Skip to content

Scale Computing HCI: Improving Performance for Remote Workers from the Data Center to the Edge

INDIANAPOLISNovember 10, 2020Scale Computing, a market leader in edge computing, virtualization and hyperconverged solutions, has introduced new HC3 infrastructure appliances that deliver the extra processing power of Nvidia GPUs. For power-users on virtual desktops or computing-intensive applications for design or analytics, the HC1250DFG and HC5250DFG appliances engage high-performance GPUs to provide increased speed and processing efficiency. Scale Computing is the only technology provider delivering high performance applications from the data center to the edge on the same software platform and interface.

As remote work becomes a long term reality, organizations continue to execute on getting systems in place to support all remote users, whether they leverage applications in the cloud or work with very high performance applications that require dedicated GPU and high frame buffer requirements for remote users hosted on premises. These HC3 hyperconverged appliances are designed to enhance support for performance-intensive use cases such as high density Virtual Desktop Infrastructure (VDI) deployments, 3D Imaging/Modeling, Analytics, Artificial Intelligence, and GIS. With flexible deployment options from one appliance to clusters of multiple appliances, these appliances provide a highly-available, high-performance, hyperconverged virtualization platform.

The new HC3 infrastructure appliances delivering the superior processing power from Nvidia GPUs join other recently introduced HCI appliances designed to meet the needs for performance computing for both the enterprise and the SMB and from the core data center to the edge.

  • The HC3250DF stands out from other HCI solutions designed for performance computing with its ease of use, and brings a high amount of speed, density, throughput, and power to enable VDI for many more users per node while keeping future growth in focus. Unlike more complex infrastructure solutions that try to emulate classic SAN storage infrastructure, the Scale Computing HC3250DF is easier to deploy, manage, scale out, and its NVMe storage architecture requires no manual configuration and consumes less system RAM, resulting in more RAM being available to virtual machines and their applications.
  • The HE150 appliance is a small, all-flash, NVMe storage-based compute appliance that delivers all of the simplicity, efficiency, and enterprise-ready virtualization associated with Scale Computing’s HC3 platform. Built specifically for sites that need highly available infrastructure, the HE150 can be deployed almost anywhere, without requiring a rack or server closet. Taking up only the space needed to stack three smartphones, it also includes high availability clustering, rolling upgrades and integrated data protection.

“Enterprise and SMB customers have a need for performance-intensive use cases, both in their data centers and at the edge,” commented Jeff Ready, CEO and co-founder, Scale Computing. “Scale Computing customers now don’t have to choose different platforms to manage their data center and edge computing needs, either for on site or remote workers The HC3 platform is able to handle any application needs necessary.”

All Scale Computing HC3 appliances feature intelligent automation for self-healing and high availability to keep clusters running through component and appliance failures, as well as integrated disaster recovery capabilities to protect data and workloads to remote sites for fast failover and recovery. These capabilities enable applications to achieve maximum uptime even when local IT resources and staff are scarce, making the HC1250DFG and HC5250DFG appliances ideal application platforms for core data center to edge computing use cases for retail, industrial, transportation, manufacturing, finance, healthcare, education, remote office/back office, and mobile platforms.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

ESET receives the Via Bona Slovakia 2019 award in two categories

Bratislava – Every year, the Pontis Foundation awards the Via Bona award for exceptional projects and socially responsible companies that change Slovakia for the better. In the 20th anniversary of this award, ESET managed to win in two categories: Responsible Large Company and Good Partner of the Community.

The Via Bona Slovakia award has been given by the Pontis Foundation since 1998 to small and large companies that inspire other companies with their activities. The winners of this prestigious award are companies that change life in Slovakia for the better with their projects and responsible approaches to business. The award in the main category Responsible Large Company for 2019 was acquired by ESET mainly for demonstrating long-term ethical values ​​in our business model and contributing to the popularization of science and research in Slovakia.

“ESET is often cited as an example of a success story of a Slovak company that established itself abroad. We are aware of the responsibility that comes with that, especially at home in Slovakia. We do not choose an easier path. We support areas that have been neglected or overlooked for a long time. At the same time, we strive to be a voice that can be heard when needed. When, as a country, we are going through difficult times, it is desirable that the representatives of companies express themselves and stand out as voices of reason. And I hope that we have people, companies and organizations in Slovakia who really care about the success and fate of Slovakia,” responded ESET CEO Richard Marko in his thank-you speech for the award.

