Skip to content

New version of ActiveVisor ™

Actiphy Unveils Upgraded ActiveVisor™ with Improved User Experience and Enhanced Security

Tokyo, Japan—Reliable data protection is crucial in an age of prolonged global conflicts and evolving cyberattacks. The U.S. government reports that companies targeted by cyberattacks faced partial to complete business shutdowns and significant financial losses[1]. With many people working remotely, a dependable centralized management solution is essential to safeguard valuable data and ensure secure backup and recovery from virtually anywhere.
ActiveVisor™ is a centralized management console for ActiveImage Protector™ backup clients. It offers real-time monitoring of backup status information and notification alerts to identify and correct issues quickly. The user interface pinpoints the location of any backup failure, allowing for prompt corrective actions. System administrators can significantly reduce workloads by monitoring and managing backup statuses from any location.
 

New Features

  • Manage Backup Storage:
    ActiveVisor enables users to choose post-backup actions, including checking the bootability of image files, verifying backup integrity, and consolidating backups. Users can also carry out one-time operations such as BootCheck, Verify, Consolidation, Copy, Hash, and File Recovery on backup images.
  • Improved Authentication and Enhanced Security:
    Users must input a passphrase to access new managed client PCs. Passphrase entry is also mandatory when making changes to client PCs or performing push installations to prevent unauthorized access.
  • Enhanced User-Friendly GUI Interface:
    ActiveVisor’s interface is designed with the user in mind. It presents managed objects clearly and organized at the top of the console window. Ribbon-formatted actions make it easy to run actions immediately, streamlining operations and ensuring a comfortable user experience.
  • List View of Standby Machines and Hypervisors:
    ActiveVisor now provides a list view of standby machines and hypervisors, enabling users to monitor their status and location.
What is ActiveVisor?
ActiveVisor gathers data from ActiveImage Protector agents on remote client PCs and agentless HyperAgent on backup hosts via a network. It offers a visual display of statistical data, real-time monitoring of backup status and storage space availability, and management of backup tasks and schedules. The dashboard shows networked computers, ActiveImage-protected client machines, and storage space status, highlighting task execution status.
ActiveVisor enables the grouping and rearranging of clients for management purposes. You can configure schedules for individual clients or apply them as templates for batch deployments. The platform provides real-time monitoring of backup status and sends alerts for failed backup tasks. Additionally, it supports push-installation of ActiveImage Protector agents on remote PCs.
ActiveVisor is available at no additional cost to ActiveImage Protector users with a valid annual support contract.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

24.6.5 Voyager released

Changes compared to 24.6.4 

Bug Fixes

  • Fixed an issue with the Users list page in the Comet Server web interface being reverse sorted by default
  • Fixed an issue with the Settings and Admin Account pages failing to render for an admin user in the Comet Server web interface
  • Fixed an issue with Comet Server config files being updated with an invalid Admin Organization
  • Fixed a crash when loading the Comet Server web interface on a Comet Server with Auth Role disabled

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Scale Computing Releases Free Total Cost of Ownership Calculator for Evaluating IT Infrastructure

New Tool Enables Efficient, Accurate, and Customizable Decision-Making for Cost Analysis of Technology Infrastructure

INDIANAPOLIS — July 23, 2024 — Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced the release of the Scale Computing Total Cost of Ownership (TCO) Calculator. The new TCO Calculator is a free online tool for estimating the cost savings customers can achieve across specific technology categories and server models by migrating application workloads to Scale Computing Platform (SC//Platform).

TCO calculation enables customers to evaluate purchasing decisions based on the comprehensive costs of owning and operating IT infrastructure over its lifecycle or other set periods of time. When it comes to making substantial investments like technology infrastructure or software, TCO analysis is pivotal in making well-informed purchase decisions. It provides visibility into both direct and indirect costs, including power consumption and energy savings, and allows business and IT leaders to scrutinize the enduring financial implications of their investments to pinpoint opportunities for cost reduction. While manual execution of TCO analysis is often time-consuming and susceptible to inaccuracies, automated cost analysis tools can provide enterprise leaders with key information for decision-making.

“When evaluating a new IT infrastructure solution, the acquisition cost is only the starting point for cost analysis. Customers need a full view of the operational costs involved to make an informed purchasing decision. We aim to provide that transparency,” stated Jeff Ready, CEO and co-founder of Scale Computing. “IT leaders need an in-depth understanding of the total cost associated with purchasing and maintaining the solution over time, including the cost of deployment, training, licensing, scale-out, downtime, and management. We’re excited to release a TCO Calculator that’s easy to use, customizable, and accurate,to help customers see what kind of savings they could realize with Scale Computing.”

Scale Computing Platform (SC//Platform) brings simplicity, high availability, and scalability together with a powerful, all-in-one solution to streamline existing IT infrastructure. It integrates seamlessly with existing hardware, regardless of its specifications, and empowers IT leaders to efficiently manage infrastructure at the network’s edge. SC//Platform replaces complex setups with a single, easy-to-manage platform that delivers high availability for running virtual machines. This simplicity translates to significant cost savings compared to solutions like VMware, reducing TCO by an estimated 40% and downtime by up to 90%.

