Skip to content

ESET WORLD 2024: CANALYS’ Alastair Edwards: Even in a cloud-based world, relationships still matter

We are in the middle of a major transformation of how companies go to market, but relationships remain key.

Given market uncertainties, changes in partnering, and the surge in subscription models, most companies are now considering partnership ecosystems as the key ingredient to survival and success, according to Alastair Edwards, chief analyst at Canalys, who spoke on the State of the Channel at the ESET WORLD 2024 conference

“Increasingly, vendors co-selling, co-marketing, co-developing, and co-delivering with partners are becoming more important to delivering joint value to the customer,” Mr. Edwards told ESET after the conference.

In the interview with ESET, Mr. Edwards described the current situation with emerging hyperscale cloud marketplaces, the challenges that cybersecurity partnerships face, and the role of AI in the evolving world of cybersecurity.

What role do partners play in the world of emerging hyperscaler cloud marketplaces where vendors can approach customers directly?

While the initial assumption was that hyperscaler marketplaces would cut out channel partners, in fact the opposite is true. Partners will have an increasingly important role in this sales motion, as customers procure a greater proportion of software and cybersecurity through the cloud marketplaces of AWS, Microsoft, and Google Cloud in particular. Customers are able to use their committed cloud spend with the hyperscalers to buy third-party products through the marketplaces, which can be very attractive when core IT budgets are under pressure. They can take advantage of consolidated monthly or annual billing for all their purchases, which simplifies the billing process.

But beyond the transactions, customers will rely more than ever on partners, particularly as they purchase more complex solutions through these marketplaces. A marketplace is ultimately just a catalog of products and solutions. But end-customers need advice on the right technologies to buy, support for those technologies, integration, and management, which only trusted partners can provide. At the same time, vendors selling through these marketplaces continue to need partners to provide customer support, technical expertise, and complex services.

What do these marketplaces mean for vendor-partner-customer relationships?

These models create new dynamics for vendors, partners, and customers. But relationships remain key. Hyperscalers and vendors have recognized the importance of enabling partners to continue supporting customers directly, for example, through offering customized listings to customers through the marketplaces. The hyperscalers are investing in co-selling with both partners and vendors to drive momentum. There is a risk to the channel of course — those channel partners that don’t embrace this model will find themselves being overtaken by those that do. Even those that embrace this will need to continue showing value — and that value will change in future. But Canalys expects the share of hyperscaler marketplace business via channel partners to increase significantly over the next few years.

When preparing the latest Canalys Global Cybersecurity Leadership Matrix, Canalys worked with Channel Partner feedback collected over 12 months. What are the key lessons to take from it?

ESET’s Partners are generally very positive about their relationship with ESET and the support they receive. They are particularly positive about ESET’s ongoing commitment to partners (and channel-led strategy), ease of doing business, the quality of account management and technical support, and ESET’s ability to plan centrally and execute locally. This is why ESET achieved Champion status in this year’s global Cybersecurity Leadership Matrix report.

Based on this feedback, channel partners seek to prioritize relationships with vendors that align with the transformation in their business models and vendors offering products that partners can wrap their own services and solutions around. What does it mean for security vendors? What should they prioritize to create and maintain long-term relationships with partners?

In some ways, the same things apply to building long-term partner relationships: minimizing sales conflict, investing in partner profitability through effective partner programs, building trusted relationships between vendors and partners, and equipping partners with the skills to sell and support the vendor’s technologies.

But in addition to this, vendors must build greater flexibility into their programs and engagement strategies to support an increasingly diverse partner base and partners operating multiple business models, whether those are resell, managed services, consulting, development, etc. Increasingly, vendors co-selling, co-marketing, co-developing, and co-delivering with partners are becoming more important to delivering joint value to the customer. And recognizing customers will work with multiple partners throughout their technology life cycles — and that most partners lack the resources to specialize in every area — vendors must support effective collaboration between partners.

