訊連科技黃肇雄執行長受邀於「INTEL邊緣運算解決方案高峰論壇」 分享FaceMe®臉部辨識於邊緣運算之應用及機會

【2019年12月17日,台北訊】邊緣運算是近年來發展最快且應用廣泛的科技主流,全球頂尖AI臉部辨識領導廠商訊連科技(5203.TW)黃肇雄執行長,今日(17日)受邀參加由全球半導體龍頭INTEL舉辦之「INTEL邊緣運算解決方案高峰論壇」(Intel Edge Computing Solution Summit),和台灣企業及開發商夥伴分享AI技術在邊緣運算的應用和創新機會。



根據工研院的研究指出,AI技術發展已經從雲端逐漸移向終端邊緣運算。相較雲端運算,邊緣運算有彈性佈署、即時回應等優勢,能夠幫助系統整合商和設備製造商快速開發與導入。AI臉部辨識已經被大量應用在各種情境,包含智慧零售、智慧金融、智慧辦公室、智慧工廠和智慧安控等。在此次活動的焦點論壇中,訊連科技黃肇雄執行長與其他與談貴賓,共同交流邊緣運算的趨勢、產業現況及面臨的挑戰、與實際客戶案例分享。

「因應物聯網的趨勢發展,未來硬體攝影鏡頭搭配臉部辨識技術,將大量被運用在邊緣裝置,成為大數據趨勢下決策分析的利器,透過AI軟硬體整合,幫助企業搶得數位轉型的先機。」訊連科技黃肇雄執行長表示:「訊連科技在全球已取得眾多成功案例,不論是在智慧安控、智慧住家,或是零售業及智慧數位看板,有許多經驗可供國內企業參考。訊連科技所開發FaceMe®臉部辨識引擎專為邊緣運算裝置打造,提供最佳的臉部辨識技術。」

訊連科技在活動現場的體驗區亦同步展示,針對INTEL硬體Movidius及軟體OpenVINO開發工具優化的FaceMe®臉部辨識引擎技術,成為數百位與會貴賓的關注焦點。2019 INTEL邊緣運算解決方案高峰論壇透過主題演講、焦點論壇和體驗專區的方式,探討AI邊緣應用的最新趨勢和創新方案,透過邀請業界最具指標的領導廠商的觀點分享,加速產業界間的交流合作,創造軟硬整合後強大的全球競爭力。

 

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

訊連科技FaceMe® AI臉部辨識榮獲2020台灣精品獎「銀質獎」

世界級的頂尖人臉辨識 協助台灣IoT/AIoT產業導入刷臉、進軍世界

【2019年11月27日,台北訊】 世界級AI臉部辨識技術開發商訊連科技(5203.TW)宣佈,旗下FaceMe® AI臉部辨識引擎FaceMe® AI臉部辨識引擎,於逾千件產品中脫穎而出,獲選第28屆台灣精品獎「銀質獎」肯定。台灣精品銀質獎為逾千件報名產品之前三十強,顯見訊連在AI及臉部辨識研發水準領先業界,並具備世界級水準。

台灣精品獎是臺灣產業界的奧斯卡獎,獲獎者都是通過經濟部遴聘跨國、跨領域的專家,從研發、設計、品質、行銷全方位嚴格評選出來的產業菁英。訊連自成立以來已累積獲得45座之台灣精品獎,其中更包括四座代表最高榮譽之金質獎及三座銀質獎。FaceMe®首次報名即獲台灣精品銀質獎肯定,亦是首次獲得台灣精品銀質獎肯定之AI臉部辨識SDK解決方案。


「FaceMe®於上市以來,已獲得數十個合作夥伴導入於IoT/AIoT設備中,全球亦累積超過百家客戶評估導入中,為台灣唯一具備國際實力之AI臉部辨識引擎。」訊連科技董事長暨執行長黃肇雄表示:「FaceMe® AI臉部辨識引擎於全球臉部辨識競賽屢創佳績,今年首度報名精品獎即獲得『銀質獎』,除了肯定訊連科技產品開發之研發實力,也顯示台灣本土開發之臉部辨識技術有進軍國際之實力。」

