訂閱方案,通過引入全新的功能,提供更廣泛和可靠的保護。為滿足客戶對這些新功能的需求,ESET 同時推出改良版的 ESET HOME,它是一個完整的安全管理平台,適用於所有主要的操作系統,包括 Windows、macOS、Android 和 iOS。

ESET 首席市場營銷總監 Mária Trnková 表示:「很高興向大家展示我們頂尖的消費者解決方案。這是一個全面的產品組合,旨在保護客戶在當今數碼風險中的安全。我們致力於在不影響安全的前提下推進技術。ESET 團隊將專業知識投入到創建人工智能、人類洞察力和雲端保護的強大組合中,提供先進的防禦措施,以應對各種網絡威脅。新的 ESET HOME 安全訂閱方案提供多層次的安全保護,保障私隱,確保客戶的裝置和家庭成員的安全。有了 ESET,每位家庭成員不僅受到保護,還能夠安全地探索、相互聯繫和茁壯成長。」

完整的安全管理平台

根據 ESET 客戶研究顯示,絕大多數的 ESET HOME 使用者均為家庭管理員,他們負責照顧家庭成員的數碼安全。他們精通科技,卻不想花太多的時間去管理 ESET 產品。為滿足客戶需求,ESET 對 ESET HOME 進行了改良。現在,作為一個完整的安全管理平台,它無縫融入使用者的體驗之中,無論是管理裝置、網上購買、訂閱和續訂、下載或升級安全解決方案,都變得更簡單和方便。為此,ESET 進行了多項界面變動,包括引入全面保護狀態,以便使用者可以在一個視圖中查看家庭成員的保護水平。

這些變更旨在為客戶提供頂尖的保護,同時減少設定產品所需的時間。新的生態系統,為那些希望控制和設定產品的使用者提供了有意義的選項和功能。

探索新的訂閱方案和功能

ESET HOME Security Essential 是一個入門級的訂閱方案,具備恰到的保護功能,提供改進的現代端點安全和多層實時保護。方案進一步為使用者提供對抗各種威脅的工具,其中包括銀行及付款防護功能,有效保護使用者的敏感數據;網絡檢測器提供有關使用者路由器的安全信息,顯示連接到網絡的裝置。新開發的瀏覽器擴展提供了瀏覽器私隱和安全功能的增強,包括清理工具,如瀏覽器清理,定期或按需從瀏覽器中清除 cookie、歷史記錄等。

進階的 ESET HOME Security Premium 進一步擴展其他安全功能,例如密碼管理器,用於保護和儲存使用者的密碼和個人數據,包括準確的自動填寫功能,節省用戶填寫網絡表格的時間;安全數據功能則通過對文件和可卸載媒體進行強大的加密,防止在 USB 或手提電腦丟失時的數據盜竊,確保安全協作和數據共享,提升使用者的私隱和安全性。ESET HOME Security Premium 更提供了 ESET LiveGuard 工具,基於雲端的保護,專門用於緩解前所未見的威脅。

兩個 ESET HOME Security 訂閱方案,通過無縫集成,將裝置保護提升到一個全新的水平,以滿足客戶更複雜、更進階的安全需求。

關於Version 2
Version 2 是亞洲最有活力的IT公司之一,公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括通訊系統、安全、網絡、多媒體及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括中國大陸、香港、澳門、臺灣、新加坡等地區,客戶來自各行各業,包括全球1000大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

23.8.3 ‘Adrastea’ released

Bug Fixes

  • Fixed an issue with ‘not found in index’ error messages when restoring from some recent backup job snapshots that were created simultaneously with a retention pass
  • Fixed an issue with handling unexpected files inside an S3-compatible storage location

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Enhancing Cyber Resilience: Ransomware Readiness Assessments and the Critical Role of Network Access Control (NAC)

Ransomware, a malicious software that encrypts critical data and demands a ransom for its release, has become a top concern for businesses worldwide. To fortify their defenses, companies are increasingly conducting a ransomware readiness assessment of their current security operations. In this article, we delve into the intricacies of these assessments, shedding light on the critical role that Network Access Control (NAC) plays in ensuring a robust security posture.

The Ransomware Threat Landscape

Ransomware attacks have surged in recent years, posing significant financial and operational risks to businesses across industries. These attacks are increasingly more sophisticated, often bypassing traditional security measures and targeting organizations of all sizes. It is no longer a question of ‘if,’ but ‘when’ an organization will face a ransomware attack. Recognizing this, companies are proactively taking measures to assess their readiness to withstand such threats.