How important is it for cybersecurity vendors to bring innovations such as AI-powered services?

Of course, this is incredibly important. AI is moving to the center of a new cyber arms race between bad actors — cybercriminals that are weaponizing AI to launch more effective attacks — and the cybersecurity industry that is using AI to enhance cyberdefenses, augment existing capabilities, and improve predictions and remediation times. Vendors must be at the forefront of this race or risk falling behind. Canalys expects AI to usher in a whole new suite of advanced cybersecurity technologies. Channel partners and customers will choose to work with vendors that are staying ahead of a rapidly evolving landscape. At the same time, there is a danger that AI becomes overused in terms of vendor product launches and marketing, which will damage credibility and add to customer confusion when most are unclear about the value of AI. Avoiding this risk is critical to long-term success.

On the other hand, there are still some people who see cybersecurity as one single product, such as antivirus, and are surprised when they get a question about how many endpoints they have and what their network looks like. How to earn the trust of such potential partners and show them that cybersecurity is a much more complex topic?   

Many customers still don’t place enough strategic importance on cybersecurity, and these customers are most likely to only think of one product, like antivirus. But they are also the most vulnerable. Cyber resilience needs to become a business hygiene factor, not a nice-to-have. Government regulations will play a bigger role in forcing that. The reality is that building effective cyber resilience as a customer means addressing a plethora of new threats and an expanded surface area that needs to be protected. For companies that understand this, the biggest challenge they face is managing an exponential increase in cybersecurity complexity. One way to do this is to work with a single managed services partner who takes on the management of this complexity on behalf of the customer. MSPs are seeing the fastest growth in the market as a result.

What are the benefits of having a long-term relationship with a leading cybersecurity vendor such as ESET?

Maintaining a long-term vendor relationship is important to ensuring consistency but also efficiency, in terms of the cost and complexity of managing that relationship … partners and customers don’t have to constantly retrain on different vendors’ products and processes, for example. But while there is a growing trend toward ‘platformization’ in the cybersecurity industry (concentrated around a few big cybersecurity vendors), the reality is that no vendor can do everything effectively in security. So, integration with other (specialist) vendors also becomes key to success.

According to Canalys, many partners rank visibility and community involvement highest of their criteria for vendor partnership — even higher than product or pricing. Why is that so?

We are in an ecosystem-led world, in which partners differentiate through specialist skills, customer focus, and business model. Vendors who empower partners within a broader ecosystem, who promote their partners’ skills, and drive collaboration between partners will provide more value to partners than those that just focus on product or pricing.

In the current world when almost everything is cloud-based or XaaS, is it still important for vendors to maintain local offices providing support to their partners?

Yes, local support will remain key. Even in a cloud-based world, relationships still matter. Cloud and AI can be used to augment those relationships and improve efficiency and productivity. But this is a highly competitive world, and those vendors who see the cloud as a way to step away from their partner relationships will suffer from a loss of relevance and share.

Currently companies and their IT admins are battling alert and portal fatigue. How important is it for cybersecurity vendors to help their partners with simplifying alert management and what are the current trends? 

Extremely important. Customers are struggling to stay on top of the scale of cyber threats and the speed with which they emerge. Finding and retaining the skilled staff to do this is a constant struggle. One of the biggest trends in the market is the role of MSPs in managing that on behalf of customers. Vendors who empower their MSPs with tools like simplified alert management or use AI to automate certain low-level support functions will benefit (through enhanced chatbots, etc.) and ultimately this should enable them to deliver a higher level of support for their customers.

Is the pricing/billing system an important consideration in a partnership? What are the current trends? Do customers favor flexible daily billing or flat rates with long-term commitment?

