Skip to content

How to Use AI for On-Premises Infrastructure Management

Easily Deploy, Secure, Manage, and Maintain On-Premises Infrastructure with Scale Computing’s Autonomous Infrastructure Management Engine

Artificial intelligence for IT operations (AIOps) generally refers to a process that uses AI techniques to automate IT tasks and improve operational efficiency. AIOps can help provide IT teams with enhanced automated insights, streamline data and deliver predictive analytics, and provide a DevOps approach to managing core IT functions. Tech leaders today are constantly looking for ways to implement these simple, automated solutions that enable them to reliably save time and resources when it comes to their IT infrastructure.

Enter Scale Computing’s Autonomous Infrastructure Management Engine (AIME), the artificial intelligence orchestration and management functionality that powers Scale Computing HyperCore. Essentially, it’s an AIOps-driven platform designed to simplify the operation of IT infrastructure.

Today, we are seeing how AIOps is really becoming a requirement to support modern infrastructure. AIME drastically reduces the effort needed to deploy, secure, manage, and maintain on-premises infrastructure. A hand-built model of the environment in which the cluster is running, AIME is built like a digital twin — it models the reality that the cluster sits within, from what’s happening on the actual hardware and the cluster to the surrounding environment. As the management engine that powers SC//HyperCore, Scale Computing’s self-healing technology automatically corrects issues so users can avoid an IT crisis from occurring at just the wrong time. It allows users to keep systems up to date, and to repair failures as part of a regularly scheduled maintenance cycle. SC//HyperCore architecture provides scalable, accessible computing and storage while maintaining simplicity through automation and design.

The emergence of edge computing has brought applications closer to the people and things interacting with them, without sacrificing cloud-like ease of use, scalability, and availability. AIME monitors the system for security, hardware, and software errors, and remediates those errors where possible. We consistently hear from partners and customers that they need IT infrastructure solutions that are scalable, accessible, and easy-to-use, while maintaining simplicity. Scale Computing solutions meet those needs through innovation, automation, and simple design.

Scale Computing’s AIME functionality handles day-to-day administrative tasks and maintenance automatically. It identifies the root cause and minimizes the impact of issues it cannot automatically repair, notifying users with specific problem determination and action—including actions to secure the environment—rather than just sending a stream of data that must be interpreted. AIME also maintains current firmware, driver, and OS versions for enhanced security and stability.

Benefits of this automated infrastructure management include:

  • Minimized IT Support: AIME’s comprehensive monitoring, proactive problem detection, and automated remediation swiftly address issues and maintain system health without the need for constant manual intervention.
  • Eliminated Confusing Logs: Precise problem determination and actionable insights streamline troubleshooting, eliminating the need to decipher confusing logs and providing clear guidance on addressing issues.
  • Automated Remediation: By leveraging its understanding of the system’s state and conditions, AIME automates remediation tasks and swiftly addresses issues to minimize downtime.

CRN®, a brand of The Channel Company, recognized Scale Computing Autonomous Infrastructure Management Engine (AIME) as a finalist in the 2024 Product of the Year Awards in the Edge Computing/Internet of Things category.

To take a deeper dive into Scale Computing’s Autonomous Infrastructure Management Engine, watch Senior Solutions Architect Mike Lyons discuss AIME and AIOps at Platform//2024 on our YouTube channel. To learn more about how Scale Computing solutions can maximize your business, schedule a live demo today.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Thinfinity® Desktop Client: Secure ZTNA Access for Remote Desktop Users

Introduction

With work happening everywhere—from living rooms to offices—companies are rethinking how to secure access to their critical tools and data. Reliable, flexible solutions are now essential, ensuring that employees can connect safely to vital resources, no matter their location. As a Solution Engineer here at Cybele Software, I see firsthand how the Thinfinity Desktop Client addresses these needs. By combining Zero Trust Network Access (ZTNA) principles with an enhanced user experience, Thinfinity provides a modern, versatile approach to remote desktop access. In this article, I’ll show you how to maximize the capabilities of Thinfinity’s desktop client, comparing it to other common solutions like Windows Remote Desktop, VNC, SSH, and FTP clients, and examining key considerations for performance, security, and convenience.

