Skip to content

Richard Štefíček Is the New Chief Sales Officer of GREYCORTEX

January 10, 2024, Brno – GREYCORTEX, a leading Czech manufacturer of a cybersecurity network detection and response solution, strengthens its sales team. The new chief sales officer, Richard Štefíček, replaces Pavel Malíř Chmelař, who will continue to focus on the development of new markets.

Richard Štefíček (LinkedIn) started his career after graduating from Brno University of Technology as a sales manager at TR instruments. Subsequently, he gained business experience during more than 10 years at Flowmon Networks, where he worked his way up to the position of channel manager for Central and Eastern Europe.

Štefíček adds: I am thrilled to contribute to the further growth and development of GREYCORTEX as sales director. I believe that my experience and knowledge will bring new opportunities and help us to take GREYCORTEX even further. My main priority will always be the satisfaction of our customers and building strong partnerships.”

The previous CSO, Pavel Malíř Chmelař (LinkedIn), who has been with the company since its founding in 2016, will use his extensive product knowledge and experience in building the Czech and Polish channels to develop new markets and enable the company’s partner channel.

With the arrival of Richard Štefíček in the role of CSO, GREYCORTEX is clearly demonstrating its intention to grow and strengthen its position on the market. Together with all our colleagues, we look forward to the next era of business growth under his leadership,” concludes Petr Chaloupka, CEO of GREYCORTEX.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About GREYCORTEX
GREYCORTEX uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

MENDEL, GREYCORTEX’s network traffic analysis solution, helps corporations, governments, and the critical infrastructure sector protect their futures by detecting cyber threats to sensitive data, networks, trade secrets, and reputations, which other network security products miss.

MENDEL is based on 10 years of extensive academic research and is designed using the same technology which was successful in four US-based NIST Challenges.

The top three concerns plaguing the mind of VMware users in early 2024

The top three concerns plaguing the mind of VMware users in early 2024

As the new year unfolds, many VMware customers are facing uncertainty regarding the future of their IT environments and support networks. 

Based on discussions with current and previous VMWare customers and partners, I identified three major themes of concern right now in early 2024. In no particular order (but all of utmost importance), VMware users are worrying about: :

  • Future uncertainty
  • Universal licensing models
  • Costly maintenance.

Future uncertainty for VMware partners and customers

The acquisition of VMware by Broadcom has sparked widespread concerns within the industry, particularly regarding the latest news that Broadcom is to sell VMware’s EUC division to the highest bidder. They have also sent termination notices to VMware partners that are making below $500K in annual VMware revenue and taken top VMware accounts direct. This will have a significant impact on VMware customers, reducing the support they receive from partners and the channel alike.

The acquisition of VMware by Broadcom is a major development that has raised significant concerns in the tech industry. A key point of contention is Broadcom’s decision to sell VMware’s End-User Computing (EUC) division.

This move is seen as a strategic shift in the company’s focus, and it could have far-reaching implications for the EUC division’s future direction and performance.

Furthermore, the aforementioned decision to send termination notices to VMware partners generating less than $500K in annual revenue from VMware products is also raising alarm.

This action is likely to reshape the partner ecosystem, disproportionally affecting smaller partners. It raises questions about Broadcom’s long-term strategy for VMware and its commitment to a diverse and inclusive partner network.

For VMware customers, these developments could have serious repercussions. The reduction in the number of partners —especially smaller ones who might offer specialized or more personalized services —may limit the range of support options available to them. This reduced support might particularly impact those customers who rely heavily on these partners for technical support and customized solutions.

The overall situation highlights the challenges and uncertainties that can arise when a major player in the tech industry undergoes significant changes, especially in terms of mergers and acquisitions.

Universal licensing forces customers to make a choice

VMware customers who are exploring options like multi-cloud, hybrid environments, or transitioning to Azure Virtual Desktop face challenges stemming from complex licensing choices and software compatibility issues.

While VMware’s Universal Licensing provides support for hybrid configurations, it introduces additional costs, adding to the complexity and financial considerations for customers adapting to these advanced cloud solutions.

