Skip to content

Portnox 和 Cisco Meraki:更好地保護和控制雲託管 IT 的訪問

The Rise of Cloud Managed IT

Digital transformation is engulfing enterprise IT, with many legacy solutions migrating to the cloud. Paired with the Bring-Your-Own-Device (BYOD), Internet of Things (IoT), cloud adoption and mobile workforce trends, CISOs, network admins and IT teams are faced with new and complex challenges in securing their risk-based perimeter. As that perimeter extends off campus to remote environments, the need arises for convenient access that will encourage productivity and increase efficiency, while enforcing security policies and controlling exposure to emerging cyber threats.

Access Control Meets Cloud Managed IT

The Cisco Meraki and Portnox NAC-as-a-Service partnership helps enterprises realize the potential of cloud managed IT by providing complete visibility, control and management capabilities for network access. As enterprise begins to implement digital transformation, through BYOD, Internet of Things, the mobile workforce and cloud infrastructure, pervasive security tools are required to ensure that access is secured across the risk-based perimeter.

Together, Meraki and Portnox provide mid-market organizations and enterprises with the cloud and compliance infrastructure they need to embrace the benefits of digital transformation, while securing, controlling and appropriately managing access across all network endpoints.

Quick and easy deployment, low operational costs and flexible on-boarding of network endpoints makes the Meraki-Portnox collaboration an essential security tool for the innovative enterprise.

The Key Features of Our Joint Offering

  • Enhanced Security: Secure access in all locations and at all times for wired, wireless, and VPN access. 802.1x provides top-notch user authentication, adding a layer of multi-factor authentication (MFA) to VPN.
  • Full Visibility: Achieve full visibility into all network endpoints, from operating systems through to open ports and onto running applications. Carry out persistent posture assessments on devices and determine their level of access based on a machine learning devised risk score.
  • Zero-Touch Deployment: Start controlling network access today with a pre-deployed and integrated environment including certification authority (CA), RADIUS, user databases and more.
  • Complete Control Over Access: Discover all network endpoints and authorize access regardless of the endpoint’s credential validity to allow for gradual deployment of 802.1x access protection.
  • Flexible On-Boarding: Add devices to wired/wireless networks based on a variety of pre-defined or unique parameters, as well as an option for secured persistent access for contractors and guests.
  • Deep Dive into Devices: Gain context on the devices connecting to your network to better understand their level of risk including information on installed applications, services, certificates, users, open ports and user locations.
  • Widen Switch Support: The joint solution supports 802.1X, certificate, domain and MAC authentication, as well as group-based dynamic VLAN assignments.
  • Move from CAPEX to OPEX: Make the capital expenditure you continually invest in maintaining legacy security solutions operational expenditure that is investor based on level of need and degree of service use.
  • Compliance Compatible: Easily implement compliance directives automate policy management and enforcement across the network.
  • Stable and Secure Enterprise Grade Solution: With a highly available yet secured RADIUS Server, as well as agent support for all platforms, ensure business continuity no matter the circumstances.
  • Support for MSP/MSSP Model: Service providers can easily manage their existing subscriptions together with Portnox, making the solution part of its repertoire of services, including rebranding options as needed.

Portnox-Meraki Use Cases

Portnox and Meraki’s joint offering is great news for network security, access and control. Here’s how the solutions work together, providing benefits that are made possible by joining forces:

  • Persistent risk assessment of employee and contractor workstation to devise a network access control policy based on usage, location and a number of other endpoint characteristics.
  • Perform risk assessments and provide access through a one-time password when accessing over the VPN.
  • Simply control network segmentation based on VLAN assignment and Active Directory Groups.
  • Certificate-based authentication across the entire enterprise – ideal for a multi-site environment.
  • Allow for sponsored guest access, making it easier for guests and contractors to access what they need on the network, while controlling the method and scope of access permissions based on endpoint compliance and risk score.