Remote Desktop Access and ZTNA Security

Thinfinity Desktop Client delivers ZTNA access, offering businesses a secure alternative to traditional VPNs or standalone remote access protocols. By leveraging identity-based access controls, the client ensures only authenticated users gain access to specified resources, providing an advanced layer of security critical for modern organizations. This approach aligns with today’s Zero Trust principles, safeguarding both on-premises and cloud-based infrastructures from unauthorized access or cyber threats.

What is Thinfinity® Desktop Client? 

Thinfinity Desktop Client is a remote access solution built to support a variety of connection types, including Remote Desktop Protocol (RDP), Virtual Network Computing (VNC) & SSH. This versatility enables seamless access to remote desktops, applications, and file systems from nearly any device, without sacrificing security. Below, we answer essential questions and explore how the Thinfinity client stands out against traditional clients and apps, including Microsoft’s RDP client for Windows.

 

How to Use Thinfinity® Desktop Client for Windows Remote Desktop

The Thinfinity Desktop Client offers an intuitive interface for accessing Windows desktops, Virtual Applications, and VDI remotely. Here’s a quick guide on using Thinfinity with Windows RDP:

  1. Install Thinfinity Desktop Client: Simply download the client from the Cybele Software website and install it on your Windows device. Set the Thinfinity Workspace URL to start. No additional software is required on the remote machine, thanks to Thinfinity’s ZTNA-based configuration. For more detailed instructions, visit the relevant knowledge base article.
  2. Launch a Remote Desktop Session or Virtual Application: Use the Thinfinity client to initiate a remote desktop session, providing a seamless experience akin to using Microsoft’s native RDP client.

This process is straightforward, making Thinfinity ideal for users who want to extend secure remote desktop access across multiple devices without requiring extensive configuration.

Thinfinity® Desktop Client vs. Windows Remote Desktop App

When comparing the Thinfinity Desktop Client with the Windows Remote Desktop app, Thinfinity provides enhanced versatility and functionality. Here’s a comparison of the two:

  • Security: Thinfinity integrates ZTNA, unlike the traditional RDP app, which relies heavily on VPNs for secure access. ZTNA offers more precise control over access permissions, reducing risks associated with VPNs.
  • User Experience: Thinfinity’s client allows users to switch between protocols (RDP, VNC, SSH) within the same interface, unlike the Windows RDP app, which supports only RDP. Thinfinity also includes built-in options for file transfer without requiring an additional FTP client.
  • Printing Capabilities: Thinfinity Desktop Client features ThinPrint integration for seamless printing, avoiding the need to install third-party printing clients. This enables users to print documents from their remote desktop directly to their local printers, adding convenience.

Seamless Application Virtualization

Thinfinity Desktop Client also supports seamless application virtualization, allowing remote applications to run directly on users’ desktops as if they were installed locally. This capability provides a unified experience, where remote applications blend naturally into the user’s environment without the need for full desktop sessions. Users can launch applications hosted remotely and interact with them just like local software, enhancing productivity while maintaining centralized control and security over business-critical applications.

 

 

Exploring VNC Windows Client

Thinfinity also supports VNC protocol, a popular alternative to RDP for remote desktop access, especially for users seeking free options. VNC can be particularly useful when accessing non-Windows environments, offering a cross-platform solution. Thinfinity enhances the typical VNC client experience by adding ZTNA capabilities and integrating within a unified client interface, unlike standalone VNC clients which often lack such security-focused features.

 

SSH Windows Client: Thinfinity® & Putty

For SSH access, Thinfinity offers a significant advantage over traditional SSH clients like Putty. Thinfinity supports SSH within the same unified interface, enabling secure access to remote servers, file transfer, and command execution directly from the Thinfinity client. This integrated approach eliminates the need for standalone clients, providing a more efficient, ZTNA-secure method for accessing remote Linux or Unix servers.

