Skip to content

網絡漏洞詳解:尋找並修復潛在風險的指南

想像一下,您在深夜沿著一條漆黑的高速公路行駛,突然您的車撞上了路上一個看不見的物體,您感覺到一陣顛簸。雖然一切似乎無礙,您便繼續前行。但幾英里後,儀表板上一個警示燈閃爍起來 —— 您的機油壓力過低。原來,那個看不見的物體撞裂了您的油底殼,造成了緩慢而無聲的洩漏,而現在這已演變成一場緊急情況。

在網絡安全領域,這些隱藏的危險就是「網絡漏洞」—— 它們是您數碼基礎設施中的裂縫,如果不及時處理,最終可能導致毀滅性的資料外洩。了解這些裂縫形成的位置,是在為時已晚之前將其封堵的關鍵。 什麼是網絡安全漏洞? 網絡安全漏洞是您組織的硬件、軟件或流程中存在的任何瑕疵或弱點,攻擊者可以利用這些弱點進行攻擊。網絡犯罪分子會積極尋找這些漏洞,以獲取未經授權的存取權限、竊取資料或部署如勒索軟件等惡意軟件。這些漏洞可能是實體性的,例如路由器上的缺陷讓攻擊者能夠攔截數據;也可能是邏輯性的,例如應用程式中的錯誤讓入侵者得以滲透到您網絡的關鍵部分。 漏洞隱藏在哪裡?網絡風險的三個層次 網絡漏洞並非單一類型的問題;它們存在於您的整個技術棧中 —— 從實體硬件到其上運行的軟件,甚至在於使用者的行為之中。

1. 實體層:硬件與設備風險

連接到您網絡的每一台設備都是一個潛在的入口點。在今日這個高度連結的世界裡,這個邊界正不斷擴大。
  • 物聯網 (IoT) 設備: 智慧攝影機、感應器和其他連網設備通常優先考慮便利性而非安全性。由於預設密碼薄弱且製造商未能及時提供修補程式,它們成為了像 Mirai 這樣的殭屍網絡的主要目標。
  • 未經授權的個人設備 (BYOD): 當員工將個人手機或手提電腦連接到公司網絡時,他們可能在不知不覺中引入惡意軟件。由於無法控制他們安裝的應用程式或其更新修補的紀律,這些設備構成了重大風險。
  • 可攜式媒體: 遺留在停車場的 USB 隨身碟是一種經典的社交工程伎倆。一位毫無戒心的員工的好奇心可能促使他將其插入工作站,從而釋放惡意軟件並使其在整個網絡中傳播。
  • 不安全的無線存取: 一個設定不當的 Wi-Fi 網絡等於為入侵者敞開了大門。薄弱的加密協定和不良的訊號管理,可能讓攻擊者從街上就能存取您的內部網絡。
2. 邏輯層:軟件與設定缺陷 管理您網絡的程式碼和設定,是產生關鍵漏洞的常見來源。
  • 設定不當的防火牆: 防火牆是您網絡的邊境管制,但一個簡單的拼寫錯誤或一條過時的規則,都可能留下一個足以讓攻擊者溜進來的安全缺口。
  • 過時或未修補的軟件: 這是最常見且最危險的漏洞之一。攻擊者會無情地利用作業系統和應用程式中的已知缺陷,因此,嚴謹的修補程式管理計畫至關重要。
  • 惡意軟件與勒索軟件: 雖然惡意軟件本身是一種攻擊,但其透過網絡傳播的能力,使其成為對其他系統的漏洞。一旦進入內部,它就可以橫向移動,感染關鍵資產,並使入侵事件升級。
3. 人為層:不可預測的因素 技術的安全性取決於使用它的人。無心之過往往是組織防禦中最薄弱的環節。
  • 網絡釣魚與社交工程: 一封以假亂真的電子郵件可能誘騙員工洩露其登入憑證。有了有效的憑證,攻擊者可以繞過技術防禦,冒充合法用戶進行操作,使其極難被偵測。
  • 薄弱的密碼與驗證機制: 簡單、重複使用或容易猜測的密碼是一個持續存在的漏洞。缺乏多重要素驗證(MFA)會加劇此風險,使攻擊者能輕易地透過暴力破解法來接管帳戶。
  • 內部威脅: 無論是惡意還是意外,擁有過多存取權限的內部人員都可能造成巨大損害。員工可能故意竊取資料,或者他們可能不小心從一個高權限帳戶點擊了惡意連結,等於將整個王國的鑰匙交給了攻擊者。
建立具韌性的防禦:一個緩解風險的框架 強大的防禦並非單靠一個工具,而是一個建立在可視性、控制力與情資力之上的持續性策略。 1. 獲得全面可視性:了解您的弱點 您無法保護您看不見的東西。
  • 漏洞掃描: 定期掃描所有網絡資產,以識別並描繪出您在作業系統、韌體和應用程式中的弱點。
  • 集中式監控: 使用安全資訊與事件管理(SIEM)解決方案來匯總您整個環境中的日誌和安全數據。這為您提供了一個單一管理平台,以關聯事件並偵測威脅。
2. 建立主動式控制:強化您的防禦 一旦您能看見風險,就必須採取行動來彌補缺口。
  • 網絡分段: 將您的核心資產隔離在獨立、嚴格控制的網絡區段中。這能有效控制潛在的入侵,防止攻擊者從安全性較低的區域橫向移動到您的核心資產。
  • 嚴謹的修補程式管理: 及時應用安全更新。根據漏洞的嚴重性及其面臨的威脅,來決定修補的優先順序。
3. 依據情資行動:預測攻擊者的動向 將眼光放遠,以了解整個威脅態勢。
  • 整合威脅情資: 利用即時的威脅情資饋送,了解哪些漏洞正被攻擊者在現實世界中積極利用。這能幫助您優先處理那些構成最直接危險的威脅。
結論:從被動修復到自信航行 歸根究底,保護網絡就像維護一輛複雜的汽車。它需要定期的檢查(可視性)、勤奮的維修(控制力),以及對前方路況的了解(情資力)。透過採納這種全面、多層次的方法,組織可以從被動地應對威脅,轉變為在數碼的康莊大道上自信地航行,為前方可能出現的任何顛簸做好準備。

