Skip to content

EasyVista Launches EV Pulse AI: Major Enhancements Elevating IT Service Management with Next-Level AI Capabilities

EasyVista, a global SaaS provider for comprehensive IT service management (ITSM), IT monitoring, Enterprise Service Management, and Remote Support, today announced the launch of EV Pulse AI, a transformative AI layer integrated into its flagship EasyVista Platform. These major enhancements to EasyVista’s AI capabilities, part of the Platform 2024.3 release scheduled for November 2024, represent a significant enrichment of EasyVista’s AI capabilities, offering organizations unprecedented power to simplify IT complexities, streamline operations, and accelerate digital transformation.  

Continue reading

Scale Computing Earns 2025 TrustRadius Buyer’s Choice Award From Happy Customers

Scale Computing Platform Recognized by its Customers for Best Capabilities, Best Value for Price, and Best Customer Relationship

INDIANAPOLIS – October 29, 2024 – Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced that TrustRadius has recognized Scale Computing Platform (SC//Platform) with a 2025 Buyer’s Choice Award.

Buyer’s Choice Awards are based entirely on vetted, unbiased customer reviews, and have been selected as having the best capabilities, value for price, and customer relationships.

During the evaluation process, reviewers are asked if products and their support teams live up to expectations, and would they buy the product again. These answers shape whether or not a product is chosen as best in the three key areas: capabilities, value for price, and customer relationship.

“Scale Computing Platform winning the TrustRadius Buyer’s Choice Award is a testament to their ability to simplify IT infrastructure for customers,” said Allyson Havener, SVP of Marketing and Community at TrustRadius. “This award, based entirely on vetted customer reviews, highlights how the platform empowers businesses with efficient, scalable solutions that reduce complexity and drive operational success.”

With a trScore of 9.6 out of 10, Scale Computing is recognized by customers and partners as a leader in hyperconverged infrastucture, virtualization, and edge computing. To learn more about what real users have to say about Scale Computing Platform, please visit the TrustRadius Scale Computing Platform review page.

SC//Platform brings together simplicity and scalability, replacing existing infrastructure and providing high availability for running workloads in a single, easy-to-manage platform. The zero-touch provisioning (ZTP) feature of Scale Computing//Fleet Manager (SC//Fleet Manager) provides cloud-like simplicity for administrators. It enables them to centrally configure clusters of edge computing infrastructure prior to nodes arriving on-premises, decreasing the deployment time of edge infrastructure by 90 percent or more.

Scale Computing Platform has replaced our previous environment which was a mixture of physical servers and a different, more complicated virtual environment. The previous environment was harder to use, and used quite a bit more energy, which once caused a power surge that forcefully powered down everything. Since switching to Scale Computing Platform, the environment is easy to use and manage, we have lower electricity costs, and any issues that have occurred were handled quickly and easily by support. We recently replaced our Scale Computing Platform cluster with a newer version, and the process was seamless.

— Technician in Information Technology at a Transportation/Trucking/Railroad Company

Scale Computing is focused on making the migration to SC//Platform simple for new customers. The company is offering an SC//Migrate Quickstart Service, including expert guidance and support to ensure a smooth and efficient migration process with minimal disruption and seamless integration with SC//HyperCore. In addition, Scale Computing is currently offering customers a promotion where they can transfer existing software licenses and exchange existing hardware through the Seamless Switch: Trade-Up to Scale Computing program.

“We are honored to be named a winner in the inaugural Buyer’s Choice Awards from TrustRadius,” said Jeff Ready, CEO and co-founder of Scale Computing. “We designed Scale Computing Platform with a focus on simplicity and ease of management, and patented self-healing technology that keeps downtime at bay. It cuts complexity, reduces costs, and frees up valuable IT resources. We’re proud to be recognized by TrustRadius as the buyer’s choice for businesses seeking powerful and user-friendly IT solutions, and to create products that inspire such positive feedback from real users. We are grateful for the genuine reviews that serve as a testament to the dedication we have to our customer community.”