Advantages Over Standalone SSH Clients

  • Unified Interface: Thinfinity combines SSH, RDP, and VNC in one platform, streamlining access.
  • ZTNA Security: Unlike standalone SSH clients, Thinfinity’s ZTNA security features limit SSH access to authenticated users only.
  • Multi-Device Support: Thinfinity supports remote access from any device, expanding beyond Putty’s PC-only environment.

FTP Windows Client Replacement: Secure File Transfers Without FTP

A standout feature of Thinfinity Desktop Client is its ability to transfer files securely without an FTP client. Traditional FTP Windows clients are often required to manage files between a local machine and a remote desktop. However, Thinfinity eliminates this need, allowing users to transfer files directly to and from remote desktops through a secure ZTNA tunnel. This approach not only simplifies the user experience but also enhances security by keeping file transfers within Thinfinity’s ZTNA-controlled environment.

Thinfinity’s ThinPrint Client for RDP and Local Printing

Printing from a remote desktop can be challenging, especially when relying on separate third-party printing clients. Thinfinity addresses this with integrated ThinPrint support. This feature allows users to print documents from the remote session to local printers without additional software, streamlining workflows and reducing administrative overhead. In contrast, traditional RDP clients often require additional ThinPrint clients or complex configurations to enable remote printing, adding time and complexity to the process.

Key Takeaways for Thinfinity Desktop Client Users

For organizations and IT teams looking for a unified solution that integrates RDP, VNC, SSH, and ThinPrint capabilities within a ZTNA-secure environment, Thinfinity Desktop Client is an optimal choice. Here are the main advantages:

  • ZTNA-Enhanced Security: By incorporating Zero Trust principles, Thinfinity enables secure, identity-based access across all supported protocols.
  • Multi-Protocol Support: Users can access Windows desktops, Linux servers, and other resources seamlessly within one platform.
  • Effortless File Transfers: Eliminate the need for separate FTP clients by managing file transfers securely within the Thinfinity environment.
  • Simplified Printing: Integrated ThinPrint technology removes the need for additional printing clients, ensuring local printing from remote sessions is straightforward.

Extending Thinfinity’s Clientless Experience

Building on Thinfinity’s traditionally clientless approach, the Thinfinity Desktop Client extends capabilities further by unifying access for both remote and local users under a secure, ZTNA-powered framework. This dual approach not only simplifies administration by centralizing access control but also enhances security by ensuring consistent policies across all user types. For organizations, this unified solution reduces the complexity associated with managing multiple access methods, enabling IT teams to streamline operations and bolster security across both on-premises and cloud environments.

Conclusion

Thinfinity Desktop Client positions itself as a versatile, secure alternative to traditional remote desktop solutions, enhancing remote desktop access with ZTNA security and multi-protocol support. By integrating RDP, VNC, SSH, and ThinPrint features, Thinfinity eliminates the need for multiple standalone clients, simplifying the user experience and securing remote access. With the traditional clientless experience well known in Thinfinity, the desktop client adds a different alternative, extending the possibilities for organizations to provide secure access to both remote and local users to its resources. For IT administrators and businesses looking to optimize their remote work environment, Thinfinity Desktop Client offers a comprehensive, future-ready solution.

About Cybele Software Inc.
We help organizations extend the life and value of their software. Whether they are looking to improve and empower remote work or turn their business-critical legacy apps into modern SaaS, our software enables customers to focus on what’s most important: expanding and evolving their business.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Effective Best Practices for IT Teams Managing Macs in Hybrid Work

Juggling while riding a bike is tough but not impossible. Just like that, managing Mac devices in a hybrid work environment is a hassle but possible.

IT teams know this struggle all too well. Keeping everything running smoothly can be quite the adventure with team members working from home, the office, or some coffee shop.

