Skip to content

GigaOm Recognizes Scale Computing as a Leader in its 2024 Radar Report for Full-Stack Edge Deployments

In today’s data-driven world, businesses are increasingly deploying applications at the edge of their networks — from remote branch offices to factory floors to oil rigs. These edge locations often generate massive amounts of data that needs to be processed and analyzed quickly, but traditional IT infrastructure can struggle to keep up, especially for organizations embracing DevOps and agile methodologies.

Enter full-stack edge deployments. These cloud-managed solutions offer a comprehensive toolkit for running applications at the edge, enabling local data collection and processing. They’re ideal for businesses that need to run applications in offline environments, require near-real-time data processing due to latency concerns, or have data privacy regulations that necessitate local data storage. Full-stack edge deployments simplify IT operations by providing everything an organization needs to manage its edge infrastructure, from operating systems to disaster recovery, in a single platform.

If you’re looking to harness the power of edge computing, full-stack edge deployments are a game-changer for increasing deployment speed, improving performance, and ultimately reducing costs. That’s why we’re proud that Scale Computing is recognized as a leader in full-stack edge in the latest GigaOm Radar for Full-Stack Edge Deployments. The prestigious report by GigaOm, a leading analyst firm, evaluates vendors in the full-stack edge deployment space, highlighting solutions that empower businesses to unlock the full potential of edge computing.

Why Scale Computing is a Leader in Full-Stack Edge Deployments

The GigaOm Radar is a valuable resource for IT and business leaders evaluating edge computing solutions. The 2024 report analyzes 16 top vendors and assesses them based on key capabilities and requirements. Scale Computing is positioned in the Leaders circle within the Maturity/Platform Play quadrant of the GigaOm Radar, scoring highly across a range of key features that signify our standing as a leading provider of integrated hardware-software solutions for the edge.

The GigaOm Radar Report Highlights:

  • Scale Computing is a good fit for any organization of any size.
  • Scale Computing delivers one unified edge computing platform for simplified deployment and management.
  • Scale Computing provides fantastic economic benefits, allowing users to do more with less cost and fewer resources.

The future of IT is at the edge, and Scale Computing is at the forefront of the revolution. Our full-stack edge solution offers unmatched simplicity, scalability, and ease of use for organizations of all sizes, in any industry.

  • Single Platform Does it All: Scale Computing Platform (SC//Platform) consolidates virtualization, servers, storage, backup, disaster recovery, and fleet management into a single, easy-to-manage platform. This eliminates the need for complex, piecemeal infrastructure and simplifies edge deployments.
  • Seamless Scalability: Our solution scales from data centers to branch offices and distributed edge locations.
  • Centralized Management for Hundreds (or Thousands) of Deployments: Scale Computing Fleet Manager (SC//Fleet Manager) allows IT leaders to centrally monitor and manage even the most geographically dispersed deployments with ease. Our zero-touch provisioning feature reduces deployment times by a staggering 90% or more.
  • Unmatched Uptime with Self-Healing Technology: Our patented HyperCore technology ensures application uptime through real-time problem identification, reduction, and correction. This translates to lower maintenance costs and a more reliable edge environment.

You can download a complimentary copy of the GigaOm Radar Report for Full-Stack Edge Deployments and learn more about how Scale Computing can help your business unlock the potential of the edge.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Distributed Systems Monitoring: the Four Golden Signals

What are the Four Golden Signs?

