Skip to content

Penta Security Wins Frost & Sullivan ‘2025 Frost & Sullivan’s Company of the Year Recognition’

Leading cybersecurity company Penta Security has been honored with the “The South Korea Web Application Firewall Industry” award by global market research and consulting firm Frost & Sullivan.

Penta Security 2025 Company of the Year

Each year, Frost & Sullivan recognizes companies that excel in technological innovation, customer satisfaction, market influence, and long-term strategic vision. Penta Security earned this distinction, 2025 Frost & Sullivan’s Company of the Year Recognition – The South Korea Web Application Firewall Industry, for its intelligent WAAP (Web Application and API Protection) solution, WAPPLES.

Frost & Sullivan highlighted Penta Security’s achievements, stating “Penta Security has been selected for its exceptional performance in technological innovation, strategic execution, and customer value creation. With years of proven expertise and advanced security technologies, Penta Security’s flagship WAAP solution, WAPPLES, has established itself as the standard in Korea’s web security landscape, delivering outstanding proactive protection capabilities.” as the reason for awarding 2025 Frost & Sullivan’s Company of the Year Recognition  – The South Korea Web Application Firewall Industry’.

Taejoon Jung, Director of the Planning Division at Penta Security, commented: “The success of WAPPLES, which has expanded across public, fintech, e-commerce, and cloud infrastructure sectors, reflects our relentless innovation to maintain market leadership while responding swiftly to customers’ evolving needs. Today, WAPPLES protects over 700,000 internet businesses and infrastructures in 171 countries worldwide. Moving forward, we remain dedicated to advancing R&D efforts to safeguard even more businesses across the globe.”

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Acumera Acquires Scale Computing, Expanding Edge Computing Leadership and Accelerating Innovation Across Distributed Enterprises and MSPs

Acumera logo

 

Combined Company Will Be Known as Scale Computing

AUSTIN, TX – July 31, 2025 – Acumera, a leading provider of secure edge connectivity, visibility, and computing solutions, today announced the acquisition of Scale Computing, a pioneer in hyperconverged infrastructure and edge virtualization. The acquisition strengthens Acumera’s position as a market leader in delivering fully integrated, scalable edge platforms for enterprises operating across distributed locations. The combined company will be known as Scale Computing.

The new company, which brings the secure managed edge and network capabilities of the AcuVigil™ Platform, the edge application orchestration and Point of Sale integration capabilities of the Acumera Reliant Platform and the highly available edge AI and virtualization platform of Scale Computing, to create the largest edge computing-focused software company in the industry, with the ability to serve customers worldwide ranging from one to 100,000 locations. The new Scale Computing will enable organizations of all sizes to confidently and securely deploy and manage AI workloads at the edge where real-time decision-making, low-latency processing, and operational simplicity are paramount.

“We believe Acumera and Scale Computing customers and partners will benefit from having the ability to leverage both the Scale Computing Platform and the Acumera SaaS solutions for edge computing, secure edge networking, managed network services, and PCI compliance for multi-site businesses. The newly combined company’s technology offerings are a significant step forward in our vision to empower organizations of all sizes with intelligent, AI-ready edge infrastructure that reduces complexity while enhancing performance and resilience,” said Bill Morrow, CEO of the new Scale Computing. “We are enthusiastic about this opportunity and together we will redefine what’s possible at the edge.”

The acquisition will accelerate innovation in key industries such as retail, hospitality, manufacturing, energy, and for Managed Service Providers, where scalable edge solutions are critical to managing distributed operations, reducing downtime, and delivering seamless customer experiences. Existing Acumera and Scale Computing customers and partners will benefit from enhanced product integration, broader support capabilities, and a unified roadmap for edge intelligence.

Nicholas Basso, Managing Director for Oaktree’s Global Opportunities strategy, notes: “We’re thrilled to see two innovators in edge computing coming together through Acumera’s acquisition of Scale Computing. This acquisition creates unmatched potential for the integrated team to deliver smarter, faster, and more efficient solutions at the edge, right where businesses need them most.”