And hybrid work isn’t just a trend, it’s what people want. Did you know that 81% of workers around the world prefer a hybrid or fully remote setup?[1] That’s a huge number. Also, more companies are using Macs for their reliability and security. Apple’s Mac shipments have jumped by 20.8%.[2] This means IT teams have some serious challenges to face.

Managing Mac Devices
Understanding the Hybrid Work Model

So, how do you make sure every Mac is secure, updated, and ready to roll, no matter where your team is working from? Let’s explore some best practices that can help you manage Mac devices effectively.

Let’s get started and walk through these challenges together.

Understanding the Hybrid Work Model

To grasp how to effectively manage Mac devices in a hybrid work environment, we first need to understand what this hybrid work model really entails.

In a nutshell, it’s a blend of remote and in-office work. Employees have the flexibility to choose where they want to work, whether that’s at home, in a shared workspace, or back in the traditional office. This model has gained immense popularity because it caters to the needs of a diverse workforce.

But with great flexibility comes great responsibility. For IT teams, this means creating a seamless experience for users, ensuring that devices are secure, and providing the necessary support regardless of where the employee is located. It’s a balancing act that requires careful planning and effective technology solutions.

So, what strategies can help us thrive in this new way of working? Let’s dive into the best practices for managing Mac devices effectively.

Best Practices for Managing Mac Devices in a Hybrid Work Model

Grasp the Power of Unified Endpoint Management (UEM) Solutions

Unified Endpoint Management (UEM) is essential in a hybrid work environment as it allows IT teams to manage all devices from a single interface. This centralized approach simplifies administrative tasks such as device configuration, application management, and policy enforcement. By utilizing UEM, IT teams can ensure that all Mac devices are set up consistently, adhering to company standards.

This practice saves time and reduces the risk of errors, leading to a more efficient deployment process. Furthermore, UEM solutions enable remote management, allowing IT teams to push updates and resolve issues without needing physical access to devices, which is crucial for a dispersed workforce.

Magic in a Box: Experience Zero-Touch Enrollment

Zero-touch enrollment for Mac devices significantly streamlines the onboarding process, especially in a hybrid work environment. This feature enables IT teams to configure devices remotely, allowing employees to unbox and start using their Macs right away, without the need for extensive setup.

In a hybrid setting where employees may be working from various locations, this approach eliminates the need for IT to physically handle each device, reducing logistical challenges. With zero-touch enrollment, companies can ensure that every device comes pre-configured with the necessary apps and settings, delivering a seamless user experience that enhances productivity from day one.

Shield Your Assets: Enforce Ironclad Security Protocols

Implementing security protocols is crucial for protecting sensitive company data, especially in a hybrid work environment. Enforcing strong password policies requires employees to use complex passwords that are regularly updated, significantly minimizing the risk of unauthorized access. This practice is vital in a setting where employees are accessing company resources from various locations.

Disk encryption—like FileVault on Macs—secures data at rest, ensuring that even if a device is lost or stolen, the information remains protected. Further, utilizing VPNs for secure remote access creates encrypted connections, shielding data from potential threats while employees work from outside the office.

Together, these measures establish a comprehensive security posture that effectively mitigates risks, enabling organizations to confidently support their workforce in a hybrid model while safeguarding sensitive information.

Refresh and Revive: Regular Software and OS Updates

Regular software and operating system updates are essential for maintaining both the security and functionality of Mac devices, particularly in a hybrid work environment. Keeping systems updated ensures that all security patches are applied promptly, safeguarding against known vulnerabilities that cybercriminals could exploit. In a scenario where employees are working from various locations and networks, this vigilance becomes even more critical.

Automating the update process can significantly lighten the administrative burden on IT teams while ensuring that devices remain secure and current. This proactive approach allows IT to manage updates efficiently without interrupting employees’ workflows. Additionally, regular updates often introduce performance enhancements and new features, contributing to a better overall user experience.

Swift Support: Remote Troubleshooting for Macs

IT teams must be equipped with tools that enable them to diagnose and resolve issues without needing to be on-site.  macOS remote troubleshooting minimizes downtime for employees and streamlines support processes, ensuring that technical challenges don’t disrupt productivity.

