Skip to content

CyberLink to Showcase Smart Retail Solutions at NRF 2022

Taipei, Taiwan — January 14, 2021 — CyberLink Corp. (5203.TW), a pioneer of AI and facial recognition technologies, will showcase new, contactless smart retail solutions. This solution is powered by its market-leading FaceMe® engine running on the Qualcomm® QCS6125 multimedia processor at NRF 2022 in New York. FaceMe® will be featured at Qualcomm Technologies booth #1411, in the Javits Convention Center, January 16-18, 2022. FaceMe® is one of the world’s top facial recognition engines, with edge-based, optimized architecture delivering precise biometric data in a few milliseconds with up to 99.82% accuracy, and is top-ranked in NIST FRVT (Facial Recognition Vendor Test). Qualcomm® QCS6125 multimedia processor delivers integrated heterogenous compute capabilities to provide optimized Edge AI performance in addition to robust security core for secure biometrics processing. FaceMe® offers cross-platform capabilities on Windows, Linux, Android and iOS, for a variety of edge devices and different hardware configurations, which makes it an ideal solution for smart retail, from kiosks and POS, to personalized shopping, digital signage and statistics. FaceMe® offers a broad and growing set of features and tools that redefine accuracy, performance, security, and flexibility standards for a wide range of industries. Since the launch of FaceMe® in 2018, CyberLink has collaborated with over a hundred global partners, including hardware makers, solution providers, and system integrators, deploying its technology across multiple scenarios. “Working hand in hand with Qualcomm Technologies, CyberLink is leveraging both companies’ technologies to enable a wide range of new user experiences, as demonstrated for retail at NRF,” said Dr. Jau Huang, Chairman and CEO of CyberLink. “Our continued collaboration with Qualcomm Technologies has been integral in making CyberLink’s FaceMe® solution the most advanced biometric access technology in the market. We look forward to having NRF attendees visit the Qualcomm Technologies booth to see FaceMe in action.” “Qualcomm Technologies is pleased to work closely with Cyberlink to drive next-generation biometric solutions and we look forward to showcasing the FaceMe® demonstration at NRF,” said Ketal Gandhi, Director, Business Development, Qualcomm Technologies, Inc. “We have worked collaboratively with CyberLink to support pre-integration capabilities to enable customers and our ecosystem to save time on their development and accelerate the go-to-market timeline for their applications in Retail such as Biometrics Payment, Access Control, Loyalty and more.” CyberLink is inviting NRF visitors to stop by Qualcomm Technologies’ booth to see some exciting results of this collaboration, including its application into POS solutions from Ordyx. Ordyx will introduce a complete POS system accessed by facial recognition for both cashiers and opted-in customers who desire to pay using their face. This new system leverages FaceMe® facial recognition and the Qualcomm QCS6125 solution to create a secure, fast and convenient new experience for customers. Come meet the FaceMe® team and find out about the latest developments in AI and facial recognition. NRF 2022 Information Time: Jan 16 – 18, 2022 Venue: Javits Convention Center Booth Info: #1411 (Qualcomm Technologies’ Booth)

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About CyberLink
Founded in 1996, CyberLink Corp. (5203.TW) is the world leader in multimedia software and AI facial recognition technology. CyberLink addresses the demands of consumer, commercial and education markets through a wide range of solutions, covering digital content creation, multimedia playback, video conferencing, live casting, mobile applications and AI facial recognition.  CyberLink has shipped several hundred million copies of its multimedia software and apps, including the award-winning PowerDirector, PhotoDirector, and PowerDVD.  With years of research in the fields of artificial intelligence and facial recognition, CyberLink has developed the FaceMe® Facial Recognition Engine. Powered by deep learning algorithms, FaceMe® delivers the reliable, high-precision, and real-time facial recognition that is critical to AIoT applications such as smart retail, smart security, and surveillance, smart city and smart home. For more information about CyberLink, please visit the official website at www.cyberlink.com

New content inspection and classification in Safetica ONE has arrived for macOS

Minor release of Safetica ONE 10.1 brings advanced content inspection with OCR for macOS and gets further enhancements. This version is also ready to be integrated with Netwrix Data Classification.