ESET also became the winner of the Good Partner of the Community category for our investment in the popularization and development of Slovak science. Supporting education, science and research are areas that ESET has long been involved in. It is these areas that help Slovakia become a modern and successful country. Therefore, through the ESET Foundation, it created the ESET Science Award, which aims to increase the social status of science and scientists in Slovakia. In October 2020, the second year of the ESET Science Award took place with the participation of the world-famous physicist and Nobel Prize winner, Professor Kip Thorne, who was chairman of a prestigious international commission.

“I thank both the expert jury and the employees of ESET, who are the main reason for our success. It is especially thanks to them that we can celebrate this award. I would also like to wish Slovakia success, because I think it has a positive future ahead of it,” concluded Richard Marko.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

ESET Research discovers ModPipe, backdoor targeting POS software used by thousands of restaurants, hotels

BRATISLAVA – ESET researchers have discovered ModPipe, a modular backdoor that gives its operators access to sensitive information stored in devices running ORACLE MICROS Restaurant Enterprise Series (RES) 3700 POS (point-of-sale) – a management software suite used by hundreds of thousands of bars, restaurants, hotels and other hospitality establishments worldwide. The majority of the identified targets were from the United States.

What makes the backdoor distinctive are its downloadable modules and their capabilities, as it contains a custom algorithm designed to gather RES 3700 POS database passwords by decrypting them from Windows registry values. This shows that the backdoor’s authors have deep knowledge of the targeted software and opted for this sophisticated method instead of collecting the data via a simpler yet “louder” approach, such as keylogging. Exfiltrated credentials allow ModPipe’s operators access to database contents, including various definitions and configuration, status tables and information about POS transactions.

“However, based on the documentation of RES 3700 POS, the attackers should not be able to access some of the most sensitive information – such as credit card numbers and expiration dates – which is protected by encryption. The only customer data stored in the clear and thus available to the attackers should be cardholder names,” cautions ESET researcher Martin Smolár, who discovered ModPipe.

“Probably the most intriguing parts of ModPipe are its downloadable modules. We’ve been aware of their existence since the end of 2019, when we first found and analyzed its basic components,” explains Smolár.

Downloadable modules:

  • GetMicInfo targets data related to the MICROS POS, including passwords tied to two database usernames predefined by the manufacturer. This module can intercept and decrypt these database passwords, using a specifically designed algorithm.
  • ModScan 2.20 collects additional information about the installed MICROS POS environment on the machines by scanning selected IP addresses.
  • ProcList with main purpose is to collect information about currently running processes on the machine.

“ModPipe’s architecture, modules and their capabilities also indicate that its writers have extensive knowledge of the targeted RES 3700 POS software. The proficiency of the operators could stem from multiple scenarios, including stealing and reverse engineering the proprietary software product, misusing its leaked parts or buying code from an underground market,” adds Smolár.

To keep the operators behind ModPipe at bay, potential victims in the hospitality sector as well as any other businesses using the RES 3700 POS are advised to:

  • Use the latest version of the software.
  • Use it on devices that run updated operating system and software.
  • Use reliable multilayered security software that can detect ModPipe and similar threats.

For more technical details about ModPipe, read “Hungry for data, ModPipe backdoor targets popular POS software used in hospitality sector,” a blogpost on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Portnox Achieves a Microsoft Gold Cloud Platform Competency

Portnox demonstrates best-in-class capability and market leadership through demonstrated technology success and customer commitment.


NEW YORK, NY – November 4, 2020 – Portnox, a fully cloud-delivered network access control (NAC) provider, today announced it has attained a Gold Cloud Platform competency, demonstrating a “best-in-class” ability and commitment to meet Microsoft Corp. customers’ evolving needs in today’s mobile-first, cloud-first world and distinguishing itself within Microsoft’s partner ecosystem.

To earn a Microsoft Gold competency, partners must successfully complete exams (resulting in Microsoft Certified Professionals) to prove their level of technology expertise, and then designate these certified professionals uniquely to one Microsoft competency, ensuring a certain level of staffing capacity. They also must submit customer references that demonstrate successful projects, meet a performance (revenue and or consumption/usage) commitment (for most Gold competencies), and pass technology and/or sales assessments.

The cloud-delivered CLEAR NAC platform from Portnox is designed to help partners capitalize on the growing demand for infrastructure and software-as-a-service (SaaS) solutions built on Microsoft Azure. With built-in scalability, no on-site hardware, multitenancy and other benefits, the platform allows Microsoft partners to empower their customers by eliminating the traditional complexities associated with on-premises NAC.

“This Microsoft Gold Cloud Platform competency showcases our expertise in and commitment to today’s technology market and demonstrates our deep knowledge of Microsoft’s products and services,” said Ofer Amitai, CEO at Portnox “We plan to accelerate our customers’ success by serving as technology advisors for their business demands.”