Expensive maintenance strains budgets and introduces security risks

The increasing costs associated with VMware’s licensing, combined with the necessity for specialized technical skills, significantly burden IT budgets. This financial strain can lead to challenges in adequately maintaining these systems.

Consequently, companies may face heightened security risks, as insufficient funding for proper upkeep could leave their VMware deployments vulnerable to threats and performance issues.

This situation underscores the importance of balancing cost management with the need for robust and secure IT infrastructure maintenance. To mitigate these apprehensions (and so much more), Parallels offers a promising solution in Parallels® RAS. It is a viable and potentially beneficial alternative for those seeking stability and efficiency in their IT operations.

What is Parallels RAS?

Parallels RAS is a flexible virtual application and desktop delivery solution that empowers organizations of all sizes to work securely from anywhere, on any device. The platform offers an agile, cloud-ready foundation and end-to-end security controlled by a centralized management console.

With Parallels RAS, you can leverage on-premises, hybrid, or public cloud deployments and integrate with existing technologies like Azure Virtual Desktop and Amazon EC2. With Parallels RAS, your organization gains the flexibility, scalability, and IT agility to quickly adapt to changing business needs.

Perhaps best of all, Parallels RAS offers a single, full-featured licensing model that includes 24/7 support and access to free training.

Parallels RAS: An excellent alternative for your VMware environment

Parallels was established in 1999 and has been a leader in the virtualization industry ever since, offering solutions for on-device, on-premises, and cloud platforms. Services include end-user computing, virtual client computing, and secure network access.

As a global leader in cross-platform solutions, Parallels enables millions of users to access applications and files on any device, anywhere, and at any time, enhancing flexibility and efficiency in technology use.

Parallels, with its expanding ecosystem and channel network, is well-positioned to support a broad range of customers, regardless of their size or industry. This growth in partnerships and distribution channels means that Parallels can cater to the diverse needs of individual users, small businesses, and large enterprises alike. Each customer segment benefits from tailored solutions that align with their specific requirements. This inclusive approach demonstrates the Parallels organization’s commitment to providing accessible, efficient, end-user computing, virtual client computing, and secure network access solutions.

By continuously expanding our ecosystem and strengthening our channel network, Parallels ensures that every customer, regardless of their size or technological needs, has access to the tools necessary for success in a rapidly advancing digital world.

“Prior to implementing Parallels RAS, our organization utilized Citrix Virtual Apps and Terminal Server (2012). We also looked at VMware Horizon, but the level of features offered by Parallels and the simplicity, ease of building it, and the fact we could implement the technology on our own encouraged us to proceed with Parallels RAS. We are very pleased to have chosen such a quality solution.”

-Neil Clarke, Infrastructure Lead, Platform Housing

No limits: The choice is yours for deployments and configurations

Parallels Remote Application Server (RAS) presents a comprehensive single-license model, equipped with a wide array of capabilities and features ready-to-use right out of the box. This versatility allows Parallels RAS to be effectively utilized in various environments and configurations.

In an on-premises setup, Parallels RAS can be implemented in either a single or multi-tenant configuration, catering to different organizational needs and sizes.

For organizations leaning towards cloud solutions, Parallels RAS offers full cloud experiences, deployable on public cloud Infrastructure as a Service (IaaS) platforms. This flexibility extends to multi-cloud deployments as well, all manageable from a unified console, streamlining the management process and enhancing operational efficiency. Further underscoring its adaptability, Parallels RAS supports hybrid configurations, combining any of these deployment options. This capability allows for a more tailored approach that can meet specific IT requirements and strategies.

Moreover, Parallels RAS seamlessly integrates with Microsoft Azure Virtual Desktop. This integration supports both single and multi-session deployments, enabling a more versatile virtual desktop experience. Additionally, Parallels RAS offers support for Amazon AWS EC2, which widens the scope and enables choice and flexibility, allowing organizations to select the cloud service that best fits their needs.

These features collectively ensure that Parallels RAS removes typical restrictions associated with deploying IT strategies, offering an adaptable, efficient, and comprehensive solution for various IT needs and preferences.