Jeff Ready, Scale Computing’s former CEO and co-founder, agrees with both Basso and Morrow and adds: “Joining forces with Acumera marks an exciting new chapter for Scale Computing, our customers, our partners, and our team. The new Scale Computing will bring even more innovative and powerful solutions to our partners and customers.” Ready’s new title is President and Chief Marketing Officer (CMO).

About Acumera

Acumera is a leading provider of managed network security and edge computing solutions for distributed enterprises. Acumera’s platform delivers secure connectivity, centralized visibility, and real-time computing power to the edge of enterprise networks.

About Scale Computing

Scale Computing is a leader in edge computing, virtualization, and hyperconverged infrastructure. The Scale Computing Platform is designed to run applications efficiently at the edge or in the data center, delivering simplicity, scalability, and resilience for IT environments of all sizes.

About Oaktree

Oaktree is a leader among global investment managers specializing in alternative investments, with $203 billion in assets under management as of March 31, 2025. The firm emphasizes an opportunistic, value-oriented, and risk-controlled approach to investments in credit, equity, and real estate. The firm has more than 1,200 employees and offices in 25 cities worldwide. For additional information, please visit Oaktree’s website at https://www.oaktreecapital.com/. In 2024, funds managed by Oaktree Capital Management L.P. made a strategic investment in Acumera, to accelerate Acumera’s growth, expand its product portfolio, and strengthen its overall industry position.

TD Securities served as exclusive financial advisor and Dubois Bryant & Campbell served as legal counsel to Acumera. Guggenheim Securities served as exclusive financial advisor and Wilson Sonsini Goodrich & Rosati served as legal counsel to Scale Computing.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Identity Security Intelligence Part 4: Detecting and Responding to Identity Compromise at Speed

What to Expect in this Blog:

In Part 4 of the Identity Security Intelligence series, we shift from building defenses to active response. You’ll learn how to detect identity compromise early—before attackers escalate privileges or blend in as trusted users. We’ll cover real-world indicators of identity abuse, how to triage and contain threats with minimal business impact, and why identity-centric response playbooks are essential for modern security teams. Because when credentials are the new attack vector, speed and precision in response are your best defense.

In previous parts of this series, we laid the groundwork for modern identity defense:

  • Part 1 uncovered identities and privileges across complex environments.
  • Part 2 enforced least privilege through intelligent controls.
  • Part 3 showed how to audit and govern access for accountability and compliance.

Now, we shift focus from preparation to action.

Because no matter how well you discover, control, or govern, —identities will most likely be compromised.

And when they are, the speed and precision of your identity incident response will determine whether you contain the breach… or become the next headline.

The New Breach Attack Path: From Credential Theft to Full Compromise

Identity is now the adversary’s primary and top attack surface.

Attackers don’t need to drop malware if they can log in using stolen credentials.

The kill chain is no longer linear—it’s lateral and identity-based:

  1. Initial Access – Phishing, token theft, credential stuffing, or session hijacking
  2. Privilege Escalation – Abuse of misconfigured roles or overlooked entitlements
  3. Lateral Movement – Reuse of credentials, token impersonation, and cloud hopping
  4. Data Access & Exfiltration – With legitimate access and minimal detection
  5. Persistence – Creation of shadow admins or token misuse for future re-entry

By the time the SOC sees unusual behavior, the attacker may have already weaponized privileges, disabled MFA, or tampered with audit logs.

This demands a shift from reactive forensics to identity-first detection and response.

What Does Identity Compromise Look Like?

Identity compromise isn’t always obvious. It often appears as “normal” behavior executed by a legitimate identity, —but in the wrong context.