Now on macOS

New, efficient and less intrusive content inspection with smart pre-scanning and OCR features in Safetica ONE (see details in 10.0 release blog post) has arrived for endpoints with macOS. Organizations with macOS devices in their IT environment can now inspect content that leaves endpoints through specific channels. Safetica ONE monitors selected channels and logs sensitive data in DLP logs (reports).

Better stability and performance

In general, content inspection in Safetica ONE has additional improvements in stability and performance. One of the main components of content inspection is OCR (Optical Character Recognition), which helps to identify sensitive data in images and scanned PDF documents. In this release we are adding a new settings option to deactivate OCR on selected endpoints. This can be useful when there are very slow performing/low-specs computers in a customer’s environment.

Improved UX, layouts, metadata security and other changes

Improvements in the UX for sensitive data discovery in Safetica Management Console makes it easy to run discovery tasks on all local drives and scan them on-demand.

We also revised the layout for data discovery results to enable further compatibility with Netwrix Data Classification. The individual data categories in the data discovery results or detected in file and DLP logs can be now visualized in new charts, in order to provide a super-fast way to understand what kind of data are stored in or moving through your environment.

 

Besides content classification, Safetica ONE also allows a user-based or context classification approach that requires permanent metadata. The results of classification are saved in files’ metadata so that DLP policies are reliably enforced. In this release, we introduced protection that prevents users from manually removing metadata from classified files.

Our team is continually improving and expanding the templates that facilitate sensitive data discovery and classification. From now on you can use new templates for Brazilian Identity card numbers and JAR social identification numbers.

We also improved Windows security compatibility (Device Guard, Credential Guard, Memory Isolation), Active Directory sync optimizations and some website categorization technology improvements.

First results of Netwrix partnership: Improved data discovery

The strategic partnership with Netwrix announced in November 2021 has shown its first results. Netwrix customers can leverage the same data classification rules across their network/cloud storage and now also on endpoints. The new partnership also brings them DLP and insider threat protection features. We’re working on further integration, which will also bring additional options to the Safetica customer base.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

Did you know that there are several USB types? Do you know them all?

USB types: the final list to know them all

“Pen drive”, “memory stick”, for those less attentive: “VHS”… We have given many names to what we actually meant by USB. But you have to know that the term goes a little beyond that gadget of four or eight gigabytes that we use for so many things. In fact, there are several USB types, and today we will delve into getting to know them.

USB Types: What is a USB?

First we should make clear that, as many suspected but few dared to inquire, the acronym USB is derived from the corresponding words: Universal Serial Bus. USB is a connection protocol that allows us to connect several peripheral devices to an electronic device to achieve an exchange of data. It can also be useful to carry out some operations or charge the battery of our devices. It is, then, like a port that works as a connection socket between different devices.

The range of devices that we can interconnect to a computer thanks to USB is quite wide. We just have to think a bit so that they all come to our heads immediately. Mouses, keyboards, video and photo cameras, smartphones, USB memories, music players, webcams, speakers, printers, recorders, external hard drives, PDA… There are countless examples.

We owe this protocol to the fruitful 1990s, a wonderful decade for Britpop and for technology. It was seven large technology corporations (Intel, IBM, Northern Telecom, Compaq, Microsoft, NEC and Digital Equipment Corporation) who joined hands to reach an agreement on the peripheral connection standard for a computer. The idea was good for everyone, and although they started with a first model, USB 1.0, different from the current ones, everything was just a matter of evolution.

USB Types: Standards

USB devices are classified into four types based on their data transfer speed: Low Speed (1.0), Full Speed (1.1), High Speed (2.0) and Super High Speed (3.0).

  • USB 1.0. It was the one that appeared in the mid-nineties. The maximum speed at which information could be transferred was 1.5 Mbps. Well, it could be used for connecting devices like the mouse and keyboard for example.
  • USB 1.1. The transfer rate increased to 12 Mbps.
  • USB 2.0. It is undoubtedly the most widespread standard and sends data at a speed of 480 Mbps, although its actual rate is 280 Mbps. In the cable you may find four lines: two for data transfer and two for power.
  • USB 3.0. We can consider it about ten times faster than 2.0. It reaches speeds of 4.8 Gbps. The best thing is that it is still compatible with the previous ones and on top of that, it includes five additional contacts. At present, it coexists with 2.0. in perfect harmony.
  • USB 3.1 It is the last of the standards. In fact it emerged just a few years ago. It reaches a data transfer speed of 10 Gbps. As an incentive, it comes with a new type of connector, connector C.

