Skip to content

Penta Security Accelerates Expansion into the Middle East Cybersecurity Market from Dubai

Cybersecurity corporation ‘Penta Security’ is actively accelerating its entry into the Middle East security market by participating in key IT events in the region, including the recently held ‘GITEX 2024’ in Dubai.

In October, Penta Security showcased its innovative solutions at GITEX 2024, the largest IT exhibition in the Middle East, and Expand North Star 2024 in Dubai, UAE. Most recently, the company took part in the Dubai Police-KOTRA Global Startup Week, held from November 11 to 14 at the Dubai Police Headquarters R&D Center. This four-day event, co-hosted by the Korea Trade-Investment Promotion Agency (KOTRA) and Dubai Police, featured 19 Korean companies across various sectors, all specially invited by Dubai Police to present their cutting-edge technologies and explore opportunities for future collaboration.

At the event, Penta Security introduced its advanced cybersecurity solutions to an audience of 500 attendees, including key stakeholders from Dubai Police and other related organizations. The company showcased its collaborative security projects with the Korean national police as well as its international initiatives, such as its work on Advanced Metering Infrastructure (AMI) for smart city and smart transportation security across various regions.

Penta Security showcased its advanced solutions designed to address the increasing demand for data encryption and web security in the UAE’s smart city initiatives. These include D’Amo, an encryption platform; Cloudbric, a cloud security SaaS platform; and iSIGN+, an authentication security platform. Together, these solutions provide the foundational security infrastructure essential for driving smart city innovations.

Taegyun Kim, CEO of Penta Security, stated, “The Ministry of Science and ICT has designated the Middle East cybersecurity market as an emerging strategic market in its 2023 ‘Global Competitiveness Strategy for the Information Security Industry.’ The government is providing robust support to help Korean security companies expand into the region. Based on thorough market analysis, Penta Security aims to use the UAE as a launchpad for further expansion into the broader Middle East and Africa markets.” 

About Penta Security
Penta Security takes a holistic approach to cover all the bases for information security. The company has worked and is constantly working to ensure the safety of its customers behind the scenes through the wide range of IT-security offerings. As a result, with its headquarters in Korea, the company has expanded globally as a market share leader in the Asia-Pacific region.

As one of the first to make headway into information security in Korea, Penta Security has developed a wide range of fundamental technologies. Linking science, engineering, and management together to expand our technological capacity, we then make our critical decisions from a technological standpoint.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

A Wake-Up Call on Identity Data Breach Security

In a world where every click and connection is quietly observed, how much of your true identity can still be yours?

Once accessible, it wasn’t just a system that’s been breached — it was the very fabric of what makes you you. 400,000 rows of personal data, 75,000 unique email addresses, full names… all scraped as though identities were little more than code to be harvested and manipulated. But who, or what is watching, and what are they after?

Impact of IAM Solutions for Identity Breaches
How right IAM solutions can safeguard identity breaches

This is just one version of an identity breach, where personal information is reduced to data points, quietly stripped away, leaving nothing but the same data to be twisted and controlled by unseen hands.

An identity privacy breach often exposes deep vulnerabilities in identity and access management (IAM) systems. If you don’t assess the solution as a whole — how it’s deployed, aligned with your priorities, and the potential risks — the consequences can be far more perilous than you ever imagined.

The situation serves as a wake-up call to businesses, individuals, and regulatory bodies about the critical importance of improving data security measures and ensuring that IAM systems are foolproof.

What Went Wrong and Its Impact

A major contributor to security breaches is the presence of gaps in identity and access management infrastructure. Many organizations struggle with integrating legacy systems that don’t meet modern security standards, leaving vulnerabilities that attackers can exploit to gain unauthorized access to sensitive data.

Misconfigured access controls, lack of multi-factor authentication (MFA), or absence of single sign-on (SSO) solutions only amplify these risks. These gaps can often be addressed with proper safeguards, preventing or at least mitigating potential breaches. 

Also, compliance failures are a significant issue, particularly for organizations operating across multiple jurisdictions with varying data protection regulations. Failing to meet standards like GDPR can lead to costly fines and reputational damage.