Ransomware Readiness Assessments: An Overview

Ransomware readiness assessments are comprehensive evaluations that organizations undergo to gauge their preparedness in dealing with ransomware attacks. These assessments are designed to identify vulnerabilities, assess current security measures, and develop strategies for mitigating risks and responding to potential incidents. To optimize their ransomware readiness, businesses typically enlist the services of cybersecurity experts who perform thorough evaluations of the company’s infrastructure and practices.

The Process of Ransomware Readiness Assessments

Ransomware readiness assessments follow a structured process that encompasses various aspects of an organization’s cybersecurity. Below, we break down the key steps involved:

  • Scoping: The first step in a readiness assessment is to define the scope of the evaluation. This includes identifying critical assets, systems, and data that must be protected, as well as assessing the organization’s risk tolerance.
  • Risk Assessment: A comprehensive risk assessment is conducted to identify potential vulnerabilities, threat vectors, and the impact of ransomware attacks. This step often involves penetration testing and vulnerability scanning to uncover weaknesses that cybercriminals might exploit.
  • Security Controls Evaluation: Security controls and measures currently in place are evaluated to determine their effectiveness in preventing, detecting, and responding to ransomware attacks. This includes a review of firewalls, antivirus software, intrusion detection systems, and security policies.
  • Gap Analysis: A gap analysis is performed to highlight areas where improvements are needed. This helps organizations understand where their cybersecurity posture falls short of industry best practices and regulatory requirements.
  • Incident Response Planning: A critical component of ransomware readiness assessments is developing or enhancing an incident response plan. This plan outlines how the organization will respond in the event of a ransomware attack, including containment, communication, and recovery strategies.
  • Employee Training: Ensuring that employees are aware of ransomware threats and know how to recognize and respond to them is crucial. Employee training and awareness programs are integral to the assessment process.

Network Access Control (NAC): The Guardian of Cyber Resilience

One of the key elements that play a critical role in ransomware readiness assessments is Network Access Control (NAC). NAC is a cybersecurity solution that focuses on managing and securing network access for devices and users. It enforces policies that define who or what can connect to the network and under what conditions. NAC plays a pivotal role in ransomware readiness assessments by enhancing an organization’s overall security posture in the following ways:

  • Device Visibility and Profiling: NAC solutions provide real-time visibility into all devices attempting to connect to the network, from laptops and smartphones to IoT devices. This visibility allows organizations to track and manage the various endpoints and identify potential threats.
  • Access Control: NAC helps organizations define and enforce access policies that determine which devices and users are allowed on the network. It can restrict unauthorized or risky devices from connecting, reducing the attack surface for ransomware.
  • Continuous Monitoring: NAC solutions continuously monitor devices on the network, ensuring that they remain compliant with security policies. Any deviation from these policies triggers alerts and can lead to automatic quarantine of the device, preventing potential ransomware infection.
  • Network Segmentation: NAC enables network segmentation, which isolates critical assets and sensitive data from the rest of the network. In the event of a ransomware attack, segmentation can limit the lateral movement of malware and minimize damage.
  • Remediation: NAC can assist in remediating non-compliant devices by guiding users through necessary updates or security patches before granting network access. This proactive approach helps organizations stay ahead of known vulnerabilities that ransomware attackers may exploit.
  • Authentication and Identity Management: NAC ensures that only authorized users with proper authentication can access the network, reducing the risk of unauthorized access or credential theft that ransomware actors often exploit.
  • Integration with Security Information and Event Management (SIEM) systems: NAC solutions often integrate with SIEM systems, allowing organizations to correlate network access data with security events and incidents. This enhances visibility and incident response capabilities.

The Impact of NAC on Ransomware Readiness

Incorporating NAC into ransomware readiness assessments can significantly enhance an organization’s security posture. The comprehensive visibility, access control, and continuous monitoring provided by NAC solutions reduce the attack surface and the likelihood of ransomware infections. Additionally, NAC helps organizations detect and respond to threats more effectively, increasing their overall cyber resilience.

Real-World Application

To illustrate the importance of NAC in ransomware readiness, consider a hypothetical scenario in which a manufacturing company is undergoing a ransomware readiness assessment. The assessment reveals that the organization lacks visibility into the devices connecting to its network, leaving it vulnerable to unauthorized or potentially compromised endpoints. By implementing NAC, the company gains real-time visibility into all network devices, enabling the security team to identify and isolate any suspicious or non-compliant devices immediately.