Streamline maintenance with Parallels RAS

Parallels is engineered to streamline management processes, enabling it to be effectively managed by a smaller team and within fewer hours. The built-in efficiency begins with its unified management console, which centralizes the deployment, configuration, and management tasks, even across multiple sites and cloud providers. This single console approach simplifies the complexities typically associated with managing diverse IT environments.

To further ease the administrative burden, Parallels RAS includes QuickStart Wizards. These wizards guide administrators step-by-step through various processes such as configuring Session Hosts, publishing applications, integrating with Azure Virtual Desktop (AVD), and setting up end-user connectivity.

Administrators can also manage FSLogix containers and settings entirely from this console, adding to the seamless experience. This intuitive guidance significantly reduces the time and effort required for configuration tasks.

Resource provisioning to users is another process built in to Parallels RAS. Administrators can consistently allocate resources via the same console, ensuring users have what they need for their tasks.

In addition to resource provisioning, the admin console facilitates secure access, load balancing, custom branding, and detailed reporting and monitoring. These features collectively contribute to a comprehensive management experience for IT departments.

The overall design of Parallels RAS, with its emphasis on a single-console management system, significantly simplifies the administrative experience. It offers a consistent and efficient way to deliver resources, especially in complex hybrid or multi-cloud scenarios. This design philosophy aligns with the goal of reducing the administrative workload while maintaining high efficiency and effectiveness in IT management.

“I would strongly recommend Parallels RAS because of its fast, flexible, and low maintenance deployment options, along with its granular security controls and overall ease of use for our end users. The HTML 5 client really eliminates all the headaches that came with the client support required of legacy VPN or VDI solutions.”

-Tyler Morgan, Chief Risk Officer, CISO Farmers & Merchants Bank

Discover why Parallels RAS is a great alternative to VMware — and try it free!

VMware users face uncertainty at the beginning of 2024 due to the Broadcom acquisition, plus the challenges of licensing complexities and high maintenance costs. Parallels RAS stands out as a strategic alternative.

The flexibility, ease of management, and comprehensive features of Parallels RAS offer a robust solution for businesses seeking efficient, secure, and cost-effective virtual application and desktop delivery.

Parallels RAS’s adaptability across various deployment models, coupled with its user-friendly management console and full feature set, position it as a compelling choice for organizations looking to navigate the evolving IT landscape with confidence and ease.

Become a Parallels Partner

Our mission is to empower businesses with seamless remote application and desktop delivery solutions. We provide a high-performance, secure, and user-friendly platform, enabling efficient access to applications and data from any device, anywhere. In these changing times, this mission becomes even more critical.

Here’s how we can help:

  • Tailored IT solutions: Access Virtualization and Secure Network Access (SNA) solutions for your customers.
  • 24/7 free IT support: Ensure a smooth transition to our solution with our round-the-clock support.
  • MDF program: Foster business growth through our Market Development Fund (MDF) program.
  • Free technical training: Enhance expertise with complimentary training and certifications.

Discover how you can become a Partner! Learn more.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Parallels 
Parallels® is a global leader in cross-platform solutions, enabling businesses and individuals to access and use the applications and files they need on any device or operating system. Parallels helps customers leverage the best technology available, whether it’s Windows, Linux, macOS, iOS, Android or the cloud.

The Zero Trust MSP advantage to unlock market potential

Managed Service Providers (MSPs) aim to boost their market share and client trust. When we compare specific elements of Zero-Trust solutions, like ZTNA vs VPN, we see that Zero Trust is generally more secure and effective. It’s becoming a key part of how MSPs work and serve their clients. Let’s examine the Zero-Trust framework and its impact on MSPs. 

Key takeaways

  • Zero Trust (ZT) operates on the idea that no one is trusted without ongoing checks and approvals.

  • Introducing ZT, MSPs face issues like customer hesitation, managing costs, and adapting to change.

  • The upsides, however, are significant, such as better security and more efficient work.

  • Before introducing ZT, ensure it fits your clients’ needs.

