Skip to content

23.12.5 Voyager released

Changes compared to 23.12.4

New Features

  • Added a Debian package for linux clients which installs the Comet Backup desktop app as a systemd service

Enhancements

  • Added support for custom HTTP headers in the “Custom Remote Bucket” Storage Template option

Bug Fixes

  • Fixed an issue preventing restore jobs from completing due to incorrectly measuring the size of a downloaded file
  • Fixed a cosmetic issue with confusion between “Comet” and “Comet Storage” in the Auth Role replication, Constellation, and Storage Template dialogs
  • Fixed an issue with the restore dialog becoming unresponsive while browsing a snapshot in the Comet Server web interface
  • Fixed unnecessary buffering when loading data from B2 Storage Vaults
  • Fixed an issue with misleading error messages when a Microsoft SQL Server backup job is misconfigured

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

CyberLink’s Facial Recognition Engine, FaceMe®, Powers 2-Factor Biometric Authentication Solution for South Korean Banking Sector

Taipei, Taiwan – January 30, 2024 – Leading AI facial recognition provider, CyberLink Corp. (5203.TW), today announces a new collaboration with South Korean company,  UNIONCOMMUNITY. In addition to the existing FaceMe® SDK integration into their UBio-X Face Premium terminal for access control, CyberLink’s globally renowned FaceMe® facial recognition technology is now integrated into UNIONCOMMUNITY’s latest server-based authentication solution, Ubio-ezPass. Currently, Ubio-ezPass is successfully implemented into a major South Korean financial institution and is expanding to other insurance and securities companies that require two-factor authentication for identity verification.

CyberLink FaceMe integrates with UNIONCOMMUNITY Ubio-ezPass

Ubio-ezPass utilizes the highly accurate FaceMe® facial recognition engine to provide two-factor authentication, enhancing user identification. This not only mitigates the risk of traditional single-factor password theft, but also addresses the security challenges of safeguarding personal and corporate data posed by the remote workforce. 

Already successfully implemented in a major South Korean financial institution, Ubio-ezPass capitalizes on FaceMe®’s cross-platform support and rapid recognition advantages to enable financial institutions to achieve dual-factor authentication objectives on existing information systems, rapidly upgrading information security architecture and enhancing security levels.

Seamless and Secure Two-Factor Authentication 

To help banking, financial services and insurance institutions achieve high-security specifications in a zero-trust architecture and address login security issues, Ubio-ezPass introduces dual-factor authentication. In addition to passwords, users are required to use their computer or mobile device’s camera for secure facial recognition to verify their identity, controlling terminal device access and usage permissions. 

With Active Directory (AD), Single Sign-On (SSO), and HR attendance management system functionality, Ubio-ezPass leverages FaceMe®’s facial recognition and proprietary anti-spoofing technology to provide an enterprise-friendly, fast, simple, and secure two-factor authentication solution.

Enhanced Security with Facial Recognition 

The importance of ensuring personal and corporate information security of employees working in varying locations such as cafes, homes, and shared offices cannot be overstated. Ubio-ezPass utilizes FaceMe to detect user activity through the computer’s built-in camera or external webcam, automatically logging out when the user is away. If an unauthorized individual’s face is detected attempting to look at the computer, the system issues an immediate warning and logs out. 

Boasting an accuracy rate of up to 99.83%, FaceMe®’s facial recognition engine has received multiple international certifications from various organizations, including Korea Internet and Security Agency (KISA) and the National Institute of Standards and Technology (NIST) in the United States. Offering not only superior accuracy but also robust anti-spoofing capabilities, FaceMe® has achieved a remarkable 100% anti-spoofing performance in iBeta PAD (Presentation Attack Detection) Level 2 international certification and secured the top position in the Face Analysis Technology Evaluation (FATE) by NIST, proving its capability to withstand various photo and video spoofing attacks.

“Through the FaceMe® Face Recognition Engine, we are honored to enhance the security of internal authentication for the banking industry by implementing a two-factor authentication solution,” said Mei Guu, President of CyberLink Business Unit 2. “Our collaboration with UNIONCOMMUNITY is not only a manifestation of technological innovation but also serves as a fundamental measure in preventing the genesis of financial incidents. We look forward to this innovative application preventing financial fraud and also expanding to other government agencies and enterprises, strengthening identity verification and access control mechanisms, effectively reducing the cybersecurity risks of sensitive information leaks.” 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

5 reasons you need a Cloud Firewall

Introduction: understanding Cloud Firewall 

A Cloud Firewall is a service that allows organizations to control who and how can access their internal and cloud resources.

Gartner® predicts a major move towards Firewall-as-a-Service (FWaaS) by 2025. This change reflects a growing need for security solutions that extend beyond physical boundaries and are easy to update. These solutions also simplify network access control for IT security teams.