關於 Graylog
Graylog 通過完整的 SIEM、企業日誌管理和 API 安全解決方案,提升公司企業網絡安全能力。Graylog 集中監控攻擊面並進行深入調查,提供卓越的威脅檢測和事件回應。公司獨特結合 AI / ML 技術、先進的分析和直觀的設計,簡化了網絡安全操作。與競爭對手複雜且昂貴的設置不同,Graylog 提供強大且經濟實惠的解決方案,幫助公司企業輕鬆應對安全挑戰。Graylog 成立於德國漢堡,目前總部位於美國休斯頓,服務覆蓋超過 180 個國家。

關於 Version 2 Digital
Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Parallels RAS 20.2 正式登場!

Parallels RAS 20.2 正式登場!立即更新,體驗專為管理員與終端使用者度身訂做的全新功能與改良升級,進一步提升靈活性、便利性及整體效能。

以下是 20.2 版本的幾項重點功能:

  • VMware 數據存儲靈活性提升:VMware 使用者現可為虛擬機複製選擇不同數據存儲,強化高可用性與自動化效率。
  • 全面支援 Windows Server 2025:所有基礎架構組件已兼容 Windows Server 2025,Microsoft Hyper-V 2025 支援即將推出。
  • 工作區使用體驗升級:新增 Z-order 功能,讓遙距應用程式與本地應用程式自然層疊,帶來更流暢的使用者體驗。
  • Azure 虛擬桌面代理修復便捷化:IT 管理員可集中修復並重新部署不可用的 Azure 虛擬桌面代理,加速故障恢復。
  • Azure 虛擬桌面代理維護排程:管理員可設定兩個維護時段,避免更新影響業務高峰期。
  • Linux 進階攝影機重定向:Parallels Client for Linux 現支援進階攝影機與音訊重定向,提升遙距視訊會議品質。
  • Android 與 iOS / iPadOS 攝影機支援:遙距會話中可使用流動設備攝影機,提升倉庫管理等工作流程效率。
  • RADIUS MFA 自動化增強:支援超過五個自動化選項,簡化選擇流程並提升易用性。
  • 輕量級身份提供者整合:Parallels RAS 現可無縫銜接第三方身份提供者(如 Azure、Okta),無需額外配置 RAS 註冊伺服器。

 

欲深入了解 Parallels RAS 20.2 的所有新功能與改進,歡迎登入 Parallels Portal 或聯絡我們!