FaceMe® 為專為IoT/AIoT製造商及系統整合商設計之臉部辨識引擎,擁有高達99.5%之臉部辨識率,可跨平台支援Windows、Linux、Android和iOS等作業系統。FaceMe®可彈性建置於IoT/AIoT邊緣裝置上或伺服器。

於伺服器或工作站環境,FaceMe®可針對高階的Intel® Core®或Xeon®處理器、nVidia顯示卡效能優化。此外,亦可支援採用Intel® Celeron®、Qualcomm Snapdragon 410、nVidia Jetson等輕量化IoT/AIoT設備,協助製造商於電子看板、KIOSK、門禁考勤機、POS等各式IoT/AIoT設備中快速導入刷臉功能。對於系統整合商來說,可採用FaceMe®於各式警政、安控、零售等專案中快速導入臉部辨識技術。

 

 

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

Tracking down the developer of Android adware affecting millions of users

We detected a large adware campaign running for about a year, with the involved apps installed eight million times from Google Play alone.We identified 42 apps on Google Play as belonging to the campaign, which had been running since July 2018. Of those, 21 were still available at the time of discovery. We reported the apps to the Google security team and they were swiftly removed. However, the apps are still available in third-party app stores. ESET detects this adware, collectively, as Android/AdDisplay.Ashas.

Figure 1. Apps of the Android/AdDisplay.Ashas family reported to Google by ESET

Figure 2. The most popular member of the Android/AdDisplay.Ashas family on Google Play was “Video downloader master” with over five million downloads

Ashas functionality

All the apps provide the functionality they promise, besides working as adware. The adware functionality is the same in all the apps we analyzed. [Note: The analysis of the functionality below describes a single app, but applies to all apps of the Android/AdDisplay.Ashas family.]

Once launched, the app starts to communicate with its C&C server (whose IP address is base64-encoded in the app). It sends “home” key data about the affected device: device type, OS version, language, number of installed apps, free storage space, battery status, whether the device is rooted and Developer mode enabled, and whether Facebook and FB Messenger are installed.

Figure 3. Sending information about the affected device

The app receives configuration data from the C&C server, needed for displaying ads, and for stealth and resilience.

Figure 4. Configuration file received from the C&C server

As for stealth and resilience, the attacker uses a number of tricks.

First, the malicious app tries to determine whether it is being tested by the Google Play security mechanism. For this purpose, the app receives from the C&C server the isGoogleIp flag, which indicates whether the IP address of the affected device falls within the range of known IP addresses for Google servers. If the server returns this flag as positive, the app will not trigger the adware payload.

Second, the app can set a custom delay between displaying ads. The samples we have seen had their configuration set to delay displaying the first ad by 24 minutes after the device unlocks. This delay means that a typical testing procedure, which takes less than 10 minutes, will not detect any unwanted behavior. Also, the longer the delay, the lower the risk of the user associating the unwanted ads with a particular app.

Third, based on the server response, the app can also hide its icon and create a shortcut instead. If a typical user tries to get rid of the malicious app, chances are that only the shortcut ends up getting removed. The app then continues to run in the background without the user’s knowledge. This stealth technique has been gaining popularity among adware-related threats distributed via Google Play.

Figure 5. Time delay to postpone displaying ads implemented by the adware

Once the malicious app receives its configuration data, the affected device is ready to display ads as per the attacker’s choice; each ad is displayed as a full screen activity. If the user wants to check which app is responsible for the ad being displayed, by hitting the “Recent apps” button, another trick is used: the app displays a Facebook or Google icon, as seen in Figure 6. The adware mimics these two apps to look legitimate and avoid suspicion – and thus stay on the affected device for as long as possible.

Figure 6. The adware activity impersonates Facebook (left). If the user long-presses the icon, the name of the app responsible for the activity is revealed (right).

