Skip to content

加入 DeLorean:隨著時間的推移進行數字化轉型!

We travel back in time in search of the first digital transformation

“-Jimmy! Define Digital Transformation!
-I haven’t studied it…
-There are no excuses, it is a very intuitive and well-known concept, even for an elementary school student.
-Mmm…
-Come on, Jimmy! Or I’ll give you an F that will give you blisters!

It was right then that Jimmy rose like a spring, and with his mind blank and his gaze clouded, he snapped a sonorous and mechanical sound to the horizon:

“Digital transformation is that change or advance relative to any application of new digital technologies in all aspects and aspects of human society.”.


-BRAVO, JIMMY! BRAVO!, applauded the whole class.

That day they carried Jimmy out of the building on their shoulders and immediately instituted summer vacations for the entire school, in the middle of October. From here we can only say: Thanks, Jimmy. We will use your neat and undeniable definition to trace today, on Pandora FMS blog, a journey through time in search of the first notions about digital transformation and its consequent repercussions. So join us, if you like, on our tuned, hybrid, and full of diesel DeLorean, to make an absolute reference to Back to the Future.

Digital Transformation in 2011, 2013 and 2015

We have already burned wheels in two parallel lines of fire with our DeLorean and we have reached 2015. Do you remember? Jorge Lorenzo won his third MotoGP World Championship and Juan Goytisolo received the Cervantes Award. That same year the research center MIT Center for Digital Business and the private firm Deloitte declared: “mature digital businesses are focused on the integration of digital technologies, such as social, mobile, analytics and cloud, at the service of the transformation of how business is done. In contrast, less mature businesses are focused on solving discrete business problems with individual digital technologies.” Is it clear enough? If you are not applying digital transformation, your chances of being left behind are high then.

In 2013, the Year of Faith according to the Catholic Church and the year of Luigi according to Nintendo. Not that long ago, not even a line on our DeLorean’s tank marker, we found a very uneven analog-digital conversion, according to Booz & Company, the global strategy consulting team. We are talking about sectors and countries lagging behind in converting from analog to digital. I am sure that if you look back, you will remember the uncertainty and slowness of analog technology. Politicians and strategists at the helm around the world had to step up the development ladder in this paradigm shift. The economy depended on it!

In 2011, with the death of Steve Jobs and the beatification of Pope John Paul II, we find that only a third of the companies around the world have a particular program of truly efficient digital transformation. Sad, yes, but as we travel backwards we will feel this crudeness more strongly.

Digital Transformation in 2000

We refuel our DeLorean in 2000, big milestones of the year? I got Pokemon Gold with Typhlosion at level 91. At that time, digital transformation was a fact very much in mind and in which they were already working, but the arrival of the three Ws (World Wide Web) changed, profusely, the speed and scope that digitization would show. There was increased pressure from societies to pass this process.

Digitization had become a concept/argument that was used at all times. And of course, it had to do with the increased use of the Internet and IT at all scales. This climate, already so common in companies, made us all aware of the issue and even the EU, for example, created the Digital Single Market. From this place arose many of the ideas with which the political agendas of the different countries of the Union were nurtured. The transformation of their different societies began gradually.

Digital Transformation much further back in time

I know you didn’t expect our DeLorean to be past eighty. After all, many believe that from there, apart from the unquestionable Back to the Future franchise, comes all the magic of digitization. However, it is time to accelerate. The Flux Condenser will fume but it will be worth it. If we get stuck in the past, with no possibility of returning, we will learn its customs and form a new family while we make ends meet by investing in aspirin or the gramophone.

In 1703, the King of Portugal, Pedro II, declared himself opposed to the cause of Philip of Anjou and Tsar Peter the Great founded the city of Saint Petersburg. However, the digital transformation has to give thanks at that time to Gottfried Wilhelm von Leibniz, who, attentive, gave birth to the concept of digitization in one of his most transcendental publications: “Explication de l’Arithmétique Binaire”. Years later, 1854, 1938, approx, geniuses as renowned as George Boole and Claude Elwood Shannon complemented and developed it.

In 1939, World War II begins and Gaby, Fofó and Miliki decide to form a comic trio of clowns. But we also have George Stibitz, known in the trade for his work on the development of digital logic circuits and, nothing more and nothing less, than for laying the foundations of the first digital computer. In addition to popularizing the term “digital”, very important for this article.

In 1961, Yuri Gagarin becomes the first human being to travel to outer space and Roy Orbison releases his debut album, “Roy Orbison at the Rock House”. But who interests us is Leonard Kleinrock, the American, engineer and science teacher who conceives the Internet in his work “Information flow in large communication networks”. To this day (the day the article is published), this man is still alive. Better go pay tribute to the door of his house. He resides between New York and Los Angeles and likes camellias.

In 1969, the arrival of Apollo 11 to the Moon and the Beatles’ last public performance. The ARPANET network was also created, commissioned by the US Department of Defense, and which is basically the seed of what we now know as the Internet.