  • Trying out ZT with a few clients first can be a smart move.

Understanding Zero Trust

Zero Trust involves:

  • No assumed trust

  • Always denying access by default

  • Protecting data with tight controls

  • Specific, detailed access decisions

  • Constantly checking multiple cybersecurity factors

The Zero-Trust concept is a ‘never trust, always verify’ approach that checks all access requests, no matter where they come from.

Core components of the Zero Trust approach

Challenges for MSPs

Implementing Zero-Trust solutions can be tough. Challenges include:

  • Customers’ resistance to change. Moving from old tools to the Zero-Trust approach can be hard.

  • Cybersecurity knowledge gaps. Customers might not understand the benefits.

  • Overcoming misconceptions. It’s important to clear up any ZT myths.

  • Complexity of concepts. ZT should be made simple for users.

  • Proving effectiveness. MSPs need to show real benefits.

  • Cost concerns & ROI. Focus on long-term benefits, not just initial costs.

  • Change management. Adapting operations and training is key.

  • Compliance and regulatory issues. ZT must meet all standards.

  • Scaling solutions. Tailor Zero Trust for different organizations’ sizes and types.

  • Balancing security and user experience. Keep access strong but user-friendly.

Benefits of Zero Trust for MSPs

In this list, you’ll find advantages of Zero Trust as highlighted by the U.S. Cybersecurity & Infrastructure Security Agency, and we’ve also added a few of our own insights from NordLayer:

  • Increased productivity. Zero Trust makes MSPs more efficient, helping employees work better.

  • Enhanced user experience. Users get secure, easy access to resources.

  • Reduced IT costs. The Zero-Trust approach cuts down on the need for lots of hardware.

  • Flexible access. It allows secure access to resources from anywhere.

  • Suitable for many businesses. Zero Trust works for businesses of any size.

  • Building trust and growing market share. Zero Trust raises MSPs’ credibility and client base.

  • Compliance and regulatory benefits. Zero Trust helps meet data protection laws.

  • Standing out in the market. The Zero-Trust approach sets MSPs apart, attracting new customers.

  • Efficient operations. Zero Trust simplifies cybersecurity management.

How MSPs can implement Zero Trust

To decide whether to offer ZT, consider:

  1. Understand customers’ needs: Do they handle sensitive data or operate in regulated industries?

  2. Check market demand: Is there a growing interest in Zero-Trust solutions?

  3. Assess your capabilities: Can you manage ZT solutions?

  4. Complement existing services: Does ZT fit with your current offerings?

  5. Seek vendor partnerships: Look for reliable ZT solution providers.

  6. Weigh costs and benefits: Weigh the investment against potential returns.

  7. Educate clients: Be ready to explain ZT benefits to your customers.

  8. Try a pilot program: Test the ZT approach with a few customers first.

How NordLayer helps MSPs

NordLayer, with its standout features like network access management, internet security, compliance tools, and flexible solutions, is an ideal partner for MSPs adopting the Zero-Trust approach. Our partner program and zero-trust solutions are tailored to business needs.

With hybrid work and cloud use, ZT becomes vital. It boosts security, builds trust, and grows market share. With the right approach, MSPs can overcome ZT challenges and benefit greatly.

Starting with ZT for customers

  • Join the MSP partner program. It’s simple to get started.

  • Use the service management portal specifically crafted for MSPs. It’s a unified platform to manage client networks using a Zero-Trust strategy.

  • Generate revenue. Start earning more with your new tools.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Scale Computing and RackTop Systems Partner to Provide Cyberstorage Solution for Active Defense Against Cyber Threats

INDIANAPOLIS – January 16, 2024 — Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, and RackTop Systems, a leading and innovative provider of data security solutions in the cyberstorage market, today announced the availability of RackTop BrickStor Security Platform (SP) on Scale Computing Platform (SC//Platform). The solution offers comprehensive, real-time defense against live ransomware attacks, insider threats, and data breaches.