Finally, the Ashas adware family has its code hidden under the com.google.xxx package name. This trick – posing as a part of a legitimate Google service – may help avoid scrutiny. Some detection mechanisms and sandboxes may whitelist such package names, in an effort to prevent wasting resources.

Figure 7. Malicious code hidden in a package named “com.google”

Hunting down the developer

Using open-source information, we tracked down the developer of the adware, who we also identified as the campaign’s operator and owner of the C&C server. In the following paragraphs, we outline our  efforts to discover other applications from the same developer and protect our users from it.

First, based on information that is associated with the registered C&C domain, we identified the name of the registrant, along with further data like country and email address, as seen in Figure 8.

Figure 8. Information about the C&C domain used by the Ashas adware

Knowing that the information provided to a domain registrar might be fake, we continued our search. The email address and country information drove us to a list of students attending a class at a Vietnamese university – corroborating the existence of the person under whose name the domain was registered.

Figure 9. A university class student list including the C&C domain registrant

Due to poor privacy practices on the part of our culprit’s university, we now know his date of birth (probably: he seemingly used his birth year as part of his Gmail address, as further partial confirmation), we know that he was a student and what university he attended. We were also able to confirm that the phone number he provided to the domain registrar was genuine. Moreover, we retrieved his University ID; a quick googling showed some of his exam grades. However, his study results are out of the scope of our research.

Based on our culprit’s email address, we were able to find his GitHub repository. His repository proves that he is indeed an Android developer, but it contained no publicly available code of the Ashas adware at the time of writing of this blogpost.

However, a simple Google search for the adware package name returned a “TestDelete” project that had been available in his repository at some point

The malicious developer also has apps in Apple’s App Store. Some of them are iOS versions of the ones removed from Google Play, but none contain adware functionality.

Figure 10. The malicious developer’s apps published on the App Store which don’t contain the Ashas adware

Searching further for the malicious developer’s activities, we also discovered his Youtube channel propagating the Ashas adware and his other projects. As for the Ashas family, one of the associated promotional videos, “Head Soccer World Champion 2018 – Android, ios” was viewed almost three million times and two others reached hundreds of thousands of views, as seen in Figure 11.

Figure 11. YouTube channel of the malicious developer

His YouTube channel provided us with another valuable piece of information: he himself features in a video tutorial for one of his other projects. Thanks to that project, we were able to extract his Facebook profile – which lists his studies at the aforementioned university.

Figure 12. Facebook profile of the C&C domain registrar (cover picture and profile picture edited out)

Linked on the malicious developer’s Facebook profile, we discovered a Facebook page, Minigameshouse, and an associated domain, minigameshouse[.]net. This domain is similar to the one the malware author used for his adware C&C communication, minigameshouse[.]us.

Checking this Minigameshouse page further indicates that this person is indeed the owner of the minigameshouse[.]us domain: the phone number registered with this domain is the same as the phone number appearing on the Facebook page.

Figure 13. Facebook page managed by the C&C domain registrant uses the same base domain name (minigameshouse) and phone number as the registered malicious C&C used by the Ashas adware

Of interest is that on the Minigameshouse Facebook page, the malicious developer promotes a slew of games beyond the Ashas family for download on both Google Play and the App Store. However, all of those have been removed from Google Play – despite the fact that some of them didn’t contain any adware functionality.

On top of all this, one of the malicious developer’s YouTube videos – a tutorial on developing an “Instant Game” for Facebook – serves as an example of operational security completely ignored. We were able to see that his recently visited web sites were Google Play pages belonging to apps containing the Ashas adware. He also used his email account to log into various services in the video, which identifies him as the adware domain owner, beyond any doubt.

Thanks to the video, we were even able to identify three further apps that contained adware functionality and were available on Google Play.