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Covered: 4 Things to Look for When Choosing a Cyber Insurance Provider

Why You Need Cyber Insurance

Cyber insurance is no longer a “nice to have” commodity. Every SMB and enterprise must have cyber insurance. Besides the obvious reasons, it can also help remove the burden of a potential liability between a client, vendor, or third-party entity.

Most importantly, it can provide peace of mind in the event of a data breach.

Let’s pause for a moment here. No one likes to talk about data breaches until they have to disclose them publicly, but for many organizations, it’s a reality. If an attacker managed to gain unauthorized access and compromise systems or exfiltrate data, who’s to blame?

Hopefully, not you.

However, without proper cyber insurance coverage, your business might be fully liable for damages if your business data is compromised in any way. A long and painstaking process that can quickly deplete your budget in an instant. In this blog, we’ll highlight the importance of having cyber insurance and what to look for when choosing a provider.

The Financial Impact of Cyber Attacks and Ransomware

A recent survey revealed that 87% of global decision-makers said that their company is currently not adequately protected against cyber attacks. Cyber insurance helps ensure that businesses have a safety net in place to cover the financial repercussions of a security incident. It also helps organizations effectively address breaches, both in terms of financial and reputational damages.

Cyber insurance adds a security blanket to organizational risk management strategies, offering comprehensive coverage that extends beyond the immediate costs of a breach, but also in long-term support for recovery and compliance matters, which can be a very messy area.

Ransomware is a serious and expensive threat that many insurance providers do not cover. Sophos found that ransom payments have surged by 500% YoY to an average of $2M in 2023 alone. With ransomware attacks now taking on the form of AI, organizations will have to up their security and insurance game to avoid paying the hefty costs associated with these incidents.

The more pressing question is: Exactly how much of that $2 million is paid out of pocket?

This leads us to the important topic of what to look for when choosing a cyber insurance provider.

4 Things to Look for When Choosing a Cyber Insurance Provider

Incident Response Support: Every second counts after a breach or cyber incident has occurred. Does the policy include support for business continuity planning and disaster recovery? Does the insurer provide access to an incident response team and a crisis management team to guide you through the process? Check if the insurer offers credit monitoring services to help protect affected individuals from any further losses. Dedicated claim managers can also help streamline the entire process, from initial filing to final settlement. Get to know your team beforehand and make sure everyone is aligned with the direction. And last but not least, if you are covered for ransomware, who pays the ransom and waits for reimbursement? Is it you or the incident response team? Just something to keep in mind.

Claims Handling Process: Is the claim filing process a smooth and easy transition or do you have to wait weeks on end for an email or return call? Is the payout process transparent? Do you know how much your deductible is? What are you paying out of pocket, with one or multiple deductibles? Do your due diligence when it comes to this crucial step, particularly with payouts and response times. Businesses simply don’t have time to wait around and stop operations in the aftermath of a security incident. They need to focus their attention on immediate mitigation efforts. Understand how filing a claim might affect your future premiums or coverage. Some insurers might adjust premiums or terms based on claims history. Take the time to carefully review the fine print and details before submitting any claim.

Exclusions and Limitations: What’s included in the plan? Finding this out before you sign any contract is imperative. Make sure you thoroughly review the policy to understand any exclusions or limitations that could prevent you from signing on. Check for exclusions related to pre-existing vulnerabilities or ransomware payouts. Avoid any unpleasant surprises that can pop up later down the line, particularly in a potential breach lawsuit. You certainly don’t want to have to pay out of pocket for legal fees or regulatory fines that you assumed would be covered. Right?

Policies That Include Ransomware Coverage: According to the 2023 Ransomware Trends Report, 21% of organizations found out that ransomware is specifically excluded from their cyber insurance. Not exactly the type of coverage you should be seeking that will give you a good night’s sleep. However, it is not uncommon for insurance carriers to refuse ransom payouts for several reasons. The attack could have been preempted by the organization’s failure to maintain cybersecurity best practices, such as regularly updating and patching software, conducting routine phishing simulations, and implementing advanced security measures like intrusion detection systems. Don’t expect an insurer to provide you with ransomware coverage if you’re not up-to-date on security protocols and employee training either.