To learn more about Scale Computing and the new TCO Calculator tool, please visit this page.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

24.5.4 Enceladus released

Changes compared to 24.5.3

Bug Fixes

  • Fixed an issue with the Syncro integration preventing backup job warnings and errors from being raised as an RMM Alert
  • Fixed an issue for Hyper-V Protected Items that caused the error message “Incorrect Function” to occur when backing up guest VMs
  • Fixed an issue for Microsoft 365 Protected Items that caused the error message “invalid character ‘S’ looking for beginning of value” to be returned during listing of accounts
  • Fixed an issue with Hyper-V Changed Block Tracking falling back to full scans

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

Striking the Balance: User Experience and Security

Ensuring robust security measures while maintaining a seamless user experience is crucial for IT security teams. Unfortunately, it’s something organizations still struggle to get right. There are many reasons for this. The increasing complexity of cyber threats necessitates stringent security protocols, but overly rigid measures can hinder productivity and frustrate users. Here, we explore why IT security teams need to strike a better balance between user experience and security, examines the challenges business users face with security tools, and offers guidance on creating an effective roadmap to achieve this balance.

The Importance of Balancing User Experience and Security

1. User Productivity and Satisfaction

User experience (UX) directly impacts productivity. When security measures are too restrictive or cumbersome, they can disrupt workflows and create bottlenecks. For instance, frequent password changes, multi-factor authentication (MFA) for every login, and complicated access procedures can slow down tasks and lead to user frustration. A poor UX can reduce employee morale and satisfaction, ultimately affecting overall business performance.

2. Compliance and Risk Management

Effective security measures are essential for compliance with regulations such as GDPR, HIPAA, and CCPA. However, these measures must be implemented in a way that doesn’t impede business operations. Striking a balance ensures that compliance requirements are met without compromising the efficiency of day-to-day tasks.

3. Mitigating Shadow IT

When users find official security measures too restrictive or difficult to navigate, they may resort to shadow IT—using unauthorized tools or applications to get their work done. This practice poses significant security risks as these tools may not comply with company policies, leading to data breaches and vulnerabilities. A balanced approach encourages users to adhere to approved protocols, reducing the likelihood of shadow IT.

Challenges Business Users Experience with Security Tools

1. Complexity and Usability Issues

Many security tools are designed with a focus on functionality rather than usability. Complex interfaces, convoluted processes, and technical jargon can overwhelm non-technical users. For example, a security dashboard filled with technical metrics may be valuable for IT professionals but confusing for business users who need to quickly assess the status of their projects.

2. Frequent Disruptions

Security protocols often require users to take additional steps, such as MFA or regular password changes. While these measures are crucial for protecting sensitive information, they can disrupt workflows and create frustration. Users may perceive these interruptions as hindrances rather than essential security practices.

3. Lack of Integration

Many organizations use a variety of security tools that may not be well-integrated with other business applications. This lack of integration forces users to switch between different platforms, re-enter information, and manage multiple passwords, all of which contribute to inefficiency and user dissatisfaction.

Creating an Effective Roadmap for Balancing UX and Security

1. Conduct User-Centered Research

Understanding the needs and pain points of business users is the first step in creating a balanced approach. Conduct surveys, interviews, and usability testing to gather insights into how users interact with security tools. This research can help identify specific areas where the user experience can be improved without compromising security.

2. Simplify Security Processes

Streamlining security processes can significantly enhance the user experience. For example, implementing passwordless authentication with digital certificates can streamline the login experience, help users ditch passwords altogether – all while maintaining and even enhancing security.

3. Enhance Training and Awareness

Educating users about the importance of security measures and how to navigate them effectively is crucial. Regular training sessions, workshops, and clear documentation can empower users to understand and comply with security protocols. Gamified training modules and interactive sessions can make learning about security more engaging and effective.

4. Foster Collaboration Between IT and Business Units

Creating a collaborative environment where IT and business units work together can help align security measures with business needs. Regular meetings and open communication channels can facilitate the exchange of ideas and ensure that security protocols are designed with the user experience in mind. IT teams should be open to feedback and willing to make adjustments based on user input.

5. Leverage Technology for Better UX

Investing in advanced technologies can help balance security and user experience. For example, biometric authentication methods such as fingerprint or facial recognition offer strong security with minimal disruption. Similarly, AI-driven security solutions can provide real-time threat detection and response without requiring constant user intervention.

6. Continuous Monitoring and Improvement

Balancing UX and security is an ongoing process. Continuous monitoring and feedback loops can help identify emerging issues and areas for improvement. Regularly reviewing and updating security protocols based on user feedback and technological advancements ensures that the balance is maintained over time.

A Complex & Essential Task

Striking the right balance between user experience and security is a complex but essential task for IT security teams. By understanding the challenges business users face with security tools and adopting a user-centered approach, organizations can create a security environment that protects critical assets without hindering productivity. Simplifying security processes, enhancing training, fostering collaboration, leveraging technology, and continuously monitoring and improving protocols are key steps in achieving this balance. Ultimately, a well-balanced approach not only enhances user satisfaction but also strengthens overall security posture and business performance.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×