Skip to content

Scale Computing Recognized as a Leader in Server Virtualization and HCI in G2 Fall 2025 Report

邊緣運算領導者 Scale Computing 今日宣布,其在 G2 2025年秋季報告中榮獲43項徽章,肯定了其在伺服器虛擬化與超融合基礎架構 (HCI) 領域的領導地位。此項殊榮是基於全球最大軟件市集 G2 的高客戶滿意度評分及驗證用戶評論。

該公司憑藉其 HCI 解決方案獲得24項徽章,並在伺服器虛擬化領域獲得19項,其中包括備受矚目的「Grid Leader」獎項。客戶同時也在「最快實施」、「最佳支援」和「最佳易用性」等方面給予 Scale Computing 高度評價,彰顯了該平台的卓越效率與傑出的客戶體驗。

Scale Computing 總裁兼首席行銷總監 Jeff Ready 表示:「榮獲43項 G2 徽章的成就,直接反映了我們致力於提供一個能簡化 IT、降低成本並最大化正常運行時間的平台。用戶的回饋證實了我們的一體化解決方案是一個極具吸引力的 VMware 替代方案。在收購 Acumera 以及與 Veeam

建立合作夥伴關係後,我們擴展的能力進一步鞏固了我們作為分散式企業全方位整合邊緣解決方案市場領導者的地位。」

Scale Computing 平台 (SC//Platform) 將運算、儲存和虛擬化功能整合至單一的自我修復系統中,從而簡化 IT 架構。該平台旨在將意外停機時間減少高達90%,並降低總體擁有成本,為應對如邊緣 AI 等現代挑戰奠定面向未來的基礎。

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

ESET Shares CISO Perspectives and Priorities in MSP Summit Keynote

Stellar Cyber and ESET partner for booth crawl, pizza oven giveaways and sushi social evening

SAN DIEGO, Calif., Feb. 19, 2025ESET, a global leader in cybersecurity, today announced that CRN®, a brand of The Channel Company, has named Ryan Grant, Senior Vice President of Sales and Marketing, to its 2025 CRN® Channel Chiefs list. This list recognizes the executives who are driving strategy, setting the channel agenda for their companies and working tirelessly to ensure mutual success with their partners and customers. 2025 marks the third year in a row that Grant has been named a Channel Chief.

Since joining ESET North America in 2021, Grant has been instrumental to the transformation and success of the company’s channel business. Grant oversees ESET’s U.S. & Canada sales and marketing teams, including enterprise, distribution, managed service provider (MSP), national service provider (NSP), value added reseller (VAR), and retailer segments.  He is also committed to providing more dynamic opportunities for ESET’s channel partners through innovative campaigns and go-to-market programs by working closely with the company’s events, marketing and public relations teams.

“I’m honored to be recognized by CRN alongside so many outstanding leaders from the channel community,” said Grant. “At ESET, we remain committed to empowering our partners with cutting-edge cybersecurity solutions, technical expertise, and tailored support to help them navigate an increasingly complex threat and regulatory landscape. As a channel-first company, we view partner success as our success, so it’s critical that we empower partners with threat intelligence, resources and support that ensures they can quickly capitalize on new market opportunities and deliver exceptional protection to customers.”

The 2025 CRN Channel Chiefs were selected by CRN’s editorial staff based on their proven record of strategic innovation and dedication to the channel community. Under Grant’s direction, ESET has continued to refine its partner program and develop innovative technologies, processes and merchandising strategies. In 2024, the company focused on streamlining order processing, expanding its presence in the cyber risk insurance market and developing a unified API gateway, ESET Connect to empower partners with a catalogue of best-in-class integration partners. ESET also launched AI Advisor, which provides businesses with SOC-level advisory and enabling enhanced security analyst workflows. Unlike other vendor offerings and typical generative AI assistants that focus on soft features like administration or device management, ESET AI Advisor seamlessly integrates into the day-to-day operations of security analysts. This is a gamechanger for companies with limited IT resources who want to utilize the advantages of advanced XDR solutions and threat intelligence feeds.

Grant added, “As cyber threats grow more advanced and adversaries exploit generative AI, it’s crucial for our channel partners to adopt a robust security portfolio that reduces risk for their business customers. ESET stands out with a prevention-first strategy, leveraging AI and human expertise—backed by a world-class R&D team and industry-renowned researchers.”

“This year’s honorees exemplify dedication, innovation, and leadership that supports solution provider success and fosters growth across the channel,” said Jennifer Follett, VP, U.S. Content, and Executive Editor, CRN, at The Channel Company. “Each of these exceptional leaders has made a lasting channel impact by championing partnerships and designing creative strategies that get results. They’ve set a high bar in the channel, and we’re thrilled to recognize their standout achievements.”

CRN’s 2025 Channel Chiefs list is featured in the February 2025 print issue of CRN® Magazine and online at www.CRN.com/ChannelChiefs.