USB Types: Types of connectors

Now we go to the shapes of USB, which is why we are more familiar with them.

Type A. It is the one that most users will recognize. That flattened rectangle in which we can see internal connections. The male connector is at the end of the cables, while the female is the port itself.

Type B. The ports and connectors belonging to this type are just as recognizable by users, but somewhat smaller and wider than those of type A. As a general rule, we can find them in devices such as printers.

Type C. The Type-C connector has appeared the same as USB 3.1 and the distinguishing feature is that it is reversible. That’s right, no matter which side you insert, it works both ways.

MiniUSB. You may find two different versions of this one, made by 5 or 8 pins. We can see them in cameras, external hard drives, music players and a few other trinkets.

MicroUSB. The microUSB is the smallest and thinnest of all. It is quite flat and was conceived to connect to our smartphones. With them we can transfer information and charge batteries, so we also know it very well.

USB Types: Mistaking them with USB Memory

As we have seen, the concept of USB refers to the connection port. However, the term “USB” has also been extended to refer to pen drives. Pen drives are enabled with a memory that works as a place for storing and transporting data. It’s the rightful replacement for floppy disks and CDs (who doesn’t have one, for God’s sake?!), with different capacities ranging from 1GB to 1TB. Simply because the pen drive connects through USB, they have ended up calling it that. To shorten it. We are that practical and love saving that much.

Once you just got into the technological ins and outs, are you hungry for more? Would you like to go even further in the world of technology? What about spending a couple of minutes to find out what computing system monitoring is and why it is also very important?

Monitoring systems are responsible for supervising technology (hardware, networks and communications, operating systems or applications, for example) in order to analyze its performance, and to detect and alert about possible errors. And this leads us to Pandora FMS, that wonderful tool thanks to which this blog is possible.

Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

2022 年擺脫十大網絡安全壞習慣

2021 年依舊是網絡犯罪頻繁的一年,僅僅在上半年,就有近 190 億筆訊息被曝露,盤點十大網絡安全壞習慣,ESET 資安專家提醒保持警惕,積極主動去改善,相信您就可以擁有安全無虞的2022 年。

1. 沒有定期更新
電腦及設備上的操作系統、瀏覽器和其他軟件中的漏洞是網絡犯罪可以進行攻擊的主要方式之一,在 2020 年發現了超過 18,100 個,而這相當於每天有 50 多個新的軟件漏洞,而您只要一個動作打開自動更新功能並在出現提示時點擊更新,就可以如常您的生活及工作。

2. 不安全的密碼
對多個帳戶使用相同的密碼和易於猜測的憑證,為黑客提供了極大的便利,他們擁有破解弱加密的軟件,利用殭屍網絡(botnet)以自動化方式不斷使用偷來的登入憑證試圖登入網絡服務,稱為憑據填充(Credential Stuffing)。您可以使用密碼管理器來記住具強度的密碼並在提供它的任何帳戶上使用雙重身份驗證 (2FA)。

3. 使用公共 Wi-Fi
黑客可以利用相同的網絡了解您的互聯網使用情況、登錄您的帳戶並竊取您的身份。為了安全起見,請儘量避開這些公共熱點,若您使用時,也避免在連接時登錄任何重要帳戶。

4. 隨意點擊來路不明之連結
網絡釣魚是目前最大的網絡威脅之一,阻止這些攻擊的首要規則是在點擊之前三思而後行,與發送電子郵件的個人或公司仔細核對以確保其合法,不要被迫採取過於倉促的行為。

5. 未在所有設備上使用資安產品
在網絡威脅多變的時代,應該確認所有的電腦設備都有安裝專業且具知名度的資安產品,另外也請確認您的流動裝置(如平板…)是否也有這麼做?