關於 Parallels

Parallels 是全球領先的跨平台解決方案品牌,為公司企業和個人用戶提供簡單的方式,讓他們在任何設備或操作系統上使用和存取所需的應用程式和檔案。無論是 Windows、Mac、ChromeOS、iOS、Android 還是雲端服務,Parallels 都能幫助客戶充分利用最佳技術。Parallels 解決了複雜的工程與使用者體驗問題,讓企業和個人用戶能夠隨時隨地簡單且具成本效益地使用應用程式。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

選擇 Storware Backup Appliance 的 7 大理由 強大.簡單.隨時可用。

在數據管理和保護日益重要的今天,選擇一款高效、安全且可靠的備份解決方案至關重要。Storware Backup Appliance 是一款專為公司企業設計的數據保護解決方案,提供強大且靈活的備份功能。以下是您選擇 Storware 的 7 大理由:

1. 全面的多平台支援
Storware Backup Appliance 兼容多種 IT 環境,包括 VMware、Hyper-V、OpenStack、OpenShift、Nutanix、VergeOS、KVM、Citrix 以及 AWS、Azure 和 Google Cloud 等雲端平台。其強大功能覆蓋虛擬、物理及容器化工作負載,確保從單一設備提供統一的數據保護。

2. 勒索軟件安全防護
Storware 配備最先進的安全措施,包括數據加密、不可變備份(Immutable Backup)、隔離備份(Air-Gap Backup)、存取管理、RBAC 角色存取控制及多重身份驗證(MFA),有效抵禦網絡攻擊及人為錯誤,確保關鍵數據安全無虞。

3. 快速且靈活的還原選項
Storware 提供極速還原功能,滿足不同需求,包括完整虛擬機器還原、文件還原及應用層級還原。其數據傳輸與儲存技術,讓企業能夠迅速恢復營運,減少停機時間。

4. 雲端與混合雲端兼容
Storware Backup Appliance 可無縫整合公共雲端與私人雲端環境,使企業能夠在混合雲端架構中延伸數據保護策略。此外,其高效的數據重複刪除技術(Deduplication)能有效降低雲端備份的儲存成本及頻寬需求。

5. 直覺化管理與報告功能
從初始設置到日常管理,Storware 的用戶友好儀表板可集中管理備份作業。其可自訂的報告、自動化任務排程及詳細分析功能,讓企業完全掌握備份環境的運作狀況。

6. 可擴展且未來適用
Storware Backup Appliance 具備卓越的可擴展性,能根據企業需求成長,提供具成本效益的儲存及運算升級,無需進行昂貴的大規模升級或影響現有業務運行。

7. 具競爭力的價格
Storware Backup Appliance 透明的價格政策,無隱藏費用或儲存限制,幫助企業最大化投資回報(ROI)。企業可預測成本,並享受企業級功能與支援,確保價值與預算的完美平衡。

立即行動,選擇全球最具靈活性的備份設備!

Storware Backup Appliance 預先配置,可快速部署,讓您在數分鐘內啟動運行,無需繁複設置,並提供多種便利的支援選項,以滿足您的業務需求。

關於 Storware

Storware 是一家專注於備份軟件的企業,擁有超過十年的行業經驗。Storware 的備份與還原解決方案適用於各種數據環境,無論是虛擬機、容器、儲存提供商、Microsoft 365 還是運行在本地或雲端的應用程式,均能提供支援。其小巧的設計使其能夠無縫整合進現有的 IT 基礎設施或企業級備份方案中,提供極為便捷的備份保護。

關於Version 2

Version 2 Digital 是立足亞洲的增值代理商及IT開發者。公司在網絡安全、雲端、數據保護、終端設備、基礎設施、系統監控、存儲、網絡管理、商業生產力和通信產品等各個領域代理發展各種 IT 產品。透過公司龐大的網絡、通路、銷售點、分銷商及合作夥伴,Version 2 提供廣被市場讚賞的產品及服務。Version 2 的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

Racing with MITRE to forge ESET Inspect for SOC and MDR use

 

ESET’s journey through 2024’s TTP-heavy Enterprise ATT &CK evaluation demonstrates both progress and scope for continued enhancement of our detection-and-response solution, as well as an interesting contrast with commercial tests.

Six years into MITRE Enterprise evaluations, with their consistent focus on attack emulations leveraging a vast collection of tactics, techniques and procedures (TTPs), vendors are now finding evolved detection and protection scenarios added to the mix. MITRE’s team of experts has clearly been working agilely, prompting vendors to adapt to the new test environment. Simultaneously, vendors looking to position themselves for the “win” and improve sales prospects increasingly face a paradox with MITRE: It’s still not a competitive test. Rather, the takeaways provide most value to security analysts involved in the day-to-day work of operating endpoint detection and response platforms.

This year’s evaluation has introduced some substantial changes. Notably, MITRE dropped telemetry from the detection categories, raising the threshold for a recorded event to be considered a detection. To counteract vendors’ gaming products to “win” or “detect everything,” a proportion of substeps now test for false positives rather than detections, while other substeps are not evaluated at all. In a final nod to address “points” accumulated via “detecting everything,” MITRE measures the number of detections in the dashboard, again cutting into “point gain” via bloated numbers of detections.