“By achieving a Gold competency, partners have demonstrated the highest, most consistent capability and commitment to the latest Microsoft technology,” said Gavriella Schuster, corporate vice president, One Commercial Partner (OCP) at Microsoft Corp. “These partners have a deep expertise that puts them in the top of our partner ecosystem, and their proficiency will help customers drive innovative solutions.”

Cloud Platform

The Cloud Platform competency is designed for partners to capitalize on the growing demand for infrastructure and software-as-a-service (SaaS) solutions built on Microsoft Azure. Differentiate your company with the Cloud Platform competency, and you will be eligible for Signature Cloud Support, Azure deployment planning services, Azure sponsored credit, direct partner support, eligibility to deploy certain on-premises, internal use software on Microsoft Azure, and access to the cloud platform roadmap.

The Microsoft Partner Network helps partners strengthen their capabilities to showcase leadership in the marketplace on the latest technology, to better serve customers and to easily connect with one of the most active, diverse networks in the world.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

【網管人報導】BEC鑑識服務抓漏 補強弱點杜絕事件重演

專業團隊徹底檢視流程破口 工具偵測告警提高人員警覺

BEC鑑識服務抓漏 補強弱點杜絕事件重演

為了協助眾多遭受商務電子郵件詐騙(BEC)的企業還原真相,釐清遭利用來發動攻擊的弱點環節,加以改善或增添檢核措施,以免事故重複發生,中華數位除了自主研發郵件安全防護方案,亦提供 BEC 鑑識服務,幫助企業制定規範控管政策,全面性地降低資安風險。

中華數位科技觀察,實際上 BEC 事件如同病毒威脅,不僅無法被滅絕,且手法持續在轉變,再加上近十年來詐騙者發動BEC活動變得更駕輕就熟、具規模化,皆是這類事件不減反增的主因。

並進一步指出,近期資安威脅熱門議題包含勒索、恐嚇、詐騙、BEC,彼此之間容易被混淆,中華數位提供的 BEC 鑑識服務定義較為明確,關鍵在於郵件中必須存在欺騙者、擁有公司內部不可能對外公開的資訊,才會被認定為 BEC,若是基於公開資訊設計的釣魚郵件則屬於一般詐騙,代表詐騙者未掌握企業內部工作流程,則不具鑑識的必要。

先行定義遭受資安威脅類別


企業內部業務執行現況若未公開,外界根本難以得知,BEC 詐騙居然可精準描述,表示內部出現資安漏洞而管理者不自知,中華數位特別提出BEC鑑識服務協助客戶釐清問題根源。一旦出現 BEC 詐騙郵件,不論收件者是否有上當,都必須得嚴肅看待。

既然詐騙者已經對企業內部營運狀況進行詳盡研究,勢必會不斷地嘗試,即使企業不幸已被騙取得逞也不會免疫,仍可能再次發生類似事件,除非釐清詐騙者得以成功的關鍵漏洞,並且加以改善或修補,才可能破除詐騙者為企業量身訂製的攻擊策略。

「前述提到容易被混淆的資安事件,這是我們在郵件安全領域累積的實戰經驗。」實際上勒索、恐嚇、詐騙、BEC 手法皆雷同,BEC 的關鍵問題是內部資訊洩漏;詐騙則屬於單純的社交工程手段;恐嚇是揚言若不付錢就發動癱瘓式攻擊,但不見得會有所行動;至於勒索的作法,參考近期 FBI 調查的現況,較恐嚇增加了火力展示,讓企業感受到壓力,擔心營運受影響而支付勒索金。

國際駭客組織一旦確立可成功獲利的方法後,勢必會相互模仿,並且依據擅長的技術發動攻擊,其中勒索須花費的成本可說最高,必須得先有所作為,讓資安事件影響正常營運後再要求企業支付贖金。然而恐嚇則不用,只宣稱即將要攻擊卻尚未有所動作。

為了獲取利益,攻擊者往往會交錯運用,企業得先行定義面臨的現況,以便制定回應的策略。可是企業 IT 管理者不擅長分析外部威脅手段,難以清楚釐清前述四種威脅差異之處,委由專業團隊協助才可有效杜絕後患。

專業團隊鑑識釐清弱點環節


從近年來中華數位協助企業處理 BEC 鑑識的經驗發現,幾乎都包含電子郵件帳號入侵(Email Account Compromise),因此大多會從此處開始著手調查,若企業採用 Gmail 等雲端郵件服務,無法取得相關日誌,恐難以釐清真相。「欲防止 BEC 事件再次發生,必須搭配部署實體設備,無法僅仰賴員工防線。」