Figure 14. Screenshots from this developer’s YouTube video shows history of checking Ashas adware on Google Play

ESET telemetry

Figure 15. ESET detections of Android/AdDisplay.Ashas on Android devices by country

Is adware harmful?

Because the real nature of apps containing adware is usually hidden to the user, these apps and their developers should be considered untrustworthy. When installed on a device, apps containing adware may, among other things:

  • Annoy users with intrusive advertisements, including scam ads
  • Waste the device’s battery resources
  • Generate increased network traffic
  • Gather users’ personal information
  • Hide their presence on the affected device to achieve persistence
  • Generate revenue for their operator without any user interaction

Conclusion

Based solely on open source intelligence, we were able to trace the developer of the Ashas adware and establish his identity and discover additional related adware-infected apps. Seeing that the developer did not take any measures to protect his identity, it seems likely that his intentions weren’t dishonest at first – and this is also supported by the fact that not all his published apps contained unwanted ads.

At some point in his Google Play “career”, he apparently decided to increase his ad revenue by implementing adware functionality in his apps’ code. The various stealth and resilience techniques implemented in the adware show us that the culprit was aware of the malicious nature of the added functionality and attempted to keep it hidden.

Sneaking unwanted or harmful functionality into popular, benign apps is a common practice among “bad” developers, and we are committed to tracking down such apps. We report them to Google and take other steps to disrupt malicious campaigns we discover. Last but not least, we publish our findings to help Android users protect themselves.

Indicators of Compromise (IoCs)

Package nameHashInstalls
com.ngocph.masterfreec1c958afa12a4fceb595539c6d208e6b103415d75,000,000+
com.mghstudio.ringtonemaker7a8640d4a766c3e4c4707f038c12f30ad7e21876500,000+
com.hunghh.instadownloader8421f9f25dd30766f864490c26766d381b89dbee500,000+
com.chungit.tank1990237f9bfe204e857abb51db15d6092d350ad3eb01500,000+
com.video.downloadmasterfree43fea80444befe79b55e1f05d980261318472dff100,000+
com.massapp.instadownloader1382c2990bdce7d0aa081336214b78a06fceef62100,000+
com.chungit.tankbattle1630b926c1732ca0bb2f1150ad491e19030bcbf2100,000+
com.chungit.basketball188ca2d47e1fe777c6e9223e6f0f487cb5e98f2d100,000+
com.applecat.worldchampion2018502a1d6ab73d0aaa4d7821d6568833028b6595ec100,000+
org.minigamehouse.photoalbuma8e02fbd37d0787ee28d444272d72b894041003a100,000+
com.mngh.tuanvn.fbvideodownloader035624f9ac5f76cc38707f796457a34ec2a97946100,000+
com.v2social.socialdownloader2b84fb67519487d676844e5744d8d3d1c935c4b7100,000+
com.hikeforig.hashtag8ed42a6bcb14396563bb2475528d708c368da316100,000+
com.chungit.heroesjumpc72e92e675afceca23bbe77008d921195114700c100,000+
com.mp4.video.downloader61E2C86199B2D94ABF2F7508300E3DB44AE1C6F1100,000+
com.videotomp4.downloader1f54e35729a5409628511b9bf6503863e9353ec950,000+
boxs.puzzles.Puzzleboxb084a07fdfd1db25354ad3afea6fa7af497fb7dc50,000+
com.intatwitfb.download.videodownloader8d5ef663c32c1dbcdd5cd7af14674a02fed3046750,000+
com.doscreenrecorder.screenrecordere7da1b95e5ddfd2ac71587ad3f95b2bb5c0f365d50,000+
com.toptools.allvideodownloader32E476EA431C6F0995C75ACC5980BDBEF07C8F7F50,000+
com.top1.videodownloadera24529933f57aa46ee5a9fd3c3f7234a1642fe1710,000+
com.santastudio.headsoccer286d48c25d24842bac634c2bd75dbf721bcf4e2ea10,000+
com.ringtonemakerpro.ringtonemakerapp20195ce9f25dc32ac8b00b9abc3754202e96ef7d66d910,000+
com.hugofq.solucionariodebaldor3bb546880d93e9743ac99ad4295ccaf98292026010,000+
com.anit.bouncingball6e93a24fb64d2f6db2095bb17afa12c34b2c845210,000+
com.dktools.liteforfb7bc079b1d01686d974888aa5398d6de54fd9d11610,000+
net.radiogroup.tvnradioba29f0b4ad14b3d77956ae70d812eae6ac761bee10,000+
com.anit.bouncingball6E93A24FB64D2F6DB2095BB17AFA12C34B2C845210,000+
com.floating.tube.bymuicv6A57D380CDDCD4726ED2CF0E98156BA404112A5310,000+
org.cocos2dx.SpiderSolitaireGamesadbb603195c1cc33f8317ba9f05ae9b74759e75b5,000+
games.puzzle.crosssum31088dc35a864158205e89403e1fb46ef6c2c3cd5,000+
dots.yellow.craft413ce03236d3604c6c15fc8d1ec3c9887633396c5,000+
com.tvngroup.ankina.reminderWater5205a5d78b58a178c389cd1a7b6651fe5eb7eb095,000+
com.hdevs.ringtonemaker2019ba5a4220d30579195a83ddc4c0897eec9df59cb75,000+
com.carlosapps.solucionariodebaldor741a95c34d3ad817582d27783551b5c85c4c605b5,000+
com.mngh1.flatmusic32353fae3082eaeedd6c56bb90836c89893dc42c5,000+
com.tvn.app.smartnoteddf1f864325b76bc7c0a7cfa452562fe0fd413511,000+
com.thrtop.alldownloaderf46ef932a5f8e946a274961d5bdd789194bd2a7d1,000+
com.anthu91.soccercard0913a34436d1a7fcd9b6599fba64102352ef2a4a1,000+
com.hugofq.wismichudosmildiecisiete4715bd777d0e76ca954685eb32dc4d16e609824f1,000+
com.gamebasketball.basketballperfectshote97133aaf7d4bf90f93fefb405cb71a2877908391,000+
com.nteam.solitairefree3095f0f99300c04f5ba877f87ab86636129769b1100+
com.instafollowers.hiketop3a14407c3a8ef54f9cba8f61a271ab94013340f81+