With the shift to subscriptions, the biggest demands from customers in terms of billing and pricing are simplicity and predictability, when the complexity of managing multiple vendor subscriptions is increasing, with different start and end points, contract lengths, and billing models. This can make it extremely difficult to manage budgets, spending, and planning. Customers as much as possible want partners to help them eliminate that complexity. At the same time, they want flexibility to consume and pay in the way that aligns with their business models. The most successful cybersecurity vendors will help to simplify these models for customers and provide this flexibility to meet the needs of different customers.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

How WeTransfer upgraded existing VPN to a cloud-native solution for enhanced security application and experience

In the bustling canals of Amsterdam, a vibrant Dutch company, WeTransfer, emerged in 2009, becoming a haven for creatives worldwide. Known for its ingenious solutions to share large files easily and collaborate with teams, the WeTransfer platform not only caters to creative minds seeking a hassle-free way to distribute their work but also integrates an advertising model that transforms time spent on the site into a visual feast.

Profile of WeTransfer

WeTransfer takes a unique approach in having a viral product complemented by a full-screen advertising space used by hundreds of major brands around the world. The platform supports creative professionals, as well as creative communities facing the world’s most pressing issues.

As a platform serving tens of millions of people around the world, cybersecurity and operational efficiency are top priorities.

In this interview, Director Enterprise IT Adam O’Toole shares why and how WeTransfer embarked on using NordLayer.

The challenge 

Legacy VPN and the need for reliability

Key pain points

VPN is used at WeTransfer not only for the engineering team to connect to several development APIs. It’s also necessary to validate global ad displays in over 130 countries. Ensuring continuity demanded a more flexible and robust solution.

“Moving to a new HQ, we were faced with a fresh challenge: our VPN was physically hosted on-site so our engineering teams could connect to systems that were inside our network. We needed a cloud alternative for changing places”

Click to tweet

The impending office move only accelerated the search for a cloud-based VPN that could offer uninterrupted service and global reach.

The solution

Strategic transition to a hassle-free tool

Main criteria choosing the solution

At WeTransfer, the team used two VPNs in total. One was dedicated to product development in the engineering department. The other was established due to a hybrid work model for remote employees to connect to the network and ad team for localization.

NordLayer stood out for several reasons. First, it’s a fully cloud-native solution. Also, it provides an extensive network of global gateways and static IP addresses, which is excellent for a global company like WeTransfer, present in different countries.

“Our ISO certification demands rigorous checks and balances, a standard that NordLayer meets with its comprehensive access policies, ensuring every connection is secure and aligned with our high standards.”

Click to tweet

What is more, it seamlessly integrates with the company’s security framework. And finally, it ensures compliance, a requirement for WeTransfer to follow ISO 27001 standards.

“We are a small team supporting a company of 340+. We need our tools to work for us, not against us. With automation, we’ve been able to spend less time on manual tasks and more on what matters, proving that a lean team can go a long way.”

Click to tweet

The transition marked a pivotal shift towards a cloud-based model, offering a seamless, maintenance-free experience that contrasted with the upkeep of the previous system.

Why choose NordLayer

The journey to NordLayer began with a collaborative effort to understand the specific needs across departments.

  1. We gathered a list of different departments to see how they use a VPN.

  2. The survey format helped us understand the needs and the demand for a VPN tool.

  3. We crystalized the use cases and how many gateways we needed.

  4. Some of the criteria were simple integration into the infrastructure, hassle-free usage, and static IP setup.

  5. Simplicity in using and maintaining the tool was equally important to security.

The integration with the existing security framework simplified access control, ensuring a smooth onboarding and offboarding process that resonated with the company’s lean IT team ethos.

“Okta integration was a big push from a security perspective for us to have better access control and automation when people come and leave.”

Click to tweet

With the Okta integration supported by NordLayer, the company can leverage stronger authentication mechanisms. Biometric authentication via Okta FastPass provides an additional level of security, allowing it to better protect against common attacks.

The intuitive dashboard and the provision for fixed IP addresses further streamlined operations, making NordLayer an obvious choice.