NordLayer’s Cloud Firewall makes security management more straightforward and adapts to various environments, from traditional offices to cloud platforms.

Cloud Firewall improves an organization’s security by simplifying network access control. This improvement is vital for achieving compliance, building a mature security system, and following best practices and frameworks like Security Service Edge (SSE). Cloud Firewall’s operation in the cloud makes it especially useful for businesses with hybrid workforces, frequent travelers, or complex infrastructure systems.

In short, a Cloud Firewall is a user-friendly solution that meets various business security needs. Let’s explore how it does this.

NordLayer Cloud Firewall workflow

Key takeaways

  • Cloud Firewalls reduce data leak risks by restricting sensitive data access to only authorized users.

  • Cloud Firewalls help organizations meet compliance with standards like NIS2, PCI DSS, ISO 27001, HIPAA, etc.

  • In many cybersecurity frameworks, Cloud Firewalls are valuable as they offer easier network access control that aligns with best practices.

  • Cloud Firewalls provide a comprehensive solution for managing complex hybrid infrastructures.

  • For hybrid workers, Cloud Firewalls ensure safe and equal access to network resources.

So why do you need a Cloud Firewall?

Reason 1: to prevent data leaks

Network segmentation is vital in network access control. Without network segmentation, data leaks can occur more easily.

Not all network members need full access to all company resources. Confusion over what is confidential in different departments can lead to accidental leaks.

Network segmentation is one of the network access control methods and a primary goal of Cloud Firewalls. Network segmentation is when a network is divided into designated areas with specific access permissions. This strategy helps limit access to sensitive data to only those who need it.

Firewall segmentation

NordLayer’s Cloud Firewall offers straightforward controls for setting up detailed network segmentation. Cloud Firewall allows organizations to establish precise network access permissions. You can grant exclusive access to select resources for certain individuals or groups and restrict access for others when needed. The system can also create rules for specific team members, not just for departments or teams.

A Cloud Firewall is valuable in the fight against data breaches as it helps mitigate risks and contain potential damage.

  1. Using a Cloud Firewall reduces the likelihood of a security breach. It acts as a barrier that shields your network from external threats.

  2. Network segmentation, facilitated by Cloud Firewall, prevents lateral movement within the network. This means employees inadvertently leaking data from inside is less likely.

  3. If a breach occurs, the intruder gains access to only a specific network segment. The Cloud Firewall’s segmentation limits their reach.

In summary, Cloud Firewall simplifies setting and updating access rules. It allows designated team members specific access to sensitive data, enhancing security. Cloud Firewall is an easy-to-use tool for network segmentation, a vital part of network access control.

Reason 2: to achieve compliance

There’s a wide array of important compliance standards and regulations that focus on network access rights control. Let’s look at some examples:

  1. NIS2—a new EU directive aiming to enhance the Network and Information Systems (NIS) Directive of 2016;

  2. PCI DSS—an international standard which safeguards online payment security;

  3. ISO 27001—an international standard for IT security management;

  4. HIPAA—a US federal law focusing on health data protection.

While not all are mandatory yet, they set high cybersecurity measures.

Complying with high cybersecurity standards is becoming vital for building trust and credibility in businesses. Each one requires robust network access control solutions. A Cloud Firewall is an effective tool to meet these requirements.

In 2024, the NIS2 Directive will be a significant topic as this legislative act will become mandatory later in the year. It applies to various EU industries, requiring a consistent approach to cybersecurity.

The amplified impact of the NIS2 Directive

NIS2, PCI DSS, ISO 27001, and HIPAA have a strong focus on ensuring safe data transfer and network protection. To adhere to these frameworks, businesses need strong network controls for data protection and secure communication.

The role of Cloud Firewall in compliance

NordLayer’s Cloud Firewall aids businesses in meeting compliance requirements like those of NIS2 as it helps achieve network segmentation more easily. While not a mandatory requirement for compliance, Cloud Firewall is a versatile and user-friendly solution.

As compliance with the NIS2 Directive becomes crucial for EU businesses, a dependable tool such as Cloud Firewall proves valuable. It ensures controlled network access and enhances data safety. Cloud Firewall is ideal for businesses seeking to adhere to various compliance standards, offering easy use and regular updates.

Proactively implementing a Cloud Firewall before the enforcement of directives like NIS2 is a strategic move. It helps businesses to achieve the necessary network segmentation and prepare for upcoming compliance obligations.

Reason 3: to implement security strategy by best practices

Professionals often turn to established frameworks and checklists when developing a strong network security strategy. These guidelines are critical in shaping and expanding network defense strategies. Implementing network access control measures is a key step in any network security framework. NordLayer’s Cloud Firewall is an effective tool for this purpose.