Now that we have returned, unscathed, from our journey in search of the past milestones and nuances of the “Digital Transformation” concept, and now that the DeLorean is parked, until the next adventure (in which we will undoubtedly go see a Tyrannosaurus Rex or a Queen concert), we can resolve that the digital transformation has led to important changes within business models, social and economic structures, political and legal decisions, culture and other organizational patterns that guide us in the present. The concept went from a small and private sector to reach the hands of a huge public, always eager to master new technologies. The question is: In this new kingdom, as we have seen, new and old at the same time, what is your place?

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

關於特權訪問管理的神話和真相

Implementing privileged access management to systems in a company is critical to ensuring that there are no information theft and other security issues.

The so-called cyberattacks are responsible, for example, for the theft and hijacking of information in exchange for money, causing several damages to the continuity of an organization’s business. They have become very common and their actions can cause not only financial losses but also image and reputation losses.

Unfortunately, the trend is that over the years, these cyberattacks will become more and more severe and that their number of occurrences will grow.

With this scenario, importance of privileged access management also grows. Cyberattacks happen through classic malware and phishing methods or the exploitation of zero-day software vulnerabilities, in addition to advanced social engineering techniques.

With all that, privileged access management comes to help ensure that organizations function. Thus, it covers the need to protect data, networks, and devices from malicious actions.

Privileged Access Management

Privileged access management allows one to control all access performed through an organization’s privileged credentials in a system, preventing insider attacks and breaches.

Its deployment allows IT departments to be able to reduce access privileges, following tools and groups. In this way, users will have the right to access only those applications and locations on the network they need to perform their duties. This concept is called the principle of least privilege.

Also, IT can have visibility of how user interactions are being done, access times, how many interactions with the system were performed, which servers were used, and what activities were performed by each user.

With privileged access management, a user – be they from the company or a third party – who has a high privilege will have administrative access to the system using a privileged account.

It is through this credential that one can make changes to various settings, in addition to changing security protections or other user accounts.

In this way, all accesses performed in a company’s network environment must be managed. Furthermore, an unauthorized user should never have access to privileged systems and data.

Are you enjoying this post on privileged access management? So, visit our website and learn more about our products and services.

senhasegura strives to ensure the sovereignty of companies’ actions and privileged information. To do so, we work against data theft and through traceability of administrator actions on networks, servers, databases, and a multitude of devices through a PAM solution.

How is privileged access done?

Privileged access to devices can be accomplished in two ways:

  • Manually (least recommended); and
  • Through specific Privileged Access Management (PAM) solutions.

In this second case, PAM controls administrative access to a company’s critical systems to help it achieve its cybersecurity goals.

Controlling privileged actions allows one to protect a company’s IT systems against any attempt to carry out malicious actions, such as improper changes in the environment and theft of information. These blocked actions can take place both inside and outside the company.

In this context, using privileged access management technology is essential to optimize the deployment of a cybersecurity infrastructure in companies.

Moreover, the need for effective use of privileged access management techniques has never been greater, as traditional defense mechanisms such as antivirus, VPNs, and firewalls are subject to many failures today.

Myths and Truths

Now let’s take a look at some myths and truths about privileged access management:

1. Using PAM tools can completely prevent all cyberattacks.
Myth. This type of attack on the security of corporate networks is becoming more and more sophisticated. Therefore, there is no way for PAM to completely prevent all cyberattacks. However, this tool guarantees a lot of security for networks, preventing or mitigating the vast majority of attacks. In addition, it also needs to be constantly optimized to keep up with the boldness of cyberterrorists. As such, it is quite secure to avoid these problems.

2. Cyberattacks can be performed using privileged credentials.
True. Threats are becoming more sophisticated and intelligent, making use of attack techniques and tools to infiltrate company networks less visibly. Thus, cyberterrorists are investing in finding and taking advantage of privileged credentials to open their way to attack. That is why it is necessary to have a robust and reliable PAM tool to increasingly stop these attacks.

3. All companies invest in PAM.
Myth. Unfortunately, many companies remain blind to the importance of stopping attacks on their systems and end up not investing in tools for managing privileged access. Many of them believe there is no risk of intrusion when privileged access exists. But this is a wrong belief that could lead the company to bear huge losses later.

4. PAM deployment requires the use of shared accounts.
Myth. PAM has nothing to do with it. The use of shared accounts in itself poses a major cybersecurity risk. Also, many companies have had problems modifying the behavior of privileged users and administrators concerning this issue, posing a great risk to the company.

5. PAM allows you to create non-privileged accesses to a company’s network.
True. Although it seems that PAM only creates privileged access and accounts, in the most modern corporate tools of this system, it is also possible to create other types. In fact, PAM needs to facilitate any form of controlled connectivity to the system, through session and password management, and other security services, as well as monitoring and logging of activities.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.