6. 點擊不安全的網站
http:// 是網頁伺服器與您的電腦瀏覽器,以一般(非安全)模式在進行互動交談,所以內容有可能遭攔截竊聽;換句話說,在此類網頁上填寫傳送的資料有可能被有心人士看到。而 https:// 多了一個字母 S 的差別代表 ”安全(secure)”,基本上意謂著,您的電腦與伺服器間的資料傳遞是以加密的方式進行進行互動交談。

7. 工作的電子郵件被用於個人的日常
試想使用工作的電子郵件和密碼在消費性購物網站和其他網站上註冊,如果這些網站遭到破壞怎麼辦?黑客就有可能能夠劫持您的公司帳戶,另外使用未受保護的個人電腦設備進行工作其實也會增加額外的風險。

8. 通過電話提供詳細訊息
語音網絡釣魚(也稱為 vishing)是一種越來越流行的從受害者那裡獲取個人和財務資訊的方式,詐騙者經常偽裝他們的真實號碼以增加攻擊的合法性,所以請儘量避免透過電話發送任何敏感或重要訊息。

9. 沒有定期備份
勒索軟件每年給企業造成數億美元的損失,試想如果突然無法開啟您的電腦,裡頭所有的資料,都可能永遠丟失,其中包括家庭照片和重要的工作文件等等;根據 3-2-1 最佳備份原則,定期備份可在最壞的情況發生時,讓您高枕無憂。

10. 智能設備沒有被保護
近三分之一的歐洲家庭配備了智能設備,如語音助理、智能電視和監視器;但它們也同時連結網絡,也因此成為犯罪分子的目標,進而被劫持並變成殭屍網絡,對其他人發起攻擊,或者變成通往您其他設備和資料的管道。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟件提供商,其獲獎產品 — NOD32防病毒軟件系統,能夠針對各種已知或未知病毒、間諜軟件 (spyware)、rootkits和其他惡意軟件為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲得了更多的Virus Bulletin 100獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布裏斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事處,代理機構覆蓋全球超過100個國家。

Privileged Access Management

Implementing privileged access management in a company is critical to ensuring that there are no information theft and other security issues.

The so-called cyberattacks are responsible, for example, for the theft and hijacking of information in exchange for money, causing several damages to the continuity of an organization’s business. They have become very common and their actions can cause not only financial losses but also image and reputation losses.

Unfortunately, the trend is that over the years, these cyberattacks will become more and more severe and that their number of occurrences will grow.

With this scenario, the importance of privileged access management also grows. Cyberattacks happen through classic malware and phishing methods or the exploitation of zero-day software vulnerabilities, in addition to advanced social engineering techniques.

With all that, privileged access management comes to help ensure that organizations function. Thus, it covers the need to protect data, networks, and devices from malicious actions.

Gartner, in its document Gartner Top 10 Security Projects, named Privileged Access Management (PAM) as the number one priority in security projects. So, what does Privileged Access Management mean and why is it considered so important? That is what we are going to talk about today.

What is Privileged Access?

Before explaining what Privileged Access Management is, we need to understand what privileged access or credential is.

All the time, malicious people appear looking for flaws within the companies’ systems to gain access to confidential data. This threat can be both external and internal. Therefore, organizations are increasingly looking for solutions that are truly capable of protecting this information.

Privileged accounts are created to control access to this data. This access is usually restricted only to people who hold leadership positions (high-level management) and administrators in the IT area. Other employees can obtain this information with the authorization of the company.

Through privileged credentials, significant changes can be made to devices and applications installed on an infrastructure, which in many cases can affect business continuity. The impact of using them maliciously can cause serious damage, from violations of compliance items, which can lead to heavy penalties, to security incidents – which result in reduced trust by the interested parties and lost revenue.

Although it is extremely important, proper control often ends up being flawed. Hence the need to have a tool really capable of directing, tracking, and filtering these accesses. Among the most efficient, we have PAM solutions.

What is a Privileged Access Management (PAM) solution?

Privileged Access Management, also called Privileged Identity Management, enables organizations to protect their privileged credentials. In addition, PAM also ensures the effectiveness of least privilege policies by reducing attack vectors and possible data leaks.