Employees also remain a critical vulnerability, often falling victim to phishing or social engineering attacks due to a lack of cybersecurity awareness. Even the best security measures can be undermined if employees aren’t trained to recognize threats or follow best practices. Ensuring strong safeguards, compliance, and employee awareness are all essential to reducing the likelihood of a breach.

Why a Wake-Up Call is Necessary

Identity and security breaches highlight the urgency of taking action on identity security. Organizations and individuals alike need to rethink their approach to protecting personal and corporate data. As cyber threats become more sophisticated, organizations must adapt by adopting stronger IAM practices, investing in continuous monitoring, and fostering a culture of cybersecurity awareness.

Rising Personal Responsibilities

As individuals, everyone too must become more vigilant about how they manage and protect personal information. The rise in identity theft and fraud means that personal data is constantly under threat, and it’s no longer enough to rely on organizations to safeguard it. Individuals need to adopt security best practices, such as using strong passwords, enabling multi-factor authentication (MFA) on accounts, and being cautious about the information they share online.

The concept of shared responsibility in cybersecurity is gaining ground. While companies must invest in strong security frameworks and IAM solutions, individuals must also take proactive measures to protect their personal information. As digital identities become integral to every aspect of our lives, personal responsibility will play a pivotal role in reducing the risks associated with data breaches.

Legal and Financial Implications

The legal and financial consequences of a data breach can be devastating. For large organizations, a breach can result in substantial fines for non-compliance with data protection regulations like the GDPR or the California Consumer Privacy Act (CCPA). Additionally, the cost of mitigating a breach, including legal fees, remediation efforts, and customer compensation, can run into millions of dollars.

The long-term reputational damage is equally severe. Customers lose trust when a company fails to protect their personal information, and this can result in a loss of business, a tarnished brand image, and ongoing customer churn.

For individuals, security breaches can lead to identity theft, financial fraud, and the significant emotional burden of restoring one’s identity and reputation. Victims of data breaches often have to spend months, or even years, undoing the damage caused by identity theft, which may include monitoring credit reports, securing new accounts, and filing legal claims.

Best Practices to Prevent Identity Breaches

Implementing Single Sign-On (SSO) and Multi-Factor Authentication (MFA)

One of the most effective ways to prevent unauthorized access to sensitive data is through the implementation of Single Sign-On (SSO) and Multi-Factor Authentication (MFA). SSO allows users to log in once and access multiple applications, reducing the risk of password fatigue and simplifying user management.

When combined with MFA, these practices provide an additional layer of security, ensuring that even if an attacker compromises a password, they cannot easily gain access without passing through the extra verification step. Contextual authentication further strengthens security by considering factors such as device signals (e.g., whether the device is encrypted, up-to-date, or compliant with security policies), device posture (assessing whether the device is secure or compromised), and location-based risk (e.g., logging in from a high-risk country or unfamiliar IP address). 

By layering MFA with these contextual checks, organizations can ensure that only authorized users, using trusted devices, and operating in low-risk environments, are granted access to sensitive systems. This holistic approach minimizes the likelihood of unauthorized access and significantly enhances overall security.

Secure Identity Federation

Companies that rely on third-party service providers should ensure secure identity federation protocols are in place. Using standards like SAML, OAuth, and OpenID Connect, organizations can securely manage user identities across different platforms without exposing sensitive data. This reduces the chances of a data breach while maintaining ease of access.

Contextual Access Control

Contextual access goes beyond just the user’s credentials, taking into account their environment, including factors like location and device posture. It evaluates device signals—such as whether the device is compliant with security policies, whether it’s rooted or jailbroken, and whether it’s encrypted—and considers the device risk, which assesses the overall security posture of the device in real-time. 

By factoring in these elements, contextual access ensures that only trusted users, operating from secure devices and trusted locations, are granted access to critical data. Even if a user successfully passes through other authentication mechanisms, these additional checks act as a final layer of protection, reducing the likelihood of unauthorized access.