As cyber threats continue to evolve at an unprecedented pace, protecting sensitive data from cyber incidents is crucial for all businesses across all industries. The combination of BrickStor SP, a cutting-edge cybersecurity solution designed for cyberstorage, with Scale Computing’s robust hyperconverged and edge computing infrastructure, provides a powerful shield against these threats in real-time.

“Most successful business leaders today are always looking for innovative and secure ways to update their existing IT infrastructure. Traditional file servers are often complex to manage and have scalability limitations, as well as security gaps,” said Jeff Ready, CEO and co-founder of Scale Computing. “Scale Computing offers cutting-edge solutions to ensure that critical systems are protected, validated, tested, and ready for recovery anytime. Now, our integrated solution with RackTop provides organizations with the ability to further strengthen their cybersecurity posture, protecting valuable assets and sensitive information from today’s evolving cyber threats.”

BrickStor SP provides the ability to prevent data exfiltration from privileged and trusted users and to stop malware at the storage processor, while ensuring production data remains online and available to all uncompromised users. BrickStor SP can be deployed within Scale Computing HyperCore™ clusters, delivering reliable infrastructure consolidation. When deployed as a Virtual Appliance, additional capacity and physical resources can be added with minimal disruption to production environments.

“All organizations are looking to create cyber resilience and simplify the management of their infrastructure. Our joint solution extends the simplicity, scalability, and high availability to the customer’s data.” said Jonathan Halstuch, CTO and co-founder of RackTop. “With Scale Computing we can ensure our customer’s data is always available to meet the organization’s needs and protected from data theft and ransomware.”

Key benefits include:

  • Real-time threat detection: BrickStor SP offers real-time threat detection capabilities, identifying and neutralizing cyber threats the moment they emerge, ensuring immediate response to potential security breaches.
  • Behavioral analysis and machine learning: Leveraging advanced technologies such as machine learning and behavioral analysis, the platform accurately detects malicious activities and distinguishes them from legitimate user actions, reducing false positives and negatives.
  • Automated incident response: The platform automates incident response procedures, allowing for swift containment and mitigation of threats without manual intervention, minimizing the impact of cyber incidents.
  • Seamless integration: SC//Platform allows seamless integration of BrickStor SP, providing a stable and scalable infrastructure that supports the security solution’s robust functionality.
  • Faster time-to-value: SC//Platform brings simplicity, high availability, and scalability together for the data center, distributed enterprise, and edge computing, replacing the existing infrastructure for running VMs in a single, easy-to-manage platform.

To learn more about securing your organization against today’s digital threats with the powerful combination of BrickStor SP and SC//Platform, visit https://www.scalecomputing.com/racktop.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Finding Ivanti Connect Secure and Policy Secure Gateways with runZero

Today, January 10th, 2024, Ivanti disclosed two serious vulnerabilities in the Ivanti Connect Secure and Ivanti Policy Secure products.

The first issue, CVE-2023-46805, allows attackers to bypass authentication controls to access restricted resources without authentication. This vulnerability has a CVSS score of 8.2 out of 10, indicating a high degree of impact.

The second issue, CVE-2024-21887, allows attackers to inject arbitrary commands to be executed on the affected device. Attackers must be authenticated to exploit this vulnerability, but attackers may be able to use the authentication bypass vulnerability above to achieve this. This vulnerability has a CVSS score of 9.1 out of 10, indicating a critical vulnerability.

The vendor reports that there are indications that these vulnerabilities have been exploited in the wild.

What is the impact? #

Upon successful exploitation of these vulnerabilities, attackers can execute arbitrary commands on the vulnerable system. This includes the creation of new users, installation of additional modules or code, and, in general, system compromise.

Are updates or workarounds available? #

Ivanti has released an update to mitigate this issue. Users are urged to update as quickly as possible.

How do I find potentially vulnerable Ivanti devices with runZero? #

From the Services Inventory, use the following query to locate assets running the vulnerable products in your network that expose a web interface and which may need remediation or mitigation:

_asset.protocol:http AND protocol:http AND http.body:"welcome.cgi?p=logo"

Additional fingerprinting research is ongoing, and additional queries will be published as soon as possible.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×