Popular frameworks guiding network security strategy include SSE and Center for Internet Security (CIS) Controls v8. Both frameworks feature components that focus on network access control, where Cloud Firewall serves as a practical solution.

The SSE framework, introduced by Gartner, merges various network security solutions into a unified cloud service. This framework helps businesses protect their data, resources, and users. SSE includes elements like FWaaS, CASB, SWG, and ZTNA, enabling businesses to counter online threats effectively. In SSE, NordLayer’s Cloud Firewall enhances security and improves threat response.

CIS v8, another well-known cybersecurity framework, features Access Control Lists (ACLs) as one of the key components. ACLs are lists that specify which users can access certain network resources. NordLayer’s Cloud Firewall operates as required for ACLs in CIS v8, managing access to different areas of the network. This is essential for complying with CIS v8 and protecting the network from unauthorized access.

SSE and CIS v8 frameworks are just two examples. Cloud Firewall is adaptable to many other security frameworks and aids in the cybersecurity maturity of an organization. Using a Cloud Firewall aligns with top framework recommendations, offering stronger protection against modern cyber threats and enhancing an organization’s security stance.

Reason 4: to easily unify security across hybrid infrastructures

Many businesses use complex infrastructure systems. These often consist of cloud, on-premise infrastructures, and several remote physical sites. Managing and securing hybrid cloud infrastructures is possible but challenging.

Holistic security for hybrid infrastructures

A Cloud Firewall simplifies the management of these systems. It provides a straightforward, transparent, and potentially cost-saving method for handling complex infrastructures. Saving time in management is one of its major advantages. The Cloud Firewall is beneficial for security and improving operational efficiency in managing these systems.

Businesses with hybrid infrastructures, especially those with multiple physical locations and extensive cloud systems, require a holistic approach. A Cloud Firewall serves this need effectively. It integrates well with different infrastructure components and allows for management from a single point—a browser tab.

The Cloud Firewall offers a unified defense system that meets the varied needs of modern business infrastructures. It efficiently combines cloud and physical network elements and provides detailed control over both.

This unified approach is convenient for businesses and ensures consistent security policies across various environments. It encompasses both cloud services and on-site data storage and simplifies protection and administration.

Reason 5: to enable and ensure safety in the hybrid work model

The move away from a solely on-site work model is permanent. Employees now prefer options like working from home, working from anywhere, business trips, and workations.

CEOs may easily accept these flexible models, but the IT department faces a bigger task. They must not only enable remote work but also ensure its security. This change in the work model brings new risks and requires stronger security measures.

Security teams seek solutions suitable for the hybrid work environment that also gives them peace of mind. They need tools that enable and protect remote workers. A Cloud Firewall is an effective solution for both these needs.

Cloud Firewalls work independently of location. They provide equal access to network resources for employees, whether they are abroad or in the office.

Uniform access is essential for maintaining high productivity and collaboration, especially in widespread teams. Cloud Firewall is very helpful for international companies or those with staff who travel often.

Conclusion: why Cloud Firewall is the smart choice for your business

5 reasons you need a Cloud Firewall

Cloud Firewall, especially NordLayer’s FWaaS, brings a major upgrade in network security. It meets the needs of modern businesses with its ease of use and cost efficiency.

Setting up a Cloud Firewall is easy, but you need to be a NordLayer Premium plan user. It’s manageable through the NordLayer Control Panel.

Choosing NordLayer’s Cloud Firewall isn’t just an upgrade. It’s a strategic step towards a more secure, efficient, and forward-looking network.

For more details about Cloud Firewall, contact sales for further assistance.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Demystifying RDP part 2: Accessing and visualizing RDP environments

Understanding what your RDP environment will look like and how to access it is the next step in the process. Need a recap? Check out our previous blog post on understanding RDP, RDS, and VDI.

Remote Desktop vs. RemoteApp 

Demystifying RDP 2

Parallels Secure Workspace with a mix of RemoteApp and Remote Desktop-based services, including:

  1. Bob50 deployed as RemoteApp.
  2. Windows 10 deployed with BOB50 as a local app.

Demystifying RDP Opening a published RemoteApp application in Parallels Secure Workspace.

demystifying RDP

Opening the same application in a published Remote Desktop in Parallels Secure Workspace.

How do end users access their VDI or RDS environment?

Windows RDC

Example: Connecting to RDP on a Windows 10 device.

From the client side, using an RDP client is the most used access method by far.

This mechanism is available from Microsoft on Windows, but there are other versions available on other platforms, such as Linux and MacOS). This client needs to be installed on the end user’s device.