 

About Cisco Meraki
Cisco Meraki is a cloud managed IT company that offers comprehensive solutions for organizations to manage all of their IT needs in one place. Meraki’s set of services include: wireless, switching, security, communications, EMM, security cameras and more, all managed through Meraki’s web-based dashboard interface. Meraki was founded in 2006 by Sanjit Bishwas, John Bicket and Hans Robertson and was acquired by Cisco in 2012.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

runZero 3.0:查看我們的新名稱,並從 Qualys 同步資產、軟件和漏洞數據

What’s new with runZero 3.0?

  • Meet our new brand: runZero!
  • Sync assets, software, & vulnerability data from Qualys

Introducing runZero

Rumble is officially runZero! This name change reflects our growth as a product and as a company. Over the past year, Rumble has added so many new capabilities, presenting an opportunity to evolve so that our brand reflects all of our existing and planned features. runZero continues our mission of making asset inventory easy, fast, and accurate, while giving us runway to grow our platform.

Gathering vulnerability data from Qualys

runZero Enterprise users can now enrich their inventory with vulnerability data from Qualys. This allows you to search for Qualys attributes, software entries, and vulnerabilities in runZero, as well as find assets not scanned by Qualys. runZero automatically correlates Qualys assets to runZero assets based on unique fields. Vulnerability data can be viewed in the asset detail view as well as a dedicated inventory tab. Vulnerability attributes include CVSS score, relevant CVEs, vulnerability description, and any recommended remediations.

To get started, set up a connection to Qualys.

Qualys integration

Release notes

The runZero 3.0 release includes a rollup of all the 2.15.x updates, which includes all of the following features, improvements, and updates.

New features

  • Rumble is now runZero and the product UX has been updated to match.
  • runZero Enterprise customers can now sync asset and vulnerability data from Qualys VMDR.
  • Users can now specify a Default Organization in the profile settings page.
  • A custom query to find DrayTek Vigor routers has been added.
  • The Organization API now supports asset merging.

Product improvements

  • Outlier calculations and insight queries now automatically run as daily analysis tasks.
  • Outlier calculations and insight queries can be regenerated on demand using the Metrics menu on the Tasks overview page.
  • Merging assets with foreign attributes from the same source now retains all sets of foreign attributes.
  • Software entries imported from SentinelOne and Tenable now report their service addresses.
  • The Software and Vulnerabilities datatables now have a “view more details” button.
  • The Asset and Service attributes reports can now be filtered by Site.
  • API keys are now shown hidden by default and can be copied to the clipboard through a click.
  • Vulnerability details are now available on the Vulnerability Inventory screen.
  • Improved ability to extract Microsoft Windows information from web services.
  • Improved ability to extract information from NetBIOS, including new detection of Domain Controller roles.
  • Hosted Zone scan limits have been increased.
  • The runZero Explorer now logs configuration file loading and reports any syntax errors.
  • Hostname identification from LDAP responses has been improved.
  • Filtering of non-unique MAC addresses has been improved.
  • Inconsistent SNMP data handling has been improved for certain classes of devices.
  • The API now returns all attributes, sources, and subnets for a single asset.
  • The runZero Explorer now runs as a delayed auto start process on Windows to increase reliability after reboots.
  • The Organization Overview report now includes navigation links to return to the top of the report.
  • Click-to-copy functionality has been restored for MAC addresses displayed on inventory pages.
  • Asset export query errors now return HTTP 400 status code with descriptive bodies.

Performance improvements

  • The Queries datatable has been redesigned and is now more performant.
  • The Route Pathing report is now more performant and aborts early in out-of-memory scenarios.
  • Processing speed for large Nexpose and Tenable imports has been improved.
  • Improved support for processing very large scans.
  • Improved performance of the software and vulnerabilities tables.