Moreover, NAC helps the organization enforce strict access policies, ensuring that only authorized devices and users can connect to the network. This significantly reduces the risk of ransomware infiltrating the network through unsecured devices. In the event of a ransomware incident, the NAC solution allows for swift containment, limiting the malware’s spread and minimizing potential damage.

Regulatory Compliance and Ransomware Readiness

In addition to enhancing security, NAC can also play a vital role in helping organizations meet regulatory compliance requirements. Many industries have specific cybersecurity regulations and standards that mandate the implementation of access controls and network segmentation. NAC solutions are well-suited to assist organizations in complying with these requirements. For example, the healthcare industry, governed by the Health Insurance Portability and Accountability Act (HIPAA), requires strict controls on access to patient data. NAC can help healthcare organizations ensure that only authorized personnel access sensitive patient information, reducing the risk of ransomware attacks that can lead to data breaches.

Conclusion

Ransomware readiness assessments have become an essential part of an organization’s cybersecurity strategy in today’s threat landscape. Companies must proactively evaluate their security measures to identify vulnerabilities and enhance their ability to withstand ransomware attacks. Network Access Control (NAC) is a critical component in these assessments, offering a robust set of tools to manage and secure network access, enforce policies, and enhance cybersecurity. By implementing NAC solutions, organizations can achieve comprehensive visibility, enforce access controls, and continuously monitor network devices, ultimately reducing the risk of ransomware infections. NAC also aids in regulatory compliance, ensuring that organizations adhere

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

The 101 on AI-powered IT: The answers you’ve been looking for

If you’re looking to gain a better understanding of what Atera’s AI-powered IT can do for you, we’ve got you covered.   At our recent AI-powered IT virtual event, Atera co-founders Gil Pekelman and Oshri Moyal sat down and answered some great questions from the audience about the different capabilities enabled by our end-to-end AI integration, Atera’s plans for the future, and more.   We’ve collected the most frequently asked questions to provide you here with the answers, straight from the source.  

Can you provide some examples of how the Atera platform improved IT operations in real-world scenarios?

  In the past year or so, everyone’s been talking about AI and the impact it’s going to have on the economy and the labor market, but a lot of these conversations have remained very high-level. How exactly AI will transform our work is still very much an open question.    Atera is currently being used by over 23,000 IT professionals for their daily operations, managing some 4.2 million devices between them. Since our integration with Microsoft and OpenAI, our data has been revealing some of the amazing results that can be achieved with our AI-powered IT platform—such as a 99% reduction in response time, a 95% reduction in resolution time, and as much as 10X more tickets resolved per technician in the same amount of time.   These capabilities are divided into two tenants:  
  • End-user facing: Allows end-users to self-troubleshoot the most common IT issues, including password resets and computer reboots, email issues, etc.
  • Our AI assistant: Provides additional “brainpower” to IT teams for more complex problem-solving such as AI-generated scripting, solutions and responses, user sentiment analysis, SNMP configurations, and more.
  So, the individual impact really depends on how users choose to leverage our AI. For example, Joseph Smith, technical support engineer at AFP Technology, said they use it to create scripts, automate tasks, and troubleshoot errors fast and efficiently—meaning the main impact they’re seeing is on productivity and performance.    Derek Daly, technical service manager at DataSol, is using our object identifier (OID) generator to cut a frustrating process that can take hours—searching for the correct device identifier on the manufacturer’s website—to a few seconds.   You can also read our customer stories with SWNS Media Group and Fuse Technology Group to learn how AIT has changed the way they work.  

Is Atera using my data to help train its AI algorithm?

  So, one of the main concerns around using public AI tools is that proprietary data is being used to train the various AI models used in these tools. A related concern is that this information could‌ also become publicly available in other ways.   Atera integrates Azure OpenAI, meaning nothing transfers to OpenAI but rather everything is confined to the Atera platform. Your inputs (prompts), outputs, and embeddings are not accessible to either the OpenAI environment or to other customers, and are not used to train other models, either.    You can find the full list of Atera’s compliances on our website.  

Do we have control over what is determined to be an auto-pilot issue, versus a co-pilot issue/ticket? It feels like there is a threshold, but what determines it?

  Regarding Atera’s AIT, auto-pilot refers to what the AI does autonomously, while co-pilot refers to situations where the AI acts as an “assistant” to the technician, for example by offering suggestions.    Atera’s auto-pilot currently has over 500 checks and solutions it can run on its own, and we’re constantly adding more. We focus on the most common scenarios and carefully add only risk-free actions.    What happens if the AI encounters something it doesn’t know how to solve? We’ve added a cutting-edge escalation mechanism. When the AI identifies an action that is outside its boundaries, it will escalate it to a human technician, thereby moving it from auto-pilot to co-pilot. The human technician will then be aided by the AI with auto-ticket summaries, suggested solutions and responses, and more.  