Another reason might be if a business failed to follow the insurer’s recommendations for risk mitigation. You can’t expect your insurance provider to hold up their end of the deal if you haven’t upheld yours.

Guardz Pro Tip: It’s important to check if there are any exclusions or caps on the amount that can be claimed for ransom payments.

And above all, make sure you go with a cyber insurance provider you can trust. One that will be there for you 24/7 in a crisis to help you recover and get business operations going.

Secure Your Digital Assets with Cyber Insurance from Guardz

Don’t wait until you’ve been hit with a breach to get cyber insurance coverage. Guardz enables businesses to secure optimal insurance coverage at the most competitive price. Every business is built differently. Guardz understands that and helps you get premium cyber insurance coverage tailored specifically to your business requirements. Whether you’re an SME or a Fortune 500, you must insure your digital assets to keep your operations running smoothly.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

New ransomware group Embargo uses toolkit that disables security solutions, ESET Research discovers

  • New ransomware group Embargo is developing and testing Rust-based tooling.
  • The threat actor is capable of disabling security solutions running on the victim’s machine.
  • Embargo tailors its tools to each victim’s environment.

PRAGUE, BRATISLAVAOctober 23, 2024 —ESET researchers have discovered new tooling leading to the deployment of Embargo ransomware. Embargo is a relatively new group in the ransomware scene, first observed by ESET in June 2024. The new toolkit consists of a loader and an endpoint detection and response killer (EDR), which ESET has named MDeployer and MS4Killer, respectively. MS4Killer is particularly noteworthy as it is custom-compiled for each victim’s environment, targeting only selected security solutions. The malware abuses Safe Mode and a vulnerable driver to disable the security products running on the victim’s machine. Both tools are written in Rust, the Embargo group’s language of choice for developing its ransomware.

Based on its modus operandi, Embargo seems to be a well-resourced group. It sets up its own infrastructure to communicate with victims. Moreover, the group pressures victims into paying by using double extortion: the operators exfiltrate victims’ sensitive data and threaten to publish it on a leak site, in addition to encrypting it. In an interview with an alleged group member, an Embargo representative mentioned a basic payout scheme for affiliates, suggesting that the group is providing RaaS (ransomware as a service). “Given the group’s sophistication, the existence of a typical leak site, and the group’s claims, we assume that Embargo indeed operates as a RaaS provider,” says ESET researcher Jan Holman, who analyzed the threat along with fellow researcher Tomáš Zvara.

Differences in deployed versions, bugs, and leftover artifacts suggest that these tools are under active development. Embargo is still in the process of building its brand and establishing itself as a prominent ransomware operator.

Developing custom loaders and EDR removal tools is a common tactic used by multiple ransomware groups. Besides the fact that MDeployer and MS4Killer were always observed deployed together, there are further connections between them. The strong ties between the tools suggest that both are developed by the same threat actor, and the active development of the toolkit suggests that the threat actor is proficient in Rust.

With MDeployer, the Embargo threat actor abuses Safe Mode to disable security solutions. MS4Killer is a typical defense evasion tool that terminates security product processes using the technique known as Bring Your Own Vulnerable Driver (BYOVD). In this technique, the threat actor abuses signed, vulnerable kernel drivers to gain kernel-level code execution. Ransomware affiliates often incorporate BYOVD tooling in their compromise chain to tamper with security solutions protecting the infrastructure being attacked. After disabling the security software, affiliates can run the ransomware payload without worrying whether their payload gets detected.

The main purpose of the Embargo toolkit is to secure the successful deployment of the ransomware payload by disabling the security solution in the victim’s infrastructure. Embargo puts a lot of effort into that, replicating the same functionality at different stages of the attack. “We have also observed the attackers’ ability to adjust their tools on the fly, during an active intrusion, for a particular security solution,” adds ESET researcher Tomáš Zvara.

For a more detailed analysis and technical breakdown of Embargo’s tools, check out the latest ESET Research blogpost “Embargo ransomware: Rock’n’Rust” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

Malware execution diagram

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How Unified Endpoint Management Supports Zero Trust Architecture

“Never trust, always verify.” It’s more than just a catchy phrase, it’s the core principle behind the Zero Trust security model.