Fingerprinting changes

  • Improved operating system fingerprints for Amazon, Azure, and GCP integrations.
  • Improved operating system fingerprints for Red Hat Enterprise Linux / CentOS, Fedora, Rocky, and Ubuntu releases.
  • Improved fingerprints for Windows operating system.
  • Added the ability to fingerprint McAfee ePolicy Orchestrator (ePO) and Agent.
  • Improved NetBIOS, NTLM, and LDAP fingerprinting logic.
  • Improved coverage for networking gear, including vendors Cisco, Dell, and Extreme Networks.
  • Improved NTP banner fingerprints.
  • Printer detection has been improved.
  • OS fingerprinting will now use Rapid7 fingerprints, when Rapid7 is the only data source.
  • Additional support for products by 2N, Axis, D-Link, DrayTek, FortiNet, Foscam, FrontRow, Hisense, Impinj, Kentec, OleumTech, Schneider Electric, SEL, Synology, and VMware.

Integration improvements

  • Improved hostname-based merging for Rapid7 imports.
  • Improved support for processing very large Rapid7 imports.
  • Software will now be populated from Rapid7 imports.
  • Rapid7 foreign attributes have been adjusted for clarity.
  • Services will now be populated from Censys.
  • The InsightVM integration now supports larger imports.

Bug fixes

  • A bug in the AWS Configuration UI causing the “Lambda instances” option to not persist has been resolved.
  • A bug that could prevent external users from being directed to their main SSO login page has been resolved.
  • A bug which could cause stale software entries to be retained has been fixed.
  • A bug in the Insights table which could render very large buttons has been fixed.
  • A bug that could lead to a 500 error when accessing the users endpoint of the organization API has been resolved.
  • A bug that could cause tooltips to persist on the screen has been resolved.
  • A bug that could cause the vulnerabilities table to appear empty when sorted by the details column has been fixed.
  • A bug that could cause the HTTP probe to abort early has been resolved.
  • The asset tag update and bulk asset tag update APIs now work as documented.
  • Fixed a bug which prevented all org admins from deleting other users.
  • The User Last Activity date now shows the correct date.
  • A bug that could prevent connector tasks from running in parallel while connecting to third-party APIs has been resolved.
  • A bug that prevented organization administrators from deleting other users has been resolved.
  • A bug affecting inventory multi-select operations has been resolved.
  • A bug preventing inventory column selection has been resolved.
  • A bug that could indefinitely stall a task has been resolved.
  • A bug affecting license warning banners has been fixed.
  • A bug affecting macOS Explorer upgrades on M1 systems has been fixed.
  • A bug that prevented importing VMware assets has been fixed.
  • When a templated task fails due to an Explorer being unavailable, copying the failed task now retains the connection to the template.
  • A bug in the Overview report which showed blank addresses for Unscanned assets has been resolved.
  • A bug that caused scan copies to get assigned to a different site has been resolved.
  • A bug that prevented OS icons from showing on inventory tables has been resolved.
  • A bug that prevented copying or updating Nessus connector tasks has been resolved.
  • A bug that could lead to an error in the External Asset Report when no assets were present has been resolved.
  • A bug that could cause the Export API to return a 500 instead of 400 for invalid queries has been resolved.
  • A bug that caused some Explorer updates to fail on Windows has been resolved.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About runZero
runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network–without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.

最完整的比較:Pandora FMS Open Source vs Pandora FMS Enterprise

What is Pandora FMS Open Source?

Pandora FMS Open Source is not a freemium software, it is not bloatware nor shareware (*Wink for those born before the 80s). Pandora FMS is licensed under GPL 2.0 and the first line of code was written in 2004 by Sancho Lerena, the company’s current CEO.

At that time, free software was in full swing and MySQL was still an independent company, as was SUN Microsystems. Today there are thousands of users of the Open Source version that regularly download updates through the system that we designed for that specific purpose.

We do not know more about the subject (neither their names, nor their companies…) because, above all, we respect privacy.