We recently published the IT Topic “IT System Monitoring: advanced solutions for total visibility and security”, in which we present how advanced solutions for IT system monitoring optimize performance, improve security and reduce alert noise with AI and machine learning. We also mentioned that there are four golden signals that IT systems monitoring should focus on. The term “golden signals” was introduced by Google in 2014 in its book Site Reliability Engineering: How Google Runs Production Systems,where Site Reliability Engineering (SRE) is a discipline used by IT and software engineering teams to proactively create and maintain more reliable services. The four golden signs are also defined:
  • Latency: This metric is the time that elapses between a system receiving a request and subsequently sending a response. You might think of it as a unique “average” latency metric, or perhaps an established “average” latency that can be used to guide SLAs. But, as a golden signal we want to observe the latency over a period of time, which can be displayed as a histogram of frequency distribution. For instance: This histogram shows the latency of 1000 requests made to a service with an expected response time of less than 80 milliseconds (ms). Each histogram section groups requests according to the amount of time they take to complete, from 0 ms to 150 ms in increments of five.
  • Traffic: It refers to the demand in the system. For example, a system might have an average of 100 requests HTTPS per second; but averages can be misleading. Average trends can be observed for problems or averages over time. Also, traffic may increase at certain times of the day (when people respond to an offer for a few hours or inquiries are made about stock prices at market close.
  • Errors: It refers to API error codes that indicate something is not working properly. The tracking of the total number of errors that take place and the percentage of failed requests allows you to compare the service with others. Google SREs extend this concept to include functional errors of incorrect data and slow responses.
  • Saturation: There is a saturation point for networks, disks, and memory where demand exceeds the performance limits of a service. You can do load testing to identify the saturation point, as well as restrictions, when a request failed first. A very common bad practice is to ignore saturation when there are load balancers and other automated scaling mechanisms. In poorly configured systems, inconsistent scaling and other factors can prevent load balancers from doing their job properly. For that reason, monitoring saturation helps teams identify issues before they become serious problems by taking proactive actions to prevent these incidents from happening again.

The Importance of the Four Golden Signals in Monitoring

The relevance of the four golden signals in IT systems monitoring lies in the feasible tracking on latency, traffic, errors and saturation of all services, in real time, providing the elements for IT teams to identify potential or ongoing issues more quickly. Also, with the single view of everyone’s status, the work of the team devoted to monitoring IT or third-party systems is streamlined. Instead of performing different monitoring for each function or service, monitoring metrics and records can be grouped into a single location. All of this helps to better manage issues and track the whole lifecycle of an event.

How to Implement the Four Golden Signals

The four golden signals are a way to help SRE teams focus on what’s important, so they don’t rely on a plethora of metrics and alarms that might be difficult to interpret. To implement them, follow these steps:
  • Define baselines and thresholds: Sets normal operating ranges or service level targets for each signal. SLO help identify anomalies and set up significant alerts. For example, you may set a latency threshold of 200 ms; if it is higher, an alert should be triggered.
  • Implement alerts: Set up alerts to receive notifications when signals exceed predefined thresholds, ensuring issues can be responded to promptly. Combination with AI streamlines alert and notification management and escalation.
  • Analyze trends: Review historical data periodically to understand trends and patterns, as well as gather information for proactive capacity planning and identifying areas of opportunity to optimize them. Advanced analytics and AI are valuable tools to give the correct reading to these analyses.
  • Automate responses: Try to automate responses to common problems so as not to overwhelm your IT team and so that they can also focus on more strategic tasks or incidents that really deserve attention. With AI, automatic scaling can be established to help manage traffic spikes.

Monitoring Tools Open Source or Commercial Solutions?

To choose a Monitoring tool, the question may arise as to which option is more convenient: an open source one or a commercial solution. The answer should not depend only on an economic question (whether or not to pay for resources), but also on taking into account that almost all IT products cannot do without open source, since they are constantly used and that is why we do not question their value. Of course, it should be borne in mind that, to use open source, you must choose monitoring solutions supported by professional and reliable monitoring, in addition to support for correct configuration. It is also important for the open source solution to be intuitive, to not represent a consumption of valuable time spent on configuration, adjustments, maintenance and updating tasks. Remember that agility and speed are required.

Importance of Golden Signals in Observability

Monitoring allows problems to be detected before they become critical, while observability is particularly useful for diagnosing problems and understanding the root cause. Golden signals enable site reliability engineering (SRE) to be implemented based on availability, performance, monitoring, and readiness to respond to incidents, improving overall system reliability and performance. Also, monitoring based on golden signals offers the observability elements to find out what is happening and what needs to be done about it. To achieve observability, metrics from different domains and environments must be gathered in one place, and then analyzed, compared, and interpreted.