ESET also brought changes to the table, most significantly by fielding ESET Incident Creator, a module in ESET Inspect for incident-focused handling of threats. Incident Creator proved its use case in the detection portion of the evaluation, transforming how analysts are presented with detections generated from a cyberattack; detections are rolled up into incidents, giving analysts a focused view of how each attack progressed. With this tool in hand, we demonstrated good visibility into each attack scenario, detecting all steps and most meaningful substeps while maintaining a low volume of detections. Thus, for ESET, most missed substeps, e.g., API calls, provide the analyst with little to no value, could be discovered via other means, and present almost no loss of information for the reconstruction of the attack.

What we learned about our product

The most recent round of the ATT&CK Evaluations Enterprise pitted multiple vendors’ detection and response platforms against three attack scenarios named DPRK, CI0p, and LockBit, as well as a battery of 10 protection tests. With well-recognized research on all of the threat groups chosen for the scenarios, ESET engineers were interested to observe how ESET Inspect’s behavior could translate to supporting SOC operators as well as organizations leveraging security service offers such as ESET MDR.

With a nod to ESET’s preoccupation with efficiency, and MITRE’s new rules seeking to limit a detect-everything approach, the three attacks generated plenty of detections – correlated into incidents – allowing incident responders to easily understand how the attacks happened and thus take quick remediation. Additionally, the Incident Creator module eliminated considerable noise for the benefit of threat analysts – another priority for ESET, both inside and outside this test environment.

Turning off protection for the evaluation, and back on for the real world

With one of MITRE’s goals being to examine coverage of the TTPs in the ATT&CK knowledge base, vendors’ products in the detection scenarios are configured to not block or kill any of the threats they encounter. This is an important point because, in the real world, many of the threats employed in these scenarios would have been blocked either on first encounter or very soon thereafter.

For ESET, there are several fitting cases to highlight: The CI0p and LockBit ransomware samples, along with a couple other samples, would have been blocked in the first evaluation run. Although masked by the evaluation’s focus on ESET Inspect, it was actually ESET Live Guard Advanced, a key technology layer in the ESET PROTECT platform, that was behind the initial detection and blocking of these ransomware samples. Any remaining malware would have been blocked on the second run. This is good news in the real world because it means that customers benefit from efficient protection against threats.

In regard to the protection tests, while there are a few areas to improve the coverage provided by our products, 2024’s tests mainly focused on isolated and sometimes not clearly malicious substeps that, in the real world, could actually be benign and thus cause harm to customers if blocked. On real-world systems, cyberattackers aren’t running techniques and procedures “atomically,” i.e., disconnected from a full attack chain. Instead, their operations are a buildup, and the task of detection and response solutions is to correlate the full context to identify correctly that something malicious is afoot.

Figure 2. Detection of the SDBbot installer in the Cl0p config change run

Figure 3. Detection of the Firefox password stealer in the LockBit config change run

We are left feeling that the pursuit of total coverage of the ATT&CK knowledge base does not necessarily improve defenses or automatically assist security analysts in their daily work. In contrast to forensics or malware analysis, detection and response require only enough coverage of highly prevalent or severe techniques (or substeps) for the analyst to trigger a response. Missing detections for low-prevalence or low-severity techniques does not necessarily translate to lower protection. Quite the opposite, it could mean that work is streamlined, and remediation is faster because the major steps needed to identify the attack are immediately highlighted, thereby allowing a timely and adequate response to be triggered – in some cases even with automatic blocking of the detected threat.

Again, outside the ATT&CK Evaluations and atomic testing scenarios, third-party tests usually design scenarios that don’t prioritize coverage of TTPs. Instead, they measure blocking, false positives, performance, cost, and the like by a fully functioning product suite. They also focus more on critical steps of an attack, such as endpoint compromise and foothold, internal propagation, and asset breach.  The ultimate arbiter is stopping an attack, whether by blocking malicious files or killing malicious processes, or at least providing the security analyst with the means to do so.

“What sets this solution apart is its ability to deliver rapid response times, robust threat intelligence, and strong ransomware protection, all while offering strong compliance and localization support.”

-Warwick Ashford, Senior Analyst at KuppingerCole

A number of strong results demonstrate the efficacy of real-world performance. This includes real-world tests, such as AV-Comparatives’ Endpoint Prevention & Response (EPR) Test 2024 and 2023, and analyst perspectives, including selection of ESET as a leader in both KuppingerCole’s Leadership Compass for MDR and Leadership Compass for Endpoint Protection Detection & Response.