We consider Pandora FMS to be a real free software. The project has been active in Sourceforge since 2004 and we have all the awards granted by this entity that leads Open Source. All the code is available on Github in real time, but we do believe that there is something more important and that is the documentation we have available in five languages (Spanish, English, French, Japanese and Russian), with a level of depth that allows you to get the most out of it without having to pay for certifications, training or consulting.

Printed, the manual has more than 1,000 pages (per language) and is maintained by our professional development team, Q&A, translators and professional documentalists. We also have a public forum where we solve questions, with more than 15,000 messages.

We believe that freedom consists in offering users options, not just giving them part of the pieces of a puzzle without instructions.

Pandora FMS Enterprise

However, Pandora FMS has a version based on a commercial license that extends some of the features present in Pandora FMS OpenSource version. This license incorporates additional source code that is not publicly available or free of charge.

These features are oriented to demanding professional environments that require some automation and more specific tools already created to use them in operation and with professional support so that if something fails they can ask and get a patch if necessary. It is exactly for these types of environments that we designed Pandora FMS Enterprise.

If you want to use Pandora FMS Community and have doubts about whether it will be enough for your organization: Don’t hesitate!, it is not a question of size, we have users of the Open version with thousands of agents and who have been using it for years.

Obviously the main benefit of the Enterprise version is that you will have someone to support you at all times. Whether it is some problem with an update or throughout the installation of a plugin. But there are many small differences that can be key to optimizing your day-to-day management.

Next we will describe some of the Enterprise features. If you want to try them yourself, you can test the waters of a 30-day trial version, but let us show it to you at an online meeting and you’ll save yourself the trouble of messing with the software. Your time is valuable and while our documentation is extensive, PFMS has plenty of features.

Services

Services are the way to show in a simple and visual way what things are like in your organization, classified into different entities that in turn are made up of other services and / or metrics.

That way you may perform an automatic root cause analysis and find out when a service is affected, where the source is and even have it displayed in the form of a tree:

Services complement the existing display options in Pandora FMS and allow system managers to define weight rules that have their systems’ redundancy to alert only in case of need, not when something irrelevant fails.


↑ Go to index

Policies

The need arose from a client who managed many computers with different purposes and technologies. They found out that monitoring Windows 2000 computers was different from monitoring Windows 2003, and that of course the Redhat Linux had different needs from the Debian Linux. It also had differentiated database environments, such as DB2 or MySQL.

Base monitoring could be “compartmentalized” into different sets of checks that could be standardized, so that any Linux machine that had Oracle could be monitored the same. That way, we made sets of checks that could be easily deployed to machine groups.

Thanks to policies, it is possible to homogenize monitoring and to deploy standard monitoring by technologies.

Thus a system can have different policies applied (e.g. base operating system, database, application X, network performance, etc.) and for every time you modify the policy, it can get “synchronized” with those systems that are subscribed to said policy, in a totally automatic way.

Of course, exceptions can always be made to policies at individual level, and each system can have unlimited policies in addition to custom monitoring. Using policy monitoring can save system administrators a huge amount of time.


↑ Go to index

Customization and OEM

If you need to sell your own monitoring product, with your own brand and full customization not only of its look, but also of its installers, command path, running services, ISO installation images, Windows agents, logos, manufacturer and product names, Pandora FMS Enterprise has different customizing levels.

The most basic, and included as standard in any Enterprise license, allows you to customize the appearance of the console so that it does not look like Pandora FMS but your own product, with your own brand.

If what you need is to go further, and generate a software with another name and that from the installation process to the name of the database everything is alien to Pandora FMS, then OEM customization is what you need. We can even generate update packages specific to your OEM (or teach you how to do it so you can fend for yourself).


↑ Go to index

History DB

Pandora FMS Enterprise has a secondary storage system in an additional database. The system automatically transfers the data from more than N days to the history database and when it needs it to make reports or graphs, it uses both databases to gather information.

This allows you to have an almost unlimited data history (several years) without compromising the speed of access to day-to-day data.