But where threats constantly evolve, how can businesses ensure they’re truly following this mandate? Are traditional security methods enough to keep up with the complexities of digital frameworks? How do you ensure that every device, user, and access point in your network is secure?

Unified endpoint management (UEM) in Zero trust security
Implementing Zero-Trust with UEM
From mobile phones and laptops to IoT devices, each endpoint represents a potential vulnerability. As businesses adopt the Zero Trust model, Unified Endpoint Management (UEM) appears to be a key solution. It’s not just about managing devices, it’s about continuously verifying them, controlling access, and monitoring activity to prevent unauthorized access at every turn.

Let’s find out how UEM enforces the principle of “never trust, always verify” across all endpoints, ensuring that your network remains secure in a world where trust is a luxury no one can afford.

Understanding Zero Trust Architecture
Digital threats are rapidly evolving in sophistication, so relying on outdated security models that trust users and devices by default simply won’t cut it. Zero Trust flips this concept on its head, demanding rigorous checks at every level of access and interaction.

So, what exactly does Zero Trust entail? It’s about ensuring that every access request—whether from inside or outside the network—undergoes continuous verification. There’s no inherent trust based on a user’s location or device, instead, every request is treated with suspicion until proven otherwise. This means that even if a device or user is inside the corporate network, they’re not automatically granted access to all resources. Instead, access is tightly controlled and continuously validated.

Key principles of Zero Trust include:

Least Privilege Access: Users and devices are given the minimum level of access necessary to perform their functions. This reduces the risk of unauthorized access and limits the potential damage in case of a breach.
Micro-Segmentation: The network is divided into smaller, isolated segments, so even if one segment is compromised, the threat is contained and doesn’t spread across the entire network.
Continuous Monitoring: Regularly checking the health and behavior of users and devices helps detect anomalies and real-time potential threats, ensuring that any suspicious activity is addressed immediately.
With people accessing corporate resources from different locations and devices, the traditional security perimeter has all but disappeared. This shift requires a new approach to security.

Unified Endpoint Management: Beyond Device Management
UEM is an all-in-one toolkit that goes beyond the basic device management we’re used to. It’s about harmonizing and securing every device, application, and data within your business. While traditional device management might have focused solely on deploying and maintaining hardware, UEM takes a broader approach, integrating multiple aspects of IT management into a single platform.

UEM is a comprehensive solution that manages and regulates a diverse range of devices and applications. It unifies the management of mobile devices, desktops, applications, VR devices, wearables, rugged devices, digital screens, and IoT devices, all within a single platform. It’s designed to streamline the oversight of various endpoints, from smartphones and tablets to laptops and IoT devices.

But UEM doesn’t stop there; it also encompasses application management, identity management, and data security, providing a holistic view of your entire IT ecosystem.

The evolution of UEM is a testament to its growing importance. It began as Mobile Device Management (MDM), focusing on mobile devices and their security. As the IT sector evolved, so did MDM, transforming into UEM to address the complexities of managing a wider range of endpoints, ensuring that every endpoint remains secure, compliant, and optimized, regardless of where or how it’s used.

UEM and Zero Trust: The Perfect Synergy
When it comes to integrating security and management, UEM and Zero Trust are the duo that complement each other seamlessly. Many CXOs now recognize that pairing UEM with Zero Trust is essential for safeguarding their companies. Here’s how UEM supports and enhances the Zero Trust model, making it a powerful ally:

1. Enforcing the Principle of Least Privilege
Zero Trust is all about ensuring that users and devices have only the minimum level of access based on their level of responsibility. UEM plays an important role by meticulously managing and controlling access across all devices. It ensures that permissions are granted based on role, necessity, and context, so users get just enough access to do their job. This granular control minimizes potential risks and enforces the Zero Trust principle of least privilege effectively.

2. Continuous Monitoring and Threat Detection
In the Zero Trust model, constant vigilance is key. UEM’s robust monitoring capabilities align perfectly with this need. It continuously tracks user behavior and device health, looking out for any anomalies that could indicate a threat. This real-time oversight ensures that any suspicious activity is detected and addressed promptly, keeping your network secure from emerging threats.