Strong Password Policies

A strong password policy is an essential part of an organization’s IAM strategy, particularly for maintaining the security of personal and organizational data. Complex passwords, which combine uppercase and lowercase letters, numbers, and special characters, are crucial for protecting accounts from brute-force attacks. It’s important to avoid reusing older passwords, as they may have been compromised in past breaches. Regularly changing passwords further minimizes the risk of unauthorized access. 

To simplify password management and ensure password complexity, using a reputable password manager is highly recommended. Password managers securely store and generate strong, unique passwords for each account, reducing the likelihood of weak or reused credentials that could lead to a security breach.

Honeypotting and Deception Technologies

Honeypotting and deception technologies are advanced techniques that create fake environments to lure attackers. They can offer a proactive layer of security in Identity and Access Management (IAM) by creating decoy accounts, devices, and environments designed to lure attackers away from critical systems. 

These fake assets—such as deceptive user-profiles and credentials—serve as traps that mimic real systems, attracting malicious actors and allowing security teams to monitor their activities in real time. When integrated with IAM, these deceptive techniques can help detect unauthorized access attempts early by alerting security teams as soon as attackers engage with the decoys, enabling rapid responses to contain threats before they escalate.

By combining deception technologies with the previously mentioned contextual checks, IAM systems can enforce stricter controls when suspicious behavior is detected, such as requiring multi-factor authentication (MFA) or blocking access from untrusted devices or locations. 

This multi-layered approach not only helps identify attackers quickly but also ensures that only trusted users and devices are granted access to sensitive resources, significantly reducing the risk of a successful breach.

Bug Bounty Programs

Finally, bug bounty programs incentivize ethical hackers to find vulnerabilities in an organization’s systems. Independent security researchers can identify vulnerabilities in an organization’s authentication and authorization systems. By offering rewards for discovering bugs or weaknesses in IAM systems—such as flaws in multi-factor authentication (MFA), privilege escalation vulnerabilities, or issues with role-based access controls—organizations can tap into a global pool of experts who might uncover issues that internal teams may overlook. 

Bug bounty programs foster a collaborative approach to cybersecurity, enabling real-time identification and resolution of IAM vulnerabilities, which is crucial for protecting sensitive data and preventing unauthorized access. Integrating these findings into IAM practices can lead to stronger, more resilient systems. Once vulnerabilities are identified through the program, security teams can quickly address these issues by patching flaws, refining authentication methods, and improving access controls. 

Moreover, bug bounty programs help ensure that IAM solutions are continuously tested against evolving attack strategies, keeping organizations one step ahead of potential threats. As IAM solutions become increasingly complex with cloud environments, third-party integrations, and mobile access, the role of bug bounty programs becomes even more critical in identifying potential vulnerabilities that could compromise an organization’s security posture.

Closing Thoughts

Identity and security breaches serve as a stark reminder of the critical need for effective identity and access management solutions. The new norm is that data is constantly under active threat, and organizations and individuals must take shared responsibility for overall security. Implementing robust IAM practices, such as SSO, MFA, and strong password policies, is essential to preventing breaches and minimizing their impact.

Selecting a resilient IAM partner, such as OneIdP, is crucial to ensuring that your organization’s data is protected against evolving cyber threats. Only through a comprehensive, proactive approach to cybersecurity can we ensure the safety of our personal and organizational data. 

In the end, the responsibility for protecting identities is a collective one—leaders, employees, and individuals must all contribute to a safer digital environment.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Effective Best Practices for IT Teams Managing Macs in Hybrid Work

Juggling while riding a bike is tough but not impossible. Just like that, managing Mac devices in a hybrid work environment is a hassle but possible.

IT teams know this struggle all too well. Keeping everything running smoothly can be quite the adventure with team members working from home, the office, or some coffee shop.

And hybrid work isn’t just a trend, it’s what people want. Did you know that 81% of workers around the world prefer a hybrid or fully remote setup?[1] That’s a huge number. Also, more companies are using Macs for their reliability and security. Apple’s Mac shipments have jumped by 20.8%.[2] This means IT teams have some serious challenges to face. 