Gartner believes that a PAM solution helps organizations securely provide privileged access to critical assets and meet compliance requirements by managing and monitoring privileged access and accounts.

Basically, a PAM solution works as a secure credential repository for devices installed in the environment. Based on the management of user privileges, one can allow users to access only the data required for them to perform their activities. Thus, the information security team can configure user access profiles, avoiding improper access to systems and data.

What is the Principle of Least Privilege?

The principle of least privilege is one of the bases for information security. Its main goal is to grant users access to environments that are required for them to perform their tasks. In other words, with the principle of least privilege, users do not access environments they do not require, avoiding internal threats, data leaks, and hacker infiltration in critical environments of a company.

Through the senhasegura solution, you have several security locks that ensure users access only the environments required by them. Besides monitoring the way the user is performing privileged access, the senhasegura solution registers, records, and notifies those responsible for information security about any malicious activity within the privileged session.

Through this simple practice, they significantly minimize the chances of a cybercriminal accessing sensitive company data and extracting information.

How is Privileged Access Done?

Privileged access to devices can be performed in two ways: manually (least recommended); and through specific Privileged Access Management (PAM) solutions. In this second case, PAM controls administrative access to a company’s critical systems to help it achieve its cybersecurity goals.

Controlling privileged actions allows one to protect a company’s IT systems against any attempt to carry out malicious actions, such as improper changes in the environment and theft of information. These blocked actions can take place both inside and outside the company.

In this context, using privileged access management technology is essential to optimize the deployment of a cybersecurity infrastructure in companies.

Moreover, the need for effective use of privileged access management techniques has never been greater, as traditional defense mechanisms such as antivirus, VPNs, and firewalls are subject to many failures today.

Thus, a PAM solution should be able to:

  • Allow a company to set several flexible parameters for privileged access control, such as window access, access restrictions for specific users or systems, or access limitation to resources required to perform a task;
  • Be a single repository of administrative credentials across all systems and environments within an organization, resulting in reduced audit time and incident investigations;
  • Link role-based user control to critical systems, applications, and services, thus allowing the connection between a privileged user and an individual, which improves granularity of control and visibility;
  • Provide a scalable, searchable, and comprehensive audit and reporting solution for user activities on critical systems, with the ability to view commands and sessions on those systems.
  • Centralize privilege visibility and control across a single management, policy, and reporting platform for all devices and users, resulting in increased efficiency and unification of the management approach across the environment.
  • Integrate auditing activities for user tasks such as Syslog with other monitoring and reporting technologies such as SIEM (Security Information and Event Management).
  • Strengthen the policies of least privilege for granular control of administrative rights, while facilitating elevation of privileges without the need to assign administrator or root access.
  • Escalate management of all credentials across a range of operating systems and platforms.

Through an architecture that requires no agent installation, senhasegura offers a centralized access point for critical systems. Its features allow strengthening the access control, limiting the user access only to what was previously authorized, respecting the principle of least privilege.

Thus, senhasegura offers full visibility of who has access to these systems and what actions have been taken with the privileged credentials.

Some features of senhasegura include:

Credential Management

Allows secure password storage and centralized access management. From the definition of Access Groups for segregation of roles, one can configure pre-approved or emergency access, or start from workflows with single or multiple approvals, without the user having access to the credential password.

Session Recording

Allows tracking of any action taken during a privileged session to meet any audit or data privacy authority’s demand. In addition, the livestream feature allows real-time monitoring of ongoing sessions and the possibility of remotely ending a session;

Application Identity

senhasegura uses its own template for changing the password of application credentials and stores the new encrypted password in its database. The credential can be viewed directly by the solution’s connection API or inserted directly into the application server connection pool.

When used to manage privileged access on organizational systems and platforms that store or protect the integrity of sensitive data, senhasegura provides a centralized access point for critical systems. Its features allow strengthening the access control, limiting the user access only to what was previously authorized, respecting the principle of least privilege.

Thus, senhasegura offers full visibility of who has access to these systems and what actions have been taken with the privileged credentials. Finally, control and visibility on privileged actions are key factors for an organization to comply with a range of regulatory requirements for system protection. This ensures compliance and business continuity.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×