Rethinking the VPN strategy when transitioning to a cloud-based tool from a physical VPN

Legacy VPN vs Cloud VPN

NordLayer’s appeal lies in its ability to meet the company’s unique demands. Its vast network of gateways enabled the advertising team to accurately preview campaigns across different regions, a critical feature for a global player in the advertising space.

The outcome

Seamless operations and enhanced productivity

The benefits of implementing NordLayer

The switch to NordLayer translated into tangible benefits. The IT team was liberated from the monthly maintenance rituals that had previously hindered productivity and could focus on strategic initiatives.

“With NordLayer, it’s simple: if you’re in, you get access; if you’re out, you lose it. The dashboard is clear, making setup quick and getting results easy.”

Click to tweet

Thanks to NordLayer’s dedicated gateways, WeTransfer improved developer experience for engineers located outside of the Netherlands, with quicker feedback loops during development cycles.

Pro cybersecurity tips

Cybersecurity hygiene is very personal yet important to follow, just as taking care of yourself. It can be achieved differently but for the same result—secure digital environments. This interview was no exception to asking how IT professionals prioritize cybersecurity in their daily lives. Thus,  Adam O’Toole, Director Enterprise IT at WeTransfer, shares his favorite and most important tips on what matters first.

Adam O'Toole, Director Enterprise IT, WeTransfer, about cybersecurity

WeTransfer adoption of NordLayer showcases how cybersecurity posture was improved by underscoring the importance of adaptability, collaboration, and strategic tool selection in the digital age.

The journey from a physical VPN system to a streamlined, cloud-based solution not only enhanced operational efficiency but also fortified the company’s cybersecurity defenses. As a result, the company can continue its mission of supporting the global creative community with trust and confidence.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

What’s New? Quarterly Release 24.5 Enceladus

Written by Callum Sinclair – Product Engineering Manager.

This article covers what’s new in our latest Quarterly release series from March 2024 to May 2024. Read the release notes here.

Comet 24.5.0 Enceladus

We’re very pleased to announce our latest Quarterly release series – Comet 24.5 Enceladus. This is the the latest entry in our quarterly rollup series, that branches off from our main rolling Voyager development into a fixed target for you to qualify and build your service offering upon.

Enceladus is a moon of Saturn and is named after the giant Enceladus of Greek mythology. There are a few worlds that are thought to have liquid water oceans beneath their frozen shell, but Enceladus sprays its ocean out into space where spacecraft can sample it. From these samples, scientists have determined that Enceladus has most of the chemical ingredients needed for life, and likely has hydrothermal vents releasing hot, mineral-rich water into its ocean. Enceladus is about as wide as Arizona, and it also has the most reflective surface in our solar system. Because it reflects so much sunlight, the surface temperature is extremely cold, about minus 330 degrees Fahrenheit (minus 201 degrees Celsius).

For users coming from the previous 24.2 Mimas quarterly release series, Enceladus adds 6 new features and 38 enhancements. Some of the new features we are excited about are:

  • Hyper-V Changed Block Tracking (CBT) support
  • Impossible Cloud Storage Templates
  • SMB Storage Vaults
  • Comet Backup desktop app Protected Item wizard refresh
  • Syncro integration
  • Server Self Backup enabled by default

The full set of changes can be found in the release notes.

Webinar announcement

If you’d prefer to watch rather than read, we’re hosting a webinar to discuss this new quarterly release and all the new changes. Please register before we go live on Tuesday 11 June (4pm EDT / 1pm PDT) to catch up on all the latest Comet news with Comet’s CTO, Mason – and as usual, there will be time for a live question-and-answer session at the end of the presentation.

As well as that, we have many more videos available on our YouTube channel, including guides on getting started with Comet, individual features, demonstrations with our technology partners, and webinars for previous quarterly software releases.