For most end users, the initial setup and connection will require help from the IT department. Furthermore, it requires additional security measures to be in place, as discussed in this article about the WannaCry ransomware attacks.

Example: Connecting to RDP on a Windows 10 device.

In the past few years, access to virtual apps and desktops via HTML5 without needing dedicated client software has become increasingly popular.

In this case, the browser becomes a very efficient client.

Because nearly all devices are equipped with browsers these days, browser-based access doesn’t require the installation or management of additional software.

The latest version of RDP comes with RDWeb, which offers HTML5 capabilities. This is only available on the most recent version of RDP and therefore is not available on versions older than Windows Server 2016. Read more on HTML5 as the client of the future in this blog post.

Since the beginning, Parallels Secure Workspace has been based on using the browser as the sole client, delivering RDP in HTML5 via the proprietary Parallels Secure Workspace HTML5 Gateway.

Discover how Parallels Secure Workspace can add layers of value to your RDP deployments. Start your free trial now!

The typical components of an RDP deployment

Until Windows Server 2019 was released, Remote Desktop Protocol was closely tied to the version of Windows Server used. For example, this meant if your applications were running on Windows Server 2008, you would be bound to the capabilities (and limitations) of this version of RDP.

RDS itself is the combination of several components or roles, and not all roles are required in every situation. In some cases, the components or roles involved will require additional infrastructure to be made available.

However, for a simple VDI connection (without RDS), you don’t need all these roles. Here is the overview:

1. Remote Desktop Session Host (RDSH)

RDSH enables a server to host both RemoteApp programs and session-based desktops (Remote Desktop). Users can connect to the RD Session Host servers in a session collection to run programs, save files, and use resources on those servers.

Users can access the Remote Desktop Session Host server by using the Remote Desktop Connection client or by using RemoteApp programs. Note: for VDI, you don’t require RDSH.

2. Remote Desktop Virtualization Host (RDVH)

RDVH enables to connect to virtual desktops by using RemoteApp and Desktop connection. It cuts costs by enabling the management of desktops from one place and reduces the need for advanced client hardware. Users can access their desktops from anywhere, enabling remote work and increasing flexibility. RDVH also simplifies data backups and disaster recovery.

3. Remote Desktop Connection Broker

This functionality allows users to reconnect to their existing virtual desktop, RemoteApp programs, and session-based desktops. It enables even load distribution across RD Session Host servers in a session collection or across pooled virtual desktops in a pooled virtual desktop collection. It also provides access to virtual desktops in a virtual desktop collection. The Connection Broker is not required for very simple deployments.

4. Remote Desktop Gateway

A capability that enables authorized users to connect to virtual desktops, Remote-App programs, and session-based desktops over a private network or the Internet. Basically, it enables secure access from a public network into a private network—more specifically to the session hosts, brokers, and VDIs.

5. Remote Desktop Web Access

Remote Desktop Web Access enables users to access RemoteApp and Desktop Connection through the Start Menu or through a web browser. RemoteApp and Desktop Connection provide users with customized views of RemoteApp programs, session-based desktops, and virtual desktops.

For web browser-based access, you can picture a webpage that displays published applications and desktops. When the user clicks to open, it will traditionally trigger the locally installed RDP client to launch and connect.

6. Remote Desktop Licensing

Remote Desktop Licensing enables a server to manage the RDS client access licenses (RDS CALs) that are required for each device or user to connect to a Remote Desktop Session Host server. RDS CALs are managed using the Remote Desktop Licensing Manager application.

See how Parallels Secure Workspace adds layers of value and security on top of RDP

Parallels Secure Workspace is a unified workspace and a workspace aggregator. It offers HTML5 browser-based access to Windows applications and desktops, Linux-based desktops, web and intranet applications, SaaS applications, and files.

For Windows-based applications and desktops that are deployed in server-based computing, Parallels Secure Workspace serves as a layer on top of RDP, adding security and value on top of the RDP foundation.

Aggregate access

Parallels Secure Workspace doesn’t just provide access to Windows applications and desktops, but also to files, intranets, web applications, SaaS, Linux desktops and apps, and more.

Enhanced security

Naked RDP is vulnerable to cyber-attacks. PSW can minimize these risks — multi-factor authentication, SSL encryption, and usage auditing are built-in.

Rich HTML5 experience

Parallels Secure Workspace has perfected HTML5 access over the years with useful additions such as a virtual printer, support for function keys, and in-app downloading.

Open API and multi-tenant

In contrast to RDP, Parallels Secure Workspace is multi-tenant and fully Open API-based. Making it perfect for ISVs, MSPs, and CSPs.

Collaboration functionalities are baked-in

With Parallels Secure Workspace, you can share access to application sessions and share documents of any size in a secure and controlled manner.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×