Managing Mac Devices
Understanding the Hybrid Work Model

So, how do you make sure every Mac is secure, updated, and ready to roll, no matter where your team is working from? Let’s explore some best practices that can help you manage Mac devices effectively.

Let’s get started and walk through these challenges together.

Understanding the Hybrid Work Model

To grasp how to effectively manage Mac devices in a hybrid work environment, we first need to understand what this hybrid work model really entails.

In a nutshell, it’s a blend of remote and in-office work. Employees have the flexibility to choose where they want to work, whether that’s at home, in a shared workspace, or back in the traditional office. This model has gained immense popularity because it caters to the needs of a diverse workforce.

But with great flexibility comes great responsibility. For IT teams, this means creating a seamless experience for users, ensuring that devices are secure, and providing the necessary support regardless of where the employee is located. It’s a balancing act that requires careful planning and effective technology solutions.

So, what strategies can help us thrive in this new way of working? Let’s dive into the best practices for managing Mac devices effectively.

Best Practices for Managing Mac Devices in a Hybrid Work Model

Grasp the Power of Unified Endpoint Management (UEM) Solutions

Unified Endpoint Management (UEM) is essential in a hybrid work environment as it allows IT teams to manage all devices from a single interface. This centralized approach simplifies administrative tasks such as device configuration, application management, and policy enforcement. By utilizing UEM, IT teams can ensure that all Mac devices are set up consistently, adhering to company standards.

This practice saves time and reduces the risk of errors, leading to a more efficient deployment process. Furthermore, UEM solutions enable remote management, allowing IT teams to push updates and resolve issues without needing physical access to devices, which is crucial for a dispersed workforce.

Magic in a Box: Experience Zero-Touch Enrollment

Zero-touch enrollment for Mac devices significantly streamlines the onboarding process, especially in a hybrid work environment. This feature enables IT teams to configure devices remotely, allowing employees to unbox and start using their Macs right away, without the need for extensive setup.

In a hybrid setting where employees may be working from various locations, this approach eliminates the need for IT to physically handle each device, reducing logistical challenges. With zero-touch enrollment, companies can ensure that every device comes pre-configured with the necessary apps and settings, delivering a seamless user experience that enhances productivity from day one.

Shield Your Assets: Enforce Ironclad Security Protocols

Implementing security protocols is crucial for protecting sensitive company data, especially in a hybrid work environment. Enforcing strong password policies requires employees to use complex passwords that are regularly updated, significantly minimizing the risk of unauthorized access. This practice is vital in a setting where employees are accessing company resources from various locations.

Disk encryption—like FileVault on Macs—secures data at rest, ensuring that even if a device is lost or stolen, the information remains protected. Further, utilizing VPNs for secure remote access creates encrypted connections, shielding data from potential threats while employees work from outside the office.

Together, these measures establish a comprehensive security posture that effectively mitigates risks, enabling organizations to confidently support their workforce in a hybrid model while safeguarding sensitive information.

Refresh and Revive: Regular Software and OS Updates

Regular software and operating system updates are essential for maintaining both the security and functionality of Mac devices, particularly in a hybrid work environment. Keeping systems updated ensures that all security patches are applied promptly, safeguarding against known vulnerabilities that cybercriminals could exploit. In a scenario where employees are working from various locations and networks, this vigilance becomes even more critical.

Automating the update process can significantly lighten the administrative burden on IT teams while ensuring that devices remain secure and current. This proactive approach allows IT to manage updates efficiently without interrupting employees’ workflows. Additionally, regular updates often introduce performance enhancements and new features, contributing to a better overall user experience.

Swift Support: Remote Troubleshooting for Macs

IT teams must be equipped with tools that enable them to diagnose and resolve issues without needing to be on-site.  macOS remote troubleshooting minimizes downtime for employees and streamlines support processes, ensuring that technical challenges don’t disrupt productivity.

Features such as remote desktop access empower IT to take control of a user’s device, troubleshoot problems directly, and provide real-time guidance. This capability is especially valuable when employees are dispersed across various locations, as it eliminates the delays associated with in-person support visits.