Here’s what defenders must watch for:

🔍 Behavioral Anomalies

  • Logins from  suspicious locations or cases of impossible travel
  • First-time access to sensitive systems or apps
  • Sudden privilege usage not seen historically

🛠️ Misuse of Privilege

  • Lateral movement via service accounts or shared credentials
  • Privilege escalation followed by sensitive actions (e.g., mailbox exports)
  • Admin role usage outside business hours

🔄 Token and Session Abuse

  • Reuse of session tokens from new devices or geos
  • Long-lived refresh tokens used across systems
  • OAuth token abuse in cloud environments

🧪 Signs of Persistence

  • New access grants to dormant accounts
  • Creation of new roles, keys, or service principals
  • Disabling of MFA or conditional access policies

You can’t detect this from login data alone. You need correlated identity intelligence (—privileges, entitlements, historical behavior, and audit context) —all tied together in near real time.

Identity-Centric Incident Response: The New Playbook

When an identity is compromised, speed matters. But speed without precision causes collateral damage.

Here’s how modern security teams respond using identity intelligence:

🧠 Step 1: Triage the Identity, Not Just the Alert

Instead of treating every alert as isolated, pivot to the identity in question:

  • Who owns it?
  • What can it do?
  • Where does it have access?
  • Has its behavior changed recently?

Use entitlement graphs and historical behavior to understand the potential blast radius.

🛑 Step 2: Contain Without Breaking the Business

Shutting down access is easy. Doing it surgically is the challenge.

Containment options include:

  • Temporarily disabling high-risk privileges (not the entire account)
  • Revoking OAuth or SAML tokens across federated systems
  • Suspending specific roles or group memberships
  • Forcing reauthentication with step-up MFA

This minimizes disruption while blocking the attacker’s movement.

🔁 Step 3: Trace the Incident Through Identity Audit Logs

Use your identity audit layer (from Part 3) to:

  • Identify what the attacker did post-compromise
  • Map lateral movement across systems
  • Determine whether data was accessed or exfiltrated
  • Reconstruct actions taken with elevated privileges

This moves you from assumptions to fact-based forensics.

🧼 Step 4: Remediate the Access Footprint

Once contained, clean up:

  • Remove suspicious roles, keys, and tokens
  • Reset secrets and credentials
  • Review group memberships and admin delegation
  • Verify no new identities or backdoors were created

Use historical privilege analysis to restore only what’s necessary, not everything the identity had before.

🔒 Step 5: Strengthen Controls and Update Detection Logic

Every incident is a learning opportunity. Post-incident, ask:

  • Were there missed signals in identity behavior?
  • Was privilege creep a factor?
  • Should access reviews be more frequent?
  • Can risky entitlements be removed permanently?

Update detection rules, access policies, and governance workflows to close the loop.

Identity Intelligence in Detection & Response Tools

The most effective incident response programs integrate identity signals directly into their tools:

  • SIEMs enriched with identity metadata (roles, entitlements, behavior baselines)
  • SOAR playbooks that automate token revocation, MFA enforcement, and role removal
  • UEBA tools that analyze deviations from normal identity usage
  • IAM/PAM platforms that trigger step-up auth or session recordings during high-risk activity

Response becomes not just fast, —but intelligent, contextual, and minimally invasive.

Don’t Wait for the Breach: Simulate It and Be Incident Response Ready

One of the most underused capabilities in identity security is attack path simulation:

  • Use tools to model how an attacker might move from a compromised identity to high-value assets.
  • Identify exposed privilege chains or risky access paths.
  • Test incident response plans using these simulated scenarios.

This lets teams respond in practice, not panic.

The Bottom Line

Identity compromise is inevitable. But uncontrolled blast radius is not.

Modern attackers exploit identity gaps faster than legacy detection tools can react. To defend effectively, you need more than logs and alerts—you need identity intelligence in every phase of your response.

By combining discovery, control, audit, and intelligent detection, security teams can:

  • Recognize identity compromise early.
  • Contain it precisely.
  • Investigate it accurately.
  • Remediate it thoroughly.
  • Evolve their defenses continuously.

Because in the new perimeter, the most dangerous breach isn’t the one with malware—it’s the one that looks like a trusted user… until it’s too late.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×