Scalefusion UEM further enhances this approach by enabling overall centralized visibility, allowing organizations to monitor all endpoints from a single platform. This centralization streamlines threat detection and response, making it easier to identify potential vulnerabilities and take swift action to mitigate risks.

3. Identity and Access Management (IAM) Integration
Effective security requires tight integration between identity management and access controls. UEM enhances Zero Trust by working seamlessly with IAM solutions. This integration ensures that access permissions are managed consistently and securely across all endpoints, enforcing Zero Trust principles by validating every access request against strict identity and access controls. Solutions like Scalefusion OneIdP play a key role here by focusing on conditional access management, ensuring that users are granted access based on real-time conditions and policies, further strengthening the security framework.

4. Multi-Factor Authentication (MFA)
MFA is a critical component of Zero Trust, adding an extra layer of security to user authentication. UEM solutions enable the implementation of MFA, requiring users to provide multiple forms of verification —such as something they know (a password), something they have (a smartphone or security token), and something they are (biometric data like a fingerprint or facial recognition). By integrating MFA with UEM, these solutions streamline the enforcement of MFA policies, ensuring compliance and security across all endpoints.

5. Single Sign-On (SSO)
SSO simplifies user access by allowing individuals to log in to multiple applications with a single set of credentials, streamlining the login process and maximizing productivity.

Enterprises increasingly recognize the value of SSO for enhancing multi-application usage and centralizing user activity monitoring, which facilitates tracking resource utilization and identifying behavioral patterns. UEM solutions support SSO capabilities, improving user experience while reducing the risk of password-related vulnerabilities. This approach aligns seamlessly with Zero Trust principles by ensuring that access is managed efficiently and securely.

6. Automated Response and Remediation
One of the key challenges in maintaining the Zero Trust environment is quickly responding to potential threats and vulnerabilities. UEM enhances Zero Trust by automating response and remediation processes. For instance, when a device exhibits suspicious behavior or fails to meet compliance standards, UEM can automatically take remediation actions, such as isolating the device, blocking access, or initiating a security scan. This automation supports Zero Trust’s requirement for continuous monitoring and quick responses, ensuring potential threats are managed effectively.

Future Outlook: The Role of Automation in UEM and Zero Trust
1. Automation in Zero Trust Enforcement
Enforcing Zero Trust policies manually is increasingly impractical, especially for large-scale enterprises with numerous endpoints. Automation helps streamline and enhance the enforcement of Zero Trust principles. It allows for real-time compliance checks, automatic threat detection, and seamless policy application. By taking over routine tasks and monitoring, automation ensures that security measures are consistently applied, reducing human error and accelerating response times to potential threats.

2. Emerging Trends
Several key trends are shaping the future of UEM and Zero Trust. The integration of Internet of Things (IoT) devices is one such trend, as these devices become more prevalent in business environments. UEM solutions are evolving to include advanced capabilities for managing and securing a wide range of connected devices, such as smart thermostats in offices and connected medical devices in healthcare, ensuring only authorized access and continuous monitoring for compliance and anomalies.

Another notable trend is the shift toward edge computing. As data processing moves closer to the source of data generation, securing these edge environments is important. UEM will increasingly focus on extending Zero Trust principles to decentralized endpoints, ensuring comprehensive protection even in the most distributed IT environment.

UEM as the Backbone of the Zero Trust Architecture
UEM supports Zero Trust by ensuring continuous verification of every device, enforcing strict access controls, and maintaining constant monitoring. From automating threat responses to integrating identity management, UEM enhances the effectiveness of Zero Trust principles. By managing and securing all endpoints, Scalefusion UEM helps create a strong fortress around your digital environment, making it harder for threats to breach and move within your network.

Now is the time to assess your current security posture. It’s worth exploring how UEM in Zero Trust security can be a critical component of your strategy. With the right approach, you can walk through modern threats and complexities and secure your digital environment.

Scalefusion UEM, integrated with IAM, can help achieve this synergy seamlessly. By combining robust endpoint management with identity and access controls, Scalefusion enables you to implement Zero Trust principles efficiently, ensuring that every endpoint is continuously secured and compliant.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×