今年(2020)較特別的是 BEC 事件數量上半年就已經較去年同期增長了 2.82 倍,主要影響因素即為 COVID-19 爆發,全球各地皆實施居家辦公,原本企業有多個正式的聯繫管道,如辦公室電話、Email 等;居家辦公後,聯絡方式開始受限或轉為私人聯繫管道,這時就變得難以確認與查證,仍得仰賴郵件聯繫,使得確認程序較難以達到即時性,導致居家辦公時期BEC成功的機率較高。另一方面,居家辦公使用的電腦多為員工私人裝置,甚至採用私人信箱統一收取郵件,使得資安風險大增。

在疫情尚未出現之前,企業對於遠端辦公根本毫無準備,面對來勢洶洶的 COVID-19 全球大流行,被迫得先行實施居家辦公防疫,之後再調整控管政策來適應新常態。日前台灣某銀行海外據點所發生的 BEC 事件,損失 45 萬美元,即是居家辦公委由代理人執行匯款,未建立再確認程序才得以被詐騙者利用得逞。

「遭遇 BEC 事件不論是否有釀成損失,建議都必須交由專業團隊鑑識,才能夠找到資安防護的缺口,以免再次發生。至於受騙款項須仰賴金融防線,若能第一時間發現受騙上當,或許尚可在款項真正撥付之前進行攔截。」中華數位表示。BEC 鑑識服務會協助檢查工作流程中的弱點環節,並且建議設立多重檢查,例如落實覆核機制,特別是大筆款項,依照公司規模與承受的風險,在規範中增加必須再次聯繫確認的項目。

設置防護機制輔助降低風險


經過 BEC 鑑識服務檢視工作流程之後,可搭配中華數位 SPAM SQR 郵件過濾方案搭配 ADM(Advanced Defense Module)進階防禦模組,輔助預防人力所無法察覺的異常或是疏漏。

中華數位說明,最初發展 ADM 主要是為了防堵 APT 攻擊手法,如今已延伸至辨識 BEC 與詐騙的能力。BEC 手法較具針對性,需客製化郵件內容,ADM 模組可運行分析辨識攻擊慣用的策略執行判斷;若為詐騙手法則更多是無差別式攻擊,攻擊者通常會申請多個惡意網域或郵件帳號,則可基於中華數位累積的龐大資料庫輔助辨識。

中華數位建議,欲防堵爆發 BEC 事件或被詐騙成功,首要必須從控管政策著手,制定標準工作流程,主機設定配置的偵測措施,可讓員工發現警示郵件時立即進入通報程序,嚴格把關以降低風險。

如今 BEC 手法設計的郵件主旨與內文,極相似於洽談交易時提及的相關事宜,甚至也會模仿交易對象慣用語句,如此才可取得收件者的信任,僅檢查主旨、關鍵字等指標,無法發揮實質效果,因為透過現有可用的指標無從發現,必須從行為模式分析辨識。此即為中華數位的核心技術所在。

中華數位之所以能夠辨識 BEC 行為模式,主要是基於長期發展垃圾郵件防護累積的領域知識,以及解決方案部署位置的優勢,才有能力完整掌握企業商務郵件往來的行為模式,在第一時間發現異於常態,立即提醒使用者多加留意。例如郵件系統設定的白名單中偵測到詐騙指標,抑或是使用者從垃圾郵件中撈回,SPAM SQR 會在這些類型的郵件主旨上特別標註,藉此讓使用者提高警覺心,避免爆發無法挽回的資安事故。

本文轉載自網管人 2020 年 11 月號專題

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於中華數位科技 Softnext Technologies Corp.
創立於2000年8月。
秉持著【We Secure Your Content】的服務理念,以提供企業資訊應用管理服務及打造資訊內容安全防護為宗旨。專精於提供網路應用服務技術,根據市場需求推出多款資訊內容安全的解決方案及應用服務,能夠協助企業透過符合資安管理規範並遵循法規的方式進行資訊內容安全管理,以維護員工的生產力、提升企業經營績效。

關於 ASRC 垃圾訊息研究中心
ASRC 垃圾訊息研究中心 (Asia Spam-message Research Center),長期與中華數位科技合作,致力於全球垃圾郵件、惡意郵件、網路攻擊事件等相關研究事宜,並運用相關數據統計、調查、趨勢分析、學術研究、跨業交流、研討活動..等方式,促成產官學界共同致力於淨化網際網路之電子郵件使用環境。更多資訊請參考 www.asrc-global.com

×

Hello!

Click one of our contacts below to chat on WhatsApp

×