The Golden Signals as Part of Full-Stack Observability

The full-stack observability refers to the ability to understand what is happening in a system at any time, monitoring system inputs and outputs, along with cross-domain correlations and dependency mapping. Golden signals help manage the complexities of multi-component monitoring, avoiding blind spots. It also links system behavior, performance, and health to user experience and business outcomes. Also, golden signals are integrated to the principles of SRE: Risk Acceptance, Service Level Objectives, Automation, Effort Reduction, and Distributed Systems Monitoring, combining software engineering and operations to build and execute large-scale, distributed, and high-availability systems. SRE practices also include the definition and measurement of reliability objectives, the design and implementation of observability, along with the definition, testing and execution of incident management processes. In advanced observability platforms, the golden signals provide the data to also improve financial management (costs, capital decisions by use of technologies, SLA compliance), security and risk prevention.

Conclusion

The digital nature of business has caused IT security strategists to face the complexity of multi-component monitoring. Golden signals provide the key indicators that apply to almost all types of systems. In addition, it is necessary to analyze and predict system performance, where observability is essential. In this regard, MELT (Metrics, Events, Logs, and Traces) is a framework with a comprehensive approach to observability, gaining insight into the health, performance, and performance of systems.

Pandora FMS: a Complete Solution for Monitoring the Four Golden Signals

Pandora FMS stands out as a complete solution for monitoring distributed systems and implementing the Four Golden Signals. Here we explain why.

1. Versatility and Flexibility Pandora FMS (Flexible Monitoring System) is known for its ability to adapt to different environments and business needs. Whether you’re managing a small on-premise infrastructure or a complex, large-scale distributed system, Pandora FMS can scale and adapt seamlessly.

2. Comprehensive Latency Monitoring Pandora FMS enables detailed latency monitoring at different levels, from application latency to network and database latency. It provides real-time alerts and intuitive dashboards that make it easy to identify bottlenecks and optimize performance.

3. Detailed Traffic Monitoring With Pandora FMS, you may monitor traffic in real time, getting a clear view of the volume of requests and transactions. This tool allows you to identify usage patterns, detect unexpected spikes, and plan capacity effectively.

4. Error Detection and Analysis Pandora FMS platform offers a strong feature for error detection, both application errors, network errors, such as packet loss, network interface errors and device errors through SNMP traps in real time or even failures in the infrastructure. Configurable alerts and detailed reports help teams respond quickly to critical issues, reducing downtime and improving system reliability.

5. Resource Saturation Monitoring Pandora FMS monitors key resource usage, such as CPU, memory, and storage, allowing administrators to anticipate and avoid saturation. This is vital to keep system performance and availability under control, especially during periods of high demand.

6. Integration with Existing Tools and Technologies Pandora FMS integrates easily with a wide range of existing tools and technologies, enabling easier deployment and greater interoperability. This flexibility makes it easy to consolidate all monitoring data into a centralized platform.

7. Custom Reports and Intuitive Dashboards The ability to generate custom reports and interactive dashboards allows IT teams to look at the status of their systems effectively. These features are essential for informed decision making and continuous service improvement.

8. Support and Active Community Pandora FMS has strong technical support and an active community that offers ongoing resources and support. This is crucial to ensure that any issues are quickly solved and that users can get the most out of the platform.

9. Cost-Effectiveness Unlike many commercial solutions, Pandora FMS offers excellent value for money, providing advanced features at a competitive cost. This makes it an attractive option for both small businesses and large corporations.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

How MSPs Can Secure Clients Against Massive Data Leaks: A Closer Look at the Recent 10 Billion Password Breach

Key Takeaways:

  • Importance of Cybersecurity for SMBs: Small to medium-sized businesses are particularly vulnerable to cyber-attacks and data leaks.
  • Role of MSPs: Managed Service Providers (MSPs) are crucial in fortifying cybersecurity defenses for their clients.
  • Guardz Solutions: Guardz offers comprehensive protection against data leaks through advanced monitoring and detection systems.

In a staggering cybersecurity breach, over 10 billion passwords were stolen and leaked, highlighting the critical need for enhanced data protection measures. This incident underscores the vulnerabilities that both large organizations and small to medium-sized businesses (SMBs) face in today’s digital landscape. Managed Service Providers (MSPs) play a pivotal role in safeguarding their clients against such breaches, ensuring robust security protocols are in place.

The Incident: What Happened?