Microsoft Office 365 Protected Item Performance Improvements

Over this month, we have made significant improvements to the backup performance of our Microsoft Office 365 Protected Item. These performance improvements mean the backup job completes faster, as well as reduces the amount of data we need to upload. We expect partners to see Microsoft Office 365 Protected Items finish up to 30 times faster.

Disk Image Drive Letter Selection

When configuring a Disk Image Protected Item in the Comet Server web interface, it can be difficult to configure when the device is not currently connected to the Comet Server. To help partners configure a Disk Image Protected Item more easily, we have added a new option to select disks to protect by drive letter.

Bulk Upgrade CPU Limits

Our Bulk Upgrade feature is a great way to keep Comet Backup desktop app installs up to date with the latest version that the Comet Server is running. However, for Comet Servers with many tenants using custom branding, a Bulk Upgrade campaign to upgrade older clients consumed significant CPU time building new client installers quickly.

In Comet 24.3.8 we added a new configuration option to limit the maximum number of CPU cores Comet can use during a Bulk Upgrade campaign. This is a fantastic improvement as it reduces the burden on system resources during a Comet Server upgrade. It also provides a more robust Bulk Upgrade campaign, as Comet Backup desktop app installs can be upgraded without overwhelming the Comet Server’s resources. For more information, you can check out our documentation here.

Windows System Backup Protected Item – Deprecation Notice

Our Windows System Backup Protected Item is being deprecated. Before we added our Disk Image Protected Item, Windows System Backup Protected Item was a great way to backup and restore entire Windows disks. However, it required spool space (temporary storage) to be able to perform this backup. This means for a 500GB disk, Comet requires an additional 500GB of free space for this Protected Item to work.

Because of this limitation, and how difficult it is to setup, we have always recommended partners use our Disk Image Protected Item. To assist partners through this change, we have built a Windows System Backup to Disk Image conversion tool. For more information, you can see our documentation on the tool here.

We will be removing this Protected Item in November (Comet Release 24.11).

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Comet
We are a team of dedicated professionals committed to developing reliable and secure backup solutions for MSP’s, Businesses and IT professionals. With over 10 years of experience in the industry, we understand the importance of having a reliable backup solution in place to protect your valuable data. That’s why we’ve developed a comprehensive suite of backup solutions that are easy to use, scalable and highly secure.

ESET WORLD 2024: Building a proactive defense strategy featuring Forrester’s Madelein van der Hout

Threat actors are developing new tools, phishing is getting more sophisticated, and AI is finally here. Organizations need to adapt and be proactive. 

When you think about cybersecurity, it shares many similarities with strategic board games such as Risk, where players try to conquer enemies’ territories. To win, good players define their strategic assets, anticipate opponents’ moves, and create safe areas with limited access that allow further expansion.

The same can be said about companies and institutions trying to survive and thrive in the world of fast-evolving cyber threats, according to guest speaker Madelein van der Hout, a senior analyst from Forrester, a leading global market research company.

“Winning is everything. If you end up being second, you are actually being the first of the losers,” said Mrs. van der Hout during her presentation, hinting at potentially menacing outcomes of a data breach in a real-world scenario.

Using the popular game Risk as a metaphor for the cyber threat landscape, Mrs. van der Hout presented her insights into building a prevention-first approach in cybersecurity at the ESET WORLD 24 conference. After her session, she also kindly answered a few of ESET’s questions.

Strategic assets

Considering the current level of automation, cloudification, and remote working, there are numerous assets that institutions and companies need to protect, such as employees’ devices, customers’ data, or even IT Admin credentials, to name just a few.

But there are also other risk factors that are not directly caused by cyber-attacks. We are talking about pressure on both CISOs and security admins who bear responsibility for their organization’s cybersecurity and face a huge number of challenges including the financial consequences of cyberattacks.

For example, 97 percent of boards are expecting CISOs to deliver business value and 31 percent of boards will fire CISOs in case of a breach, according to Forrester’s research. This kind of pressure often results in high levels of stress and burnout.