C&C server

http://35.198.197[.]119:8080


MITRE ATT&CK techniques

TacticIDNameDescription
Initial AccessT1475Deliver Malicious App via Authorized App StoreThe malware impersonates legitimate services on Google Play
PersistenceT1402App Auto-Start at Device BootAn Android application can listen for the BOOT_COMPLETED broadcast, ensuring that the app’s functionality will be activated every time the device starts
ImpactT1472Generate Fraudulent Advertising RevenueGenerates revenue by automatically displaying ads

Kudos to @jaymin9687 for bringing the problem of unwanted ads in the “Video downloader master” app to our attention.  

 

 

 

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

訊連科技 FaceMe® AI臉部辨識引擎 成功佈局全球 訊連攜手日本合作夥伴積極擴大在地市場

【2019年11月18日,台北訊】世界級AI臉部辨識技術開發商訊連科技(5203.TW)日本東京分公司,於14日邀請日本合作夥伴系統整合商舉辦FaceMe® AI臉部辨識引擎發表會,會中演示FaceMe® AI臉部辨識引擎的最新技術和應用,並展示成功案例,展示進軍智慧零售與智慧安控的堅強實力。

訊連科技FaceMe®臉部辨識引擎,擁有高達99.8%的辨識率,在全球知名NIST與MegaFace Challenge中,名列全球最精準且最快速的刷臉技術之一。FaceMe®臉部辨識引擎提供跨平台彈性SDK授權,是全球合作夥伴最青睞的技術核心。今年更針對日本市場中「智慧零售」、「智慧安控」和「車牌辨識」等場景推出完整的解決方案,包含「FaceMe® RETAIL」、「FaceMe® SECURITY」和「FaceMe® CAR PLATE」。