In one of the largest data breaches recorded, cybercriminals have stolen and leaked a massive trove of passwords—over 10 billion of them—on the dark web. This colossal breach, reported by cybersecurity experts, is a stark reminder of the persistent and evolving threat of cyber-attacks.

RockYou2024

Using the BreachForums criminal underground forum, Cybernews researchers have uncovered the largest collection of stolen and leaked credentials ever discovered. This compilation, known as RockYou2024, contains an astonishing 9,948,575,739 unique passwords, all in plaintext format. The RockYou2024 credentials database adds approximately 1.5 billion new passwords to the earlier RockYou2021 database, which featured 8.4 billion passwords. A total of 4,000 large databases of stolen credentials, dating back at least two decades, are believed to be responsible for these passwords from 2021 through 2024.

What Do We Know About the Incident So Far?

  1. Scope and Scale:
    • The breach involved the theft and subsequent leaking of more than 10 billion passwords, affecting a vast number of online accounts globally.
    • This dataset includes passwords from multiple services, spanning years of cyber-attacks and data breaches.
  2. Sources of Compromised Data:
    • The leaked passwords appear to have been compiled from various data breaches over the years, indicating a collection effort by cybercriminals to amass a significant amount of compromised credentials.
  3. Method of Dissemination:
    • The stolen passwords were distributed on the dark web, making them accessible to other malicious actors and further increasing the risk of exploitation.

      4. Detection and Response:

  • Cybersecurity experts detected the upload and issued warnings to organizations and individuals to take immediate action.
  • Security professionals are urging users to change their passwords and enable multi-factor authentication (MFA) to protect their accounts.

The Impact on Businesses

The implications of this breach are far-reaching, particularly for businesses of all sizes. Here’s a closer look at the potential impact:

  1. Increased Risk of Account Takeovers:
    • With such a large number of passwords exposed, businesses are at heightened risk of account takeovers, where cybercriminals use stolen credentials to gain unauthorized access to company accounts.
  2. Data Privacy Concerns:
    • The exposure of passwords can lead to significant data privacy issues, especially if the compromised accounts contain sensitive customer information or proprietary business data.
  3. Financial and Reputational Damage:
    • The breach can result in substantial financial losses due to fraud, legal penalties, and the cost of remediation efforts.
    • Businesses may also suffer reputational damage, losing customer trust and potentially facing a decline in market position.
  4. Operational Disruption:
    • Responding to the breach and securing affected systems can cause significant operational disruptions, impacting productivity and business continuity.

The Crucial Role of MSPs in Data Protection

MSPs are essential in helping SMBs navigate the complex world of cybersecurity. With limited resources and expertise, many SMBs struggle to implement effective security measures on their own. MSPs provide the necessary support and solutions to protect sensitive data and prevent breaches. Here are several ways MSPs can enhance their clients’ cybersecurity:

  1. Regular Security Assessments: MSPs conduct comprehensive security audits to identify vulnerabilities and recommend appropriate measures.
  2. Proactive Monitoring: Continuous monitoring of networks and systems helps detect and mitigate threats before they cause significant damage.
  3. Incident Response Planning: MSPs assist in developing and implementing incident response plans to swiftly address any security breaches.

How Guardz Can Assist SMBs in Protecting Against Data Leaks

Guardz offers a suite of tools designed to help SMBs protect themselves from data leaks by identifying and mitigating potential weaknesses across various aspects of their digital presence.

Web Browsing Protection

  • Malicious Site Detection: Guardz helps prevent users from accessing malicious websites that could compromise their security.
  • Phishing Prevention: Advanced algorithms identify and block phishing attempts, protecting users from fraudulent schemes.

Email Security

  • Phishing Detection: Guardz’s email security solutions detect phishing attempts, ensuring that malicious emails are flagged and blocked.
  • Suspicious Mailbox Rules: Guardz monitors for suspicious mailbox rules that could indicate an attempt to leak private data.

Cloud Posture Management

  • Exposure Detection: Guardz identifies publicly exposed files in cloud storage, preventing unauthorized access to sensitive information.
  • Vulnerability Assessment: Regular assessments ensure that the cloud infrastructure is secure and free from vulnerabilities.

Cloud Data Protection

  • Public File Detection: Guardz’s tools scan for any publicly exposed files in cloud storage, ensuring they are secured and access is restricted.