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Research discovers UEFI-compatible HybridPetya ransomware capable of Secure Boot bypass

  • ESET Research has discovered new ransomware samples, which it has named HybridPetya, resembling the infamous Petya/NotPetya malware. They were uploaded to VirusTotal in February 2025.
  • HybridPetya encrypts the Master File Table, which contains important metadata about all the files on NTFS-formatted partitions.
  • Unlike the original Petya/NotPetya, HybridPetya can compromise modern UEFI-based systems by installing a malicious EFI application onto the EFI System Partition.
  • One of the analyzed HybridPetya variants exploits CVE-2024-7344 to bypass UEFI Secure Boot on outdated systems, leveraging a specially crafted cloak.dat file.
  • ESET telemetry shows no signs of HybridPetya being used in the wild yet.

BRATISLAVASeptember 12, 2025 — ESET Research has discovered a HybridPetya bootkit and ransomware uploaded from Poland to the malware-scanning platform VirusTotal. The sample is a copycat of the infamous Petya/NotPetya malware; however, it adds the capability of compromising UEFI-based systems and weaponizing CVE-2024-7344 to bypass UEFI Secure Boot on outdated systems.

“Late in July 2025, we encountered suspicious ransomware samples under various filenames, including notpetyanew.exe and other similar ones, suggesting a connection with the infamously destructive malware that struck Ukraine and many other countries back in 2017. The NotPetya attack is believed to be the most destructive cyberattack in history, with more than $10 billion in total damages. Due to the shared characteristics of the newly discovered samples with both Petya and NotPetya, we named this new malware HybridPetya,” says ESET researcher Martin Smolár, who made the discovery.

The algorithm used to generate the victim’s personal installation key, unlike in the original NotPetya, allows the malware operator to reconstruct the decryption key from the victim’s personal installation keys. Thus, HybridPetya remains viable as regular ransomware – more like Petya. Additionally, HybridPetya is also capable of compromising modern UEFI-based systems by installing a malicious EFI application to the EFI System Partition. The deployed UEFI application is then responsible for encryption of the NTFS-related Master File Table (MFT) file – an important metadata file containing information about all the files on the NTFS-formatted partition.

“After a bit more digging, we discovered something even more interesting on VirusTotal: an archive containing the whole EFI System Partition contents, including a very similar HybridPetya UEFI application, but this time bundled in a specially formatted cloak.dat file, vulnerable to CVE-2024-7344 – the UEFI Secure Boot bypass vulnerability that our team disclosed in early 2025,” adds Smolár. ESET publications from January 2025 purposely refrained from detailing the exploitation; thus, the malware author probably reconstructed the correct cloak.dat file format based on reverse engineering the vulnerable application on their own.

ESET telemetry shows no active use of HybridPetya in the wild yet; thus, HybridPetya may just be a proof of concept developed by a security researcher or an unknown threat actor. Furthermore, this malware does not exhibit the aggressive network propagation seen in the original NotPetya.

For a more detailed analysis and technical breakdown of HybridPetya, check out the latest ESET Research blogpost: “Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass,” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

Overview of HybridPetya’s execution logic

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Understanding Dark Web Browsers

This article provides an overview of dark web browsers, explaining what they are and why they are used. It clarifies the distinction between the “dark web” and the “deep web,” and describes how these specialized browsers enable users to access a hidden part of the internet with enhanced privacy and anonymity.

What is a Dark Web Browser?

A dark web browser is a specific type of web browser designed to navigate the dark web. It provides anonymity by routing internet traffic through a series of random relays, or “nodes,” which hides a user’s IP address and location. The most well-known example of this is the Tor Browser, which stands for “The Onion Router.” The name “onion router” comes from the layered encryption process, where each layer of a user’s connection is peeled back like an onion as it passes through different nodes.

Dark Web vs. Deep Web

It is a common misconception that the dark web and the deep web are the same. The article clarifies this distinction:

  • Deep Web: This refers to any part of the internet that is not indexed by conventional search engines. It includes content behind paywalls, password-protected sites, and private databases (e.g., your online banking portal or a company’s internal network).
  • Dark Web: This is a small, specific part of the deep web that requires a specialized browser to access. Its primary purpose is to provide anonymity for communication and data exchange. While it is often associated with illegal activities, it is also used by journalists, activists, and others who need to protect their identity and communication.

Common Dark Web Browsers

The article highlights a few of the most popular dark web browsers:

  • Tor Browser: The most widely used dark web browser, known for its strong privacy features and multi-layered encryption.
  • I2P (Invisible Internet Project): A network that is similar to Tor but focuses more on creating a decentralized, peer-to-peer communication layer for things like forums and messaging.
  • Freenet: A decentralized, anonymous network that is designed to provide uncensored communication.