Track with Precision: Asset Management for Mac Devices

Maintaining an accurate inventory of all Mac devices is important for IT teams in a hybrid work environment, as it allows them to monitor device status, track locations, and manage software licenses efficiently. Implementing an asset management system enables organizations to clearly identify which devices are assigned to which employees, facilitating better support and maintenance practices.

This level of visibility is essential for ensuring compliance with software licensing requirements and minimizing the risk of penalties associated with unlicensed software usage. Regular inventory audits can reveal underutilized devices, providing valuable insights for strategic planning regarding upgrades or reallocations. By optimizing device usage, organizations can enhance resource allocation and ensure that all employees have the tools they need to be productive, regardless of their working location.

Your Safety Net: Crafting Backup and Recovery Solutions

Automated backup systems play an important role in ensuring that data is regularly saved, significantly minimizing the risk of data loss due to accidental deletions or hardware failures. By utilizing cloud-based backup solutions, organizations can streamline this process, allowing employees to easily access their backups from any location. This flexibility is beneficial in a hybrid work environment, where team members may work from various sites.

Additionally, implementing a comprehensive disaster recovery plan ensures that organizations can swiftly restore operations in the event of a data loss incident. This preparedness is essential for maintaining business continuity and minimizing downtime. By proactively managing backups and recovery processes, organizations safeguard their data and enhance employee confidence in their operational resilience, knowing that they are protected against potential data loss scenarios.

Compliance Made Easy: Steer the Regulatory Maze

Organizations must establish clear policies regarding data protection and device usage that align with regulations such as GDPR and HIPAA, especially in a hybrid work environment where employees may access sensitive data from various locations. Conducting regular compliance audits helps identify potential gaps and ensures that practices meet regulatory standards.

Educating employees about compliance requirements promotes a culture of security awareness and responsibility. By actively managing compliance, IT teams can mitigate risks and protect both the organization and its clients from potential legal issues, ensuring smooth operations across all working environments.

Crystal Clear Insights: Monitor Devices with Real-Time Analytics Tools

Monitoring Mac devices with real-time analytics tools enhances security and performance management in a hybrid work environment. These tools enable IT teams to track device usage patterns, identify potential security threats, and analyze performance metrics.

By setting up alerts for unusual activities—such as unauthorized access attempts—organizations can respond quickly to mitigate risks. Tracking performance metrics allows IT teams to ensure that devices are functioning optimally and identify any areas requiring attention.

Empower Your Hybrid Workforce with Scalefusion UEM Features

With Scalefusion UEM, IT teams can efficiently oversee all Mac devices from a single interface, ensuring consistent configuration and application management across the board. The zero-touch enrollment feature simplifies onboarding, allowing employees to start working with their Macs immediately without extensive setup, regardless of their location.

Scalefusion’s robust security features, including strong password policies, disk encryption with FileVault, and secure VPN access, provide a stronghold for sensitive data. Regular software and operating system updates can be automated, relieving the administrative burden on IT while keeping devices secure and up to date.

The platform’s remote troubleshooting capabilities empower IT teams to resolve issues swiftly, minimizing downtime for employees scattered across different locations. Scalefusion also facilitates seamless backup and recovery solutions, safeguarding critical data and ensuring business continuity.

Transform Mac Device Management in Hybrid Work Environments with Scalefusion UEM

Managing Mac devices in a hybrid work environment presents unique challenges that require innovative solutions. Scalefusion UEM can significantly enhance your approach by offering a comprehensive platform that streamlines  device management and bolsters security protocols.

By integrating Scalefusion UEM into your hybrid work strategy, you can enhance productivity and create a more resilient and agile IT framework, ready to support your organizational needs.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

What is Canonical OpenStack and How to Protect it?

Among the many cloud platforms available, Canonical OpenStack is notable for its open-source foundation, cost efficiency, and scalability. Unlike many proprietary solutions, it gives companies complete control over their cloud infrastructure and flexibility in network, compute, storage, and network administration. This article explores why Canonical OpenStack is a leading choice, covering its components, key advantages, use cases, and more.

What is Canonical OpenStack?