Challenges faced by CISOs in 2024:

  • Changing/evolving nature of threats
  • Geopolitics
  • Regulations
  • Hybrid workforce
  • Economic pressure & cost savings
  • Integrating cybersecurity with business strategy
  • Complexity of IT environment
  • Lack of visibility
  • Talent shortage
  • Lack of comprehensive vulnerability and exposure management

Dealing with these challenges, 66 percent of employees working in cybersecurity stated that they are experiencing significant stress levels. Mrs. van der Hout took it a step further, surprising the audience with survey results revealing that among these highly stressed employees, 51 percent take prescription medicine and 19 percent drink three or more alcoholic beverages per day to cope with these challenges.

“We cannot meditate ourselves from (out of) cybersecurity burnout,” said Mrs. van der Hout, adding that there are some measures that companies can take immediately such as automated alert management or providing mental health support to employees.

But considering the current talent shortage, which exceeds 4 million unoccupied job positions worldwide, more measures will need to be taken.

Don’t dwell on the past

Be it a board game or real-world cybersecurity, adopting a prevention-first strategy relies on anticipating the opponents’ moves. But what Forrester analysts often see are companies making decisions based on what has happened before – i.e., using a rearview mirror. They set their priorities, create incident plans, and adjust their budgets, but when a data breach occurs, all this planning goes out the window.

“[Just like] how I flip the board [over] when I am about to lose a game, that’s how they flip their priorities for the upcoming year. Their investment profiles change,” said Mrs. van der Hout.

For example, in 2023, CISOs recognized the importance of the human factor in cybersecurity and increased budgets accordingly, but in 2024 their focus has shifted back to technological solutions.

And the situation has become serious. Within the last 12 months, 78 percent of surveyed organizations reported one or more incidents potentially compromising sensitive data. The estimated cumulative loss of those data breaches is on the rise in both the US and Europe and is now exceeding $1 million per company, according to Forrester.

How others play their cards

When moving to improve one’s game, it is often useful to see how others play their cards. To face current cybersecurity challenges, organizations need to follow current trends and learn from others.

For example, AI and machine learning help cybercriminals create more sophisticated threats, but legitimate security organizations can also harness this technology to build more effective cybersecurity tools and processes. Moreover, identity protection is no longer strictly about protecting the identity of employees, but also of partners, customers, and even non-human identities, thus the term: “everything identity.”

Current trends in cybersecurity:

  • AI and machine learning
  • Quantum computing and blockchain technology
  • Expansion of OT&IoT
  • Zero trust
  • Everything identity
  • Increasing regulations and geopolitics

New legislation has also been adopted around the world, but Mrs. van der Hout pointed out that following legislation is not only about checking compliance boxes but also about helping companies to build stronger defenses. Therefore, security solution providers should retain trusted advisors, and governments should educate companies and citizens to achieve the desired level of resilience.

“Governments need to be clearer about what organizations need to do to comply with new regulations instead of having really vague articles,” Mrs. van der Hout said.

When learning from others, organizations should look at the strategic and tactical priorities of other players on the market.

Strategic priorities:

  1. Boost cloud security strategy
  2. Improve the ability to detect and respond to threats
  3. Enhance identity and access management for employees, partners, and customers

Tactical priorities:

  1. Improve application security and/or product security
  2. Improve access management and policies for employees and partners
  3. Improve security operations’ effectiveness

Building a proactive defense strategy

Taking all this information into account, let’s build some proactive defense strategies.

First, determine business-relevant elements of your strategy and consider that board members will expect it to deliver some value. Business and cyber security need to work together to shape a strong security posture to persuade both partners and customers, who are increasingly taking a proactive interest in their own security.

With a business strategy set, look at possible risks and keep in mind that this should be an ongoing process. While doing this, make sure that you have proper data from cyber intelligence and advanced security technologies.

“And that’s not only about data collection. It’s also about action and response,” Mrs. van der Hout said.