Features such as remote desktop access empower IT to take control of a user’s device, troubleshoot problems directly, and provide real-time guidance. This capability is especially valuable when employees are dispersed across various locations, as it eliminates the delays associated with in-person support visits.

Track with Precision: Asset Management for Mac Devices

Maintaining an accurate inventory of all Mac devices is important for IT teams in a hybrid work environment, as it allows them to monitor device status, track locations, and manage software licenses efficiently. Implementing an asset management system enables organizations to clearly identify which devices are assigned to which employees, facilitating better support and maintenance practices.

This level of visibility is essential for ensuring compliance with software licensing requirements and minimizing the risk of penalties associated with unlicensed software usage. Regular inventory audits can reveal underutilized devices, providing valuable insights for strategic planning regarding upgrades or reallocations. By optimizing device usage, organizations can enhance resource allocation and ensure that all employees have the tools they need to be productive, regardless of their working location.

Your Safety Net: Crafting Backup and Recovery Solutions

Automated backup systems play an important role in ensuring that data is regularly saved, significantly minimizing the risk of data loss due to accidental deletions or hardware failures. By utilizing cloud-based backup solutions, organizations can streamline this process, allowing employees to easily access their backups from any location. This flexibility is beneficial in a hybrid work environment, where team members may work from various sites.

Additionally, implementing a comprehensive disaster recovery plan ensures that organizations can swiftly restore operations in the event of a data loss incident. This preparedness is essential for maintaining business continuity and minimizing downtime. By proactively managing backups and recovery processes, organizations safeguard their data and enhance employee confidence in their operational resilience, knowing that they are protected against potential data loss scenarios.

Compliance Made Easy: Steer the Regulatory Maze

Organizations must establish clear policies regarding data protection and device usage that align with regulations such as GDPR and HIPAA, especially in a hybrid work environment where employees may access sensitive data from various locations. Conducting regular compliance audits helps identify potential gaps and ensures that practices meet regulatory standards.

Educating employees about compliance requirements promotes a culture of security awareness and responsibility. By actively managing compliance, IT teams can mitigate risks and protect both the organization and its clients from potential legal issues, ensuring smooth operations across all working environments.

Crystal Clear Insights: Monitor Devices with Real-Time Analytics Tools

Monitoring Mac devices with real-time analytics tools enhances security and performance management in a hybrid work environment. These tools enable IT teams to track device usage patterns, identify potential security threats, and analyze performance metrics.

By setting up alerts for unusual activities—such as unauthorized access attempts—organizations can respond quickly to mitigate risks. Tracking performance metrics allows IT teams to ensure that devices are functioning optimally and identify any areas requiring attention.

Empower Your Hybrid Workforce with Scalefusion UEM Features

With Scalefusion UEM, IT teams can efficiently oversee all Mac devices from a single interface, ensuring consistent configuration and application management across the board. The zero-touch enrollment feature simplifies onboarding, allowing employees to start working with their Macs immediately without extensive setup, regardless of their location.

Scalefusion’s robust security features, including strong password policies, disk encryption with FileVault, and secure VPN access, provide a stronghold for sensitive data. Regular software and operating system updates can be automated, relieving the administrative burden on IT while keeping devices secure and up to date.

The platform’s remote troubleshooting capabilities empower IT teams to resolve issues swiftly, minimizing downtime for employees scattered across different locations. Scalefusion also facilitates seamless backup and recovery solutions, safeguarding critical data and ensuring business continuity.

Transform Mac Device Management in Hybrid Work Environments with Scalefusion UEM

Managing Mac devices in a hybrid work environment presents unique challenges that require innovative solutions. Scalefusion UEM can significantly enhance your approach by offering a comprehensive platform that streamlines  device management and bolsters security protocols. 