For Organizations and Security Professionals

For organizations, monitoring the dark web is a critical component of a proactive threat intelligence strategy. It allows security teams to identify if their company’s data, such as credentials or sensitive information, is being sold or discussed on illicit forums. Threat intelligence platforms, like NordStellar, can help automate this process, providing alerts and insights to protect against potential breaches.

About NordStellar

NordStellar is a threat exposure management platform that enables enterprises to detect and respond to network threats before they escalate. As a platform and API provider, NordStellar can provide insight into threat actors’ activities and their handling of compromised data. Designed by Nord Security, the company renowned for its globally acclaimed digital privacy tool NordVPN.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

2025 年最佳安全 Web 閘道 (SWG):速度、破解/檢查和隱私的真實測試

2025 年 SWG 終極考驗:您的安全網絡閘道很可能無法通過的三項實戰測試

在網絡安全領域,「最好」是一個主觀的詞。對資安架構師而言,它可能意味著功能最齊全的單一平台。但對您的員工而言,它只代表一件事:無感。

當網頁載入延遲、應用程式崩潰,以及在咖啡店使用 Wi-Fi 變成一場戰鬥時,您的安全網絡閘道 (SWG)就已經在最重要的測試中失敗了。本指南將跳脫行銷話術和功能列表,根據 2025 年真正重要的指標來評估 SWG:速度、可靠性和私隱。

架構的抉擇:雲端代理 vs. 端點本機檢測

大多數的使用者體驗問題,都可以追溯到一個根本的設計選擇。

雲端代理(Cloud-Proxy)SWG 會將您所有的網絡流量繞送到供應商的全球資料中心進行檢測。這是 Zscaler、Netskope 和 Cisco Umbrella 等主流廠商採用的模式。當網絡條件完美時,它或許能正常運作。但每一次額外的躍點都會帶來潛在的延遲和單點故障風險。

端點本機(On-Endpoint)SWG,例如 dope.security,則是將檢測引擎直接置於使用者的裝置上。流量會直接從使用者傳送到目的地,無需繞道供應商的雲端,從而消除了影響效能的「繞送成本」( Backhaul Tax)。

這種架構上的差異,是理解為何某些 SWG 體驗起來無縫接軌,而另一些卻總是在拖累生產力的關鍵。

三項測試,分辨話術與現實

您不需要實驗室就能看出哪種架構表現更佳。對任何您正在評估的 SWG 進行以下三項簡單測試。

1. 肉眼可見的速度測試

忘掉那些綜合基準測試。在關閉 SWG 的情況下,打開幾個複雜的網站 (例如有許多廣告的新聞網站),注意頁面感覺完全載入的速度。現在,開啟 SWG 並重複測試。

觀察重點: 頁面載入速度感覺一樣快嗎?還是您看到了轉圈圖示、緩慢載入的橫幅廣告和延遲的圖片?那種可察覺的延遲,正是將您的流量繞送到第三方資料中心所造成的。

2. 即時策略測試

安全防護不能等待 30-60 分鐘才更新。登入您的管理主控台,做一個簡單的策略變更 —— 例如,封鎖一個新的 URL 類別。儲存變更後,立即嘗試存取該類別中的網站。

觀察重點: 封鎖是否立即生效?像 dope.security 這樣的端點本機 SWG 能在數秒內推送策略更新。許多雲端架構則依賴定時輪詢,這會為您留下一個顯著的執法空窗期。

3. 強制門戶挑戰

帶著公司手提電腦去酒店、機場或咖啡店,嘗試登入他們的公共 Wi-Fi。這是大多數雲端代理 SWG 會徹底失敗的地方。

觀察重點: 您能順利連接嗎?雲端代理經常會干擾強制門戶(Captive Portal)的重新導向機制,導致使用者無法上網。由於端點本機 SWG 不會重新路由流量,強制門戶能完全正常運作 —— 無需提交服務台工單。

為何效能與私隱源於設計選擇

直飛航班總是比需要轉機的航班更快、更簡單。dope.security 的端點本機 SWG 將同樣的邏輯應用於您的資料傳輸。

透過完全移除雲端代理的躍點,我們消除了傳統 SWG 所帶來的延遲、應用程式中斷和私隱疑慮等主要問題根源。安全策略 —— 如攔截威脅、控管應用程式使用及保護資料 —— 都在裝置本機上強制執行。

最終的成果是,您能獲得一個安全的網絡體驗,感覺就像未曾加上企業級安全防護一樣順暢。對於將使用者生產力和更強大的私隱保護視為優先考量的企業而言,選擇已非常明確。

關於 Dope Security

這是一套全面的安全解決方案,旨在保護個人與企業組織免於各種網路威脅和漏洞。Dope Security 專注於主動式防禦和先進技術,提供一系列功能與服務,以保護敏感資料、系統和網路的安全。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

×

Hello!

Click one of our contacts below to chat on WhatsApp

×