Next step is to create a strong security culture within an organization as current Forrester predictions say that 90 percent of all data breaches will still include a human element.

“Looking at one cybersecurity awareness video while multitasking isn’t changing anyone’s behavior. So, when addressing awareness, please, move beyond videos. Make sure that your employees understand the importance of awareness and make security part of your organization’s culture,” Mrs. van der Hout said.

The final aspect of a proactive defense strategy is continuous improvement and adaptation. Instead of adopting one solution, and then setting and forgetting, organizations should review their defenses, close gaps, make adjustments, and ask for help if needed.

You are not alone

It is always nice to talk about the latest cybersecurity solutions and proactive defense but there are smaller companies or non-profit organizations that don’t have a budget for CISOs and high-end technologies.

When asked about this, Mrs. van der Hout remained in her winning mood, pointing out that even small companies can analyze their threat surface and set priorities. And what is more, the “good guys” in IT environments can help each other.

“We are operating in ecosystems where larger enterprises and SMBs are working together. We need to partner with each other to make sure that we are secure. Security should travel beyond just contractual agreements,” she said.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Containers Gone Rogue! New IT Superhero Arrives to Conquer Container Chaos

In “The Code Conundrum”, A New Software Hero Emerges To Take Aim at Defeating the Complexity of Container Management and Deliver Stability to Modern IT Edge Environments

INDIANAPOLIS – May 29, 2024 – Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced the publication of the second issue of its EdgeSlayer comic book series. In “The Code Conundrum”, our hero is a software developer named Amy (a reference to AIME for Autonomous Infrastructure Management Engine) who must implement continuous integration and containerized deployment strategies to defeat a rogue AI that’s wreaking havoc on the fictional city of Technopolis. Can Amy conquer the unruly forces with container deployment and restore stability to the edge relying on little else than her smarts and DevOps prowess?

While the characters and the plot of the latest EdgeSlayer comic book might be fantastical, the story’s premise is squarely rooted in the realities of today’s complex edge environments where managing, customizing, and integrating software containers has become an essential yet increasingly challenging task. Employing the metaphor of a high-stakes battle to represent the ongoing struggle of IT professionals, the comic depicts our valiant heroes confronting a relentless enemy: a tangled web of application deployment complexities, ever-evolving cybersecurity threats, and the constant pressure to maintain application uptime.

This complexity largely stems from the need for additional tools such as Kubernetes, to manage sprawling container clusters. Kubernetes, while powerful, adds another layer of configuration and learning for already overburdened IT teams. The EdgeSlayer story highlights this struggle, but also offers a path forward. By running containers directly on VMs within SC//HyperCore, redundancy is automatically achieved at the infrastructure level, enabling the real-world heroes of IT to spend less time troubleshooting complex container orchestration and more time focused on strategic initiatives that drive business value.

“We’re seeing more and more customers struggling to deploy containers in a consistent and programmatic fashion at the network edge, which points to a growing need for automated solutions,” said Jeff Ready, CEO and co-founder of Scale Computing. “This burden often falls on the shoulders of IT administrators, the unsung heroes who work tirelessly behind the scenes to keep everything running smoothly, often without the recognition they deserve. Our EdgeSlayer comics are our creative way of celebrating these individuals by showcasing their challenges and triumphs through a superhero lens.”

This new edition of the EdgeSlayer comic can be downloaded here in PDF format for free.

About Scale Computing

Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Using patented HyperCore™ technology, Scale Computing Platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime, even when local IT resources and staff are scarce. Edge Computing is the fastest growing area of IT infrastructure, and industry analysts have named Scale Computing an outperformer and leader in the space, including being named the #1 edge computing vendor by CRN. Scale Computing’s products are sold by thousands of value-added resellers, integrators, and service providers worldwide. When ease-of-use, high availability, and TCO matter, Scale Computing Platform is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, G2 and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×