↑ Go to index

Delegated authentication in Active Directory

Whether you need your installation to rely on an Active Directory to authenticate users, or to automatically create them at login, assigning them specific profiles or filtering them through a blacklist, this feature is designed specifically for professional environments like yours.

It has advanced options such as delegating to a secondary server, excluding administrators, complementing it with double authentication through Google Auth and many other options.


↑ Go to index

Remote control

Remotely control and access your systems, whether windows workstations, Linux or Windows servers, or Raspberry or similar embedded systems. Access the remote shell as if you were in front of it, the remote desktop, or copy files both ways. All this from the same Pandora FMS WEB console, fully integrated into your asset management.

In the Enterprise version you may have your own on-premise infrastructure of eHorus servers so that all communication among your systems can be managed and controlled, with total autonomy from third parties and with maximum security and confidentiality.

In the community version, however, you may use our Cloud servers, up to a maximum of five devices for free.


↑ Go to index

Satellite Servers

Satellite servers allow headless remote monitoring of entire networks of equipment in a distributed way. Install Satellite servers in the networks of your clients, they will obtain metrics of all kinds of devices around them, exploring what they have around them automatically and sending the information to the central server where you may manage it as if they were normal agents.

Satellite servers are perfect for making deployments in remote sites, customer offices or inaccessible environments. They can be installed on Raspberry, or any type of container.


↑ Go to index

User Experience (UX) Monitoring

Nothing like observing things pretending to be a real user, if possible from the same chair as the real user. This is what user monitoring consists of, replicating a transaction from beginning to end, step by step, calculating the time it takes in each step, and verifying that each step is completed correctly.

That way you will not only find out whether it fails, but you will also know where, and how long each step takes. You may even take a screenshot to know what the fault looked like. This can be done for web applications (even if they have Java, Flash, HTML5, etc.), and also for traditional desktop applications. It can be done centrally (WUX) or in a distributed way so that the probes perform the tests from different geographical locations.


↑ Go to index

Remote agent deployment

We know that deploying agents and configuring them is one of the most burdensome points of deploying monitoring. That is why we created a tool that allows, providing credentials, to connect to Windows or Linux systems to copy the agent and carry out its unattended installation.

It allows you to customize the installation, by different networks, environments or groups of machines. From dozens to thousands of systems can be installed or upgraded from the agent deployment console.


↑ Go to index

Omnishell

Omnishell is a Pandora FMS Enterprise feature that is used for orchestration (IT automation). It is a fully native tool integrated into the console that uses PFMS agents to execute command blocks on selected targets.

A use example would be to configure the auto-start of the HTTPD service on CentOS 7 systems massively. Another example could be to install a manual patch on those Windows machines that you select from a list. It can be one or several hundred machines.

The system is designed to be executed on hundreds of systems simultaneously and wait for the order to be executed, showing on the screen the progress, machine by machine:


↑ Go to index

Auto Provisioning and automatic agent configuration

It implements an automatic mechanism by which it can apply policies and changes to newly provisioned agents, so that after deployment, monitoring configuration is automated, assigning it group(s), monitoring policies, alerts, etc.

This customization is done based on rules. For example, having a certain IP range, a specific brand or custom field, or a hostname with a certain pattern. In addition, after you make the configuration change, you may generate a custom action.


↑ Go to index

Collections

Deploying advanced monitoring requires bringing scripts and small applications (ours, yours or from third parties) to the monitored systems, to be executed by the agent in the form of plugins.

Collections allow you to gather this set of files and send them them to agents in an integrated way in the policies. That way, using plugins is something simple and transparent for the final operation.


↑ Go to index

Log collection

Pandora FMS can collect logs from any source that supports syslog or through software agents (Windows and Linux). Such logs can be plain text files, or Windows system events.

They will be collected by Pandora FMS monitoring agent and sent to the server along with the monitoring data. So if you already have agents installed, you may collect logs from those systems conveniently and quickly, and without additional software or licenses.