By integrating Scalefusion UEM into your hybrid work strategy, you can enhance productivity and create a more resilient and agile IT framework, ready to support your organizational needs.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scale Computing CEO Speaking at Microsoft Ignite 2024

Jeff Ready Addresses Redefining Virtualization for Midsize Companies to the Enterprise Edge

INDIANAPOLIS — NOVEMBER 19, 2024 — Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced that CEO and co-founder, Jeff Ready, is speaking at Microsoft Ignite in Chicago this week. Ready’s session, Redefining Virtualization With the Alternative VM Platform You Seek, is at 10:15am CST on Thursday, November 21, 2024. Microsoft Ignite welcomes customers, partners, and tech enthusiasts looking to learn more about Microsoft technology, with a focus on the integration of innovative AI solutions.

Broadcom’s VMware acquisition has prompted an increased demand for alternative virtualization solutions. Breakthroughs in artificial intelligence for IT operations (AIOps) and next-generation hyperconvergence can offer legacy VMware users of all sizes increased efficiencies at lower costs. As Scale Computing is the top-rated VMware alternative for end-users and channel partners, Ready will discuss industry changes and the ease of migrating to Scale Computing Platform (SC//Platform), which offers integrated high availability, disaster recovery, and remote management.

“We continue to see demand this year, from both partners and customers, for virtualization alternatives that are easy to use, offer enhanced features, and are cost-effective. Our award-winning SC//Platform enables organizations of any size to reduce the total cost of ownership by 40%, reduce downtime by up to 90%, and manage an entire infrastructure from a single pane of glass. I’m excited to discuss industry trends and share how Scale Computing is redefining the virtualization landscape at Microsoft Ignite this week,” said Jeff Ready, CEO and co-founder of Scale Computing.

Combining simplicity, high availability, and scalability in a powerful, unified solution, Scale Computing Platform enables IT leaders to efficiently manage infrastructure at the network’s edge. Businesses can leverage SC//Fleet Manager to centrally monitor and manage hundreds or thousands of distributed edge infrastructure deployments with few or no on-site IT personnel. Scale Computing is currently offering two promotions to further ease the transition from VMware to SC//Platform, including a 25% software and services discount for new customers through its VMware Rip & Replace offer, and a full system exchange trade-up plus no-cost coverage for the remaining VMware term with the Seamless Switch: Trade-Up to Scale Computing promotion.

To learn more about Scale Computing, visit the team this week at Microsoft Ignite at Technology Booth 327 or Partner Booth P4.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to find VMware vCenter assets on your network

Latest vCenter vulnerabilities

Broadcom has issued a security advisory for VMware vCenter that indicates that one of the two vulnerabilities disclosed on the 17th of September, 2024,  CVE-2024-38812, which was fully patched by October 21, is under active exploitation in the wild.

This vulnerability has a CVSS score of 9.8, which is considered highly critical.

What is the impact?

An attacker with remote access to a vulnerable system could send specially crafted requests that could trigger a heap-overflow and result in remote code execution or privilege escalation into root.

Are updates or workarounds available?

Broadcom has issued patches to resolve both vulnerabilities. Reference the Response Matrix section of the advisory for the appropriate fixed version to apply in your environment.

How to find potentially vulnerable systems with runZero

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

product:vCenter

 


CVE-2024-38812 and CVE-2024-33813 (September 2024)

Broadcom has issued a security advisory for two vulnerabilities that affect VMware vCenter, which exists in both VMware vSphere and VMware Cloud Foundation products.

  • CVE-2024-38812 is rated critical with CVSS score of 9.8, and potentially allows for remote code execution.
  • CVE-2024-38813 is rated high with CVSS score of 7.5, which can result in privilege escalation into root.

What is the impact?

An attacker with remote access to a vulnerable system could send specially crafted requests that could trigger a heap-overflow and result in remote code execution or privilege escalation into root.

Are updates or workarounds available?

Broadcom has issued patches to resolve both vulnerabilities. Reference the Response Matrix section of the advisory for the appropriate fixed version to apply in your environment.

How to find potentially vulnerable systems with runZero

From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

product:vCenter

 

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×