訊連科技日本分公司宣布,自今年起推出的「FaceMe®合作夥伴計劃」,透過技術支援和業務合作,與合作夥伴共同推展AI市場應用。目前在「智慧零售」和「智慧安控」上已有不少成功案例。TOPPAN 的「Face PASS」註冊報到機器人是將臉部辨識技術整合在報到機器人上,提供顧客刷臉進行商品購買或者完成活動報到的任務。另一個bitkey的「Next Gen Smartlock」的案例,則是將智慧安控應用在家居環境,將臉部辨識整合在智慧門鎖,針對老人小孩等特定族群提供進入管理與安全監控,建立更便利且安全的智慧門禁方案。

訊連科技自去年底推出FaceMe®臉部辨識引擎,全球已累積上千家企業客戶。這次「FaceMe® RETAIL」、「FaceMe® SECURITY」和全新「FaceMe® CAR PLATE 」解決方案的推出,是訊連科技成功佈局全球重點市場的豐碩成果。此外,為了強化與夥伴的合作連結,訊連科技日本分公司預計每年將舉辦兩次合作夥伴高峰會,展示FaceMe®解決方案的最新研發成果,攜手推進市場,加速滿足日本在地企業廣大的需求。

 

 

 

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

NetJapan Releases ActiveImage Protector™ 2018 Update 4 Now with Replication

Download PDF

Tokyo – NetJapan, Inc., publisher of disk imaging backup, disaster recovery, and virtualization software, announces the release of ActiveImage Protector™ 2018 Update 4, a backup and disaster recovery solution now with offsite replication features.

This update includes post-backup replication. Replicate completed backup image files to major cloud storage providers including Amazon S3, Google Drive, and Dropbox.

The newly enhanced BootCheck confirms that backup images are bootable and can be manually configured to run at a specified time.

New Features:

  • Backup Replication
    ActiveImage Protector includes offsite replication of backup image files. Replication can be configured to run as a post-backup process. Until now, replication was a feature limited to ImageCenter LE. Supported replication targets includes local storage, network storage, FTP, FTPS, SFTP, WebDAV, and major storage providers Amazon S3, Azure, One Drive, Google Drive, and Dropbox.
  • Manual BootCheck
    By adding manual BootCheck™ to Image Manager, checking bootability of backup image files is simplified. BootCheck™ confirms that your backup images are bootable. Check bootability locally or on a remote Hyper-V or ESXi host.
  • Extended HyperStandby Support for LVM Disks
    Create Standby Virtual Machines from Linux Logical Volume Manager backups directly into hypervisors to bring online for immediate switch-over.

Additional Features:

  • Fast online backup of a hard disk entirely including OS, applications, files, and configured settings.
  • Agent-based and agentless backup options.
  • Fastest full and incremental backup in the market.
  • HyperStandby™ uses NetJapan’s vStandby™ technology to create and maintain standby virtual machines from backup images for instant switch-over.
  • Inline Data Deduplication Compression™ (IDDC) drastically reduces storage requirements for backup images by eliminating duplicate data before compressing.
  • Strong encryption of backup images.
  • Online backup of SQL Server and Oracle databases.
  • Flexible backup schedule and image file generation management.
  • Image based backup for fast and secure recovery.
  • Individual file and folder recovery.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.

For further product information and system requirements, please visit: https://www.netjapan.com/en-us/backup-dr-solutions/backup-and-recovery-for-windows/

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Actiphy
Actiphy founded in 2007, focuses on developing and offering innovative backup and disaster recovery solutions for complete protection of all your systems and data. ActiveImage Protector backs up Windows, Linux machines on physical and virtual environments and restore systems and data fast for you to be up and running with minimal downtime and data loss. Today Actiphy hold 20% of the image backup market in Japan and are expanding our services in the Asia/Pacific and North American regions, as well as in Europe, the Middle East and Africa.