Unlike monitoring data that is stored in a conventional SQL database, logs are stored in a separate Elastic system. You will be able to store gigabytes worth of logs and keep them for a long time (you will only need more disk space). You may set up alerts or search through your data sources. It is the ideal complement to comprehensive monitoring, and fully integrated into the console.


↑ Go to index

Inventory Alerts

PFMS inventory allows you to obtain data of many types: installed software packages, users with access to the equipment, installed patches, hardware devices, firmware and version of the base system, license or serial number, etc.

Alerts allow you to generate actions in case of finding or not finding certain data on a computer with inventory information (whitelist / blacklist).

For example, what if you know that there is a vulnerable version in your systems? Well, you could create an alert that notifies you if someone is using it. Or on the contrary, if you need an application installed on all your systems and someone does not install it, you may find out in real time.


↑ Go to index

Metaconsole / Command Center

The Command Center is the jewel in the crown of Pandora FMS.

It serves the purpose of centrally controlling an unlimited number of independent Pandora FMS instances (each with its server, its console and its databases) so that you may manage dozens of thousands of agents from a single point, while these systems are in turn managed by independent instances.

This federated management system ensures uniformity and ease of management. It is a robust system where one system failing does not affect the rest of the systems, and where growth is fully horizontal and distributes loads automatically.

We have clients with more than 40,000 agents and more than one million metrics collected.


↑ Go to index

High Availability (HA)

In critical environments and/or with lots of load, it is possible that it is necessary to distribute the load among several machines and make sure that if any Pandora FMS component fails, the system will stay online.

PFMS has been designed to be modular but it is also designed to work collaboratively with other components and to be able to take on the burden of those that failed. The most critical component is the database (MySQL/Percona) that can be configured in Active/Passive mode so that in case of failure, a read-only node is automatically activated and the system continues to operate without pause, and without data loss.

This system is integrated into Pandora FMS console.


↑ Go to index

Discovery Cloud

Discovery Cloud allows, through a fully pre-installed and centralized system, to configure native connectors (through APIs) with the most widespread public cloud providers: Amazon, Azure and Google.

You will be able to get it hooked onto your instances and explore the resources available for monitoring: machines, disks, databases and other elements.

The advantage of this system is that you may get information about the services dynamically, without installing agents. In addition, if you later install agents, you may add both monitoring approaches. Through the credential container system you may even monitor different Amazon instances, for example.


In the case of Amazon, you will also be able to find out the cost of active services.


↑ Go to index

Discovery Applications

As with cloud providers, Discovery allows out-of-the-box to monitor some extended technologies centrally and remotely: Oracle, SAP R3, DB2, SQL Server, and VmWare virtualization (through the vCenter API).


↑ Go to index

Enterprise ACL’s

Along with OEM features, it allows you to customize not only the look, but the feature accessible by all types of users (including administrators). That way you may limit the functions of a PFMS instance, even making the menus disappear.


↑ Go to index

Comparison table Open Source vs Enterprise


Features Open source Enterprise
Tech support In community forums, by volunteers Worldwide hourly coverage. 24×7 optional
Professional services
Professional certification Several levels
Operating model on-premise on-premise SaaS (MaaS)
Remote monitoring SNMP, WMI and with plugins
Monitoring with agents
Reports, dashboards and visual consoles
Alerts system
Multi-user and multi-tenant
Netflow
Network Configuration Manager
IPAM (764 version)
Mobile Console APPs
High Availability (Manual) (Integrated)
Distributed Servers (Satellite)
Policies
Services
AD Authentication
Historical DB
Remote control Only SaaS SaaS and On-premise
Transactional monitoring of user experience (UX)
IT Service Manager Partial
Remote agent deployment
Omnishell
Agent autoconfiguration / autoprovisioning
Command center (Metaconsole)
Collections
HA
Correlated alerts
Inventory alerts
Log collection
Discovery Cloud
Discovery Applications
Enterprise ACL’s
OEM and Partial Customization Partial

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.