Security Awareness and Phishing Simulation

  • Training Programs: Guardz offers training programs to educate employees on recognizing and responding to phishing attempts.
  • Simulation Exercises: Regular phishing simulations help employees stay vigilant and improve their ability to detect real threats.

External Footprint Management

  • Open Port Detection: Guardz scans for open ports that could be exploited by attackers, ensuring they are secured.
  • Vulnerability Scanning: Regular scans identify externally exposed vulnerabilities that could lead to data leaks.

Darknet Monitoring

  • Stolen Data Identification: Guardz monitors the darknet for any stolen credentials or data, alerting businesses if their information has been compromised.
  • Immediate Action: Upon detecting stolen data, Guardz helps businesses take immediate steps to mitigate the impact and secure their systems.

Practical Tips for Businesses on Password Health

In light of the recent breach, maintaining strong password hygiene is more important than ever. Here are some practical tips for businesses to ensure password health and security:

  1. Use Strong, Unique Passwords:
    • Encourage employees to create strong, unique passwords for each of their accounts. A combination of uppercase and lowercase letters, numbers, and special characters is recommended.
  2. Enable Multi-Factor Authentication (MFA):
    • Implement MFA for all accounts to add an extra layer of security. This requires users to provide two or more verification factors to gain access to an account.
  3. Regularly Update Passwords:
    • Set policies for regular password updates. This reduces the risk of long-term exposure if passwords are compromised.
  4. Educate Employees:
    • Conduct regular training sessions on the importance of password security and how to recognize phishing attempts and other cyber threats.
  5. Use a Password Manager:
    • Encourage the use of password managers to securely store and manage passwords. This helps in generating strong passwords and reduces the likelihood of password reuse.
  6. Monitor for Compromised Credentials:
    • Utilize services that monitor the dark web and other sources for compromised credentials. This allows for quick action if employee credentials are found to be compromised.
  7. Implement Account Lockout Mechanisms:
    • Set up account lockout mechanisms after a certain number of failed login attempts to prevent brute-force attacks.
  8. Implement a Data loss Prevention tool : 
    • Guardz connects to data in the cloud and secures several vectors of attack while exposing the risks of intentional and accidental data exfiltration.

Conclusion

The recent 10 billion password breach serves as a stark reminder of the ever-present threats in the digital world. For SMBs, partnering with an MSP and leveraging advanced security solutions like Guardz is crucial in protecting sensitive data and preventing costly breaches. By addressing vulnerabilities in web browsing, email security, cloud posture, and more, Guardz provides comprehensive protection that SMBs need to stay secure in an increasingly dangerous cyber landscape.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

24.6.3 Voyager released

Changes compared to 24.6.2

  • The Windows System Backup Protected Item is being deprecated. Windows System Backup Protected Items will still successfully backup, but will show a Warning notice on completion

New Features

  • Added support for granular restore from FAT32, EXT4, and XFS filesystems

Enhancements

  • Added support for Gen 1 VHD virtual disk for Hyper-V Protected Items when using the Hyper-V Latest VM State mode. VHD virtual disks will be stored in a VHDX format
  • Improved performance for granular restore of NTFS filesystems with complex or deep directory structures
  • Improved the speed of retention passes by using cached information to estimate the size of data that is in a Storage Vault
  • Improved Hyper-V Latest VM State (Changed Block Tracking) to respect the user’s configured Hyper-V checkpoint settings on a per-VM basis instead of always attempting to take Production checkpoints

Bug Fixes

  • Fixed an issue causing Comet to fail to provision Object Lock buckets when using an Impossible Cloud (Object Lock) storage template
  • Fixed an issue on the Comet Server web interface that showed the About this Cluster menu for admins who had the “Prevent viewing and editing server settings” policy permission applied
  • Fixed an issue with loading SSL certificates in Comet Server if a PFX file uses the SHA256 algorithm
  • Fixed an issue with loading SSL certificates in Comet Server if a PFX file orders private keys after certificates
  • Fixed an issue with not allowing “All items” for granular restore in the Comet Backup desktop app
  • Fixed an issue with the Syncro integration preventing backup job warnings and errors from being raised as an RMM Alert

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×