Can AIT be used to build ticket automation rules?

  AIT can be used to automate a lot of things—it’s really only limited by your imagination. For example, the ticketing engine already uses the AI to auto-tag tickets, so you can create all kinds of automations based on these tags.   One of the most common automations we see that leverages this auto-tagging mechanism is dispatching. Say you have a technician who specializes in a specific hardware or device. You can automate the dispatch of all tickets with the relevant tag to this specific technician. Or you can do this for all tickets and automate all of your dispatching, eliminating manual dispatching completely. You can even take this a step further by then automating auto-healing and script deployment for specific issues.  

Is there a way to push out software installs and updates through the AI autopilot?

  Absolutely! As every technician knows, installing and updating software—whether for existing users or when onboarding new employees or end users—is a very frequent ask. And it’s quite time-consuming.    With Atera, that task falls under ‌auto-pilot. So technicians can configure the list of allowed software once—Zoom, browsers, the Office suite, etc.—and the autopilot will pull from this list, and take care of all installs and updates on its own. Only if it runs into a request that is not in the allowed list, or there’s an issue with permissions or something similar, it will escalate to the technician. And of course, the technician will get the ticket with all this information included.   

What languages can people interact with Atera’s AI?

  Atera’s autopilot can support all languages, so please—give it a try in your native language!   Our co-pilot can understand all languages—meaning you can input your requests in any language of your choice. However, all output will be in the language defined for the user’s system. We currently support English, German, French, Italian, and Spanish.  

Are we able to customize answers from the AI to customers?

  One of the features enabled by the Atera co-pilot is AI-generated replies. These are generated based on the ticket summary, the various actions taken, etc. Of course, they are completely editable, or you can choose not to use them at all.   

We are a mixed Windows(50%), Linux(10%) and MacOS(40%) house. Is Atera and AIT relevant to our business?

  Atera seamlessly backs up Windows, Linux, and OS X platforms (as well as Microsoft Exchange, Hyper-V, SharePoint, SQL Server, MySQL, Oracle, and VMware). You can find more information by browsing our Knowledge Base.   So yes, if you are looking for an IT management solution that offers a single-pane-of-glass, features like RMM, helpdesk, analytics and reporting, as well as a seamless, easy way to integrate AI capabilities into your workflow, Atera and AIT are relevant to your business.  

Where is Atera going with AI, and what’s your vision for IT for the next few years?

  Atera’s AIT, OpenAI, and tools like ChatGPT, they’re all built on a combination of three things—software that “thinks” in a way similar to human intelligence, endless computing power, and endless data. Together, the combination creates human-like reasoning. In many ways, we’re only at the beginning of this revolution.   The way we at Atera see the future of IT, the “small things” will be taken care of by AI. All the routine, mundane tasks that take up the majority of time and cause a lot of frustration—password resets, maintenance updates, patching, etc.    And what IT people will be doing is focusing on more complex, impactful work. So, security, scaling, architecture, sitting with customers and with the organization, understanding what the real business needs are, and building around that.   And the impact on businesses is going to be in two avenues: First, IT professionals are just going to be much more efficient. But on the entire organizational level, there will be less frequent problems because they’re going to be solved ahead of time. There’ll be less waiting time for issues to be fixed. Security will be better, etc. So that efficiency is really going to translate to the whole organization.   As to where Atera is going with our AIT—Things are happening very fast, and we’re releasing new features all the time. So we can’t reveal everything just yet, but stay tuned, we are working on some amazing innovations, and you can keep up with them on our community and our social media channels, and of course via product updates if you’re already Atera users.

About Version 2
Version 2 is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Atera
Small and medium IT operators are the heroes behind the scenes supporting companies around the world. They care a lot for their clients (external or internal) and often work virtually 24/7. However, small and medium IT service providers have always been underserved.
Atera was built for exactly that. With the vision to simplify and streamline the work of Managed Service Providers and IT professionals. To create something that saves them time, energy, and money. To free them from needing to constantly put out fires.
That vision created the remote-first IT management software – enabling IT professionals to shift from reactive task takers to proactive problem solvers.
Now operating from our beautiful offices on Rothchild in Tel Aviv, Atera is currently used by thousands and thousands of IT professionals all over the world (105+ countries).
As we rapidly grow, our goal remains the same: to transform the IT industry with revolutionary technology, while creating one of the happiest and healthiest work environments in the world.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×