In KuppingerCole’s executive summary of the EPDR market, they discuss the wider industry’s use of the MITRE ATT&CK framework, as well as the fact that endpoint protection platforms and EDR tool sets have converged into the logical integrated pairing of Endpoint Protection Detection & Response (EPDR). This means the majority of vendors aim to improve based on MITRE’s micro-emulation of techniques and procedures, while developing successful, integrated EPDR proven by industry-standard, real-world testing. Ideally, covering these two scopes makes for battle-ready detection and response.

Battle-ready EPDR

In fact, EPDR solutions are the battle-ready systems that institutions and businesses invest in, deploy, and operate today. Above and beyond this, ESET continues to seek out other avenues to challenge its products and its engineers. Perhaps the zenith of this search has been reached with our regular participation at Locked Shields, a military simulation of today’s digital battlespace organized by the NATO Cooperative Cyber Defense Centre of Excellence.

In 2024, more than 60 ESET system engineers, security monitoring analysts, malware researchers and analysts, and comms specialists formed ranks with defenders from the Slovak and Hungarian militaries and the private and academic sectors to defend our assigned battlespace.

Our tool, ESET Inspect, backed by our multilayered security platform ESET PROTECT, was central to Slovakia-Hungary’s fourth place out of 18 participating teams and helped the team to top three placings in cyber threat intelligence, client-side protection and forensics. This cyber-battle simulation was an intensively immersive experience for all the technologists involved, whether as threat analysts working to understand the TTPs to anticipate the next stages of an attack or engineers configuring cyber defenses.

Conclusion

ESET remains as motivated to leverage MITRE’s Enterprise Evaluations to feed technical audiences with critical food for thought as we are to invest our institutional knowledge in Locked Shields to advance both our security practice and that of our NATO partners. The output of our engagement with MITRE, whether via the +350 contributions to the ATT&CK knowledge base or participation in the ATT&CK Evaluations, continues to be sharpened detection and response capabilities tuned to the real world and protecting our shared progress.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scale Computing Named 2024 DCD>Awards Edge Data Center Project of the Year Winner

Scale Computing Named 2024 DCD>Awards Edge Data Center Project of the Year Winner

INDIANAPOLIS – December 19, 2024 – Scale Computing, the market leader in edge computing, virtualization, and hyperconverged solutions, today announced that Data Center Dynamics (DCD) has honored its deployment with Royal Farms—an established convenience store and fuel chain with more than 300 U.S. locations—with the 2024 Edge Data Center Project of the Year award.

The DCD>Awards recognize exceptional innovation, leadership, and results within the data center industry. This award category recognizes projects that can demonstrate a unique and strategic approach as to how a successful Edge deployment is designed, set up and operated, and show how this creates new and exciting opportunities for delivering on IT and business objectives. This year’s distinction spotlights the successful partnership between Scale Computing and Royal Farms, showcasing how a forward-looking edge computing strategy can transform operational efficiency, reduce complexity, and deliver a superior customer experience.

Royal Farms sought a modern, resilient, and cost-effective edge infrastructure solution to streamline IT operations across its distributed locations. By deploying the Scale Computing Platform (SC//Platform) at the store level, the company dramatically simplified its infrastructure, shortening installation times by 90% and decreasing management overhead and licensing costs by 75%. The result was a self-healing, automated environment that ensures reliable performance and high availability for critical applications, ultimately improving daily operations and enabling continuous innovation at the edge.

“We’re honored that Data Center Dynamics has recognized our work with the 2024 Edge Data Center Project of the Year award,” said Jeff Ready, CEO and co-founder, Scale Computing. “This award highlights how advanced edge computing solutions can redefine distributed IT environments, enabling organizations to improve performance, reduce complexity, and ultimately deliver a better experience to their customers.”

By continuing to deliver agile, high-performance solutions that simplify deployment and maintenance across distributed environments, Scale Computing helps organizations like Royal Farms gain unprecedented control over their IT environments. As enterprises increasingly embrace the edge to meet customer demands and drive competitive advantages, Scale Computing remains committed to delivering solutions that enable seamless, reliable, and cost-effective operations no matter where data and applications reside.

The DCD>Awards recognizes the most outstanding projects, people and teams across 17 categories. An independent panel of judges reviewed hundreds of entries submitted. Winners were announced December 11th at the 18th annual awards ceremony at Grosvenor House in London, and broadcast live worldwide.

To learn more about Scale Computing’s edge computing solutions and its award-winning work with Royal Farms, watch the video case study and explore additional insights at: https://www.scalecomputing.com/resources/why-royal-farms-chose-scale-computing.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×