Canonical OpenStack is a leading open-source cloud computing platform. It is meant to help with distributed compute, network, and storage resource administration. Canonical OpenStack combines these resources into pools, allowing companies to offer virtual resources on demand via a self-service portal.

Because of its capacity, it is a reasonably priced substitute for proprietary virtualization solutions. As a result, companies can maximize their cloud expenditures and compete with hyperscale service providers.

How Does OpenStack Work?

OpenStack aggregates physical resources into a big pool from which it distributes virtual resources when customers request them through a self-service portal or application programming interfaces (APIs). It does not handle virtualization directly, but instead, it capitalizes on existing virtualization technologies. As a result, it can facilitate the rapid deployment and management of cloud-native services.

Key Components of OpenStack

OpenStack was designed based on a modular architecture. It has several main features, which include:

  • Nova: The main compute running instance scheduling, creation, and termination. It supports Hyper-V, Xen, QEMU/KVM, and VMware ESXi among other hypervisors.
  • Glance: An image service that controls, uploads, and retrieves cloud images for instances running on the platform.
  • Neutron: Provides networking capabilities between instances, allowing multi-VM deployments to take place.
  • Cinder: Manages block storage by provisioning, managing, and terminating persistent block devices.
  • Swift: Offers scalable object storage services that retrieve and store unstructured data objects using a RESTful API for OpenStack services and instances running on the Cloud.
  • Keystone: Handles authentication and authorization functions for users in multi-tenant environments.

Advantages Over Competition

Canonical OpenStack offers several advantages compared to other cloud platforms:

  • Focus on Performance and Simplicity

The implementation of a small-scale private cloud can be complex and costly, especially for organizations without the necessary expertise. Sunbeam, an OpenStack project, offers a solution by simplifying the adoption process and providing a more accessible platform. MicroStack, a Sunbeam-based distribution, is specifically designed for small-scale environments and can be self-deployed without requiring professional services. This provides organizations with a cost-effective option for building their own private cloud infrastructure. Additionally, MicroStack is supported by Canonical, a leading provider of cloud infrastructure solutions. With the support of Canonical, MicroStack offers a robust and reliable option for organizations looking to deploy a small-scale private cloud.

  • Cost Efficiency

Although the initial capital expenditures (CapEx) for implementing OpenStack can be somewhat high, the operational expenses (OpEx) are far lower than the cost of using hyperscalers. This results in a reduced total cost of ownership (TCO) over time, making it an attractive option for long-term cloud operations.

  • Full Cloud Functionality

Unlike traditional virtualization platforms like VMware vSphere, OpenStack provides a complete cloud environment that resembles public clouds. Users can request resources programmatically through APIs, enabling rapid infrastructure automation and cloud-native operations.

  • Community Support

There are thousands of contributors and organizations involved in its development, including Red Hat, IBM, Huawei, and Cisco. As a result, Canonical OpenStack benefits from continuous enhancements and community-driven support.

The Canonical OpenStack Distribution

The Canonical Distribution of OpenStack is designed to be the most straightforward and efficient way to deploy and manage OpenStack private clouds. It acts as an “autopilot” for creating reference OpenStack clouds in minutes and provides full management, monitoring, and scaling capabilities.

This distribution automates the entire process of building a fully managed private cloud from bare metal. It offers high performance, allowing users to focus on their applications rather than the underlying infrastructure. The Canonical OpenStack is currently in public beta. It is free for small-scale deployments of up to 10 physical and ten virtual machines.

This approach significantly reduces the time and costs associated with deploying private clouds. As a result, enterprises can optimize their resources effectively while maintaining a focus on innovation and application development.

Key features of the Canonical Distribution of OpenStack

  • Automated Cloud Creation

Users can simply point the distribution at their physical hardware and specify their preferences for storage, software-defined networking, and hypervisors. The system will then automatically create, manage, and monitor the cloud environment.

  • Integration with MAAS and Landscape

The distribution utilizes MAAS (Metal as a Service) for physical hardware detection and provisioning, combined with Canonical’s Landscape for systems management. This integration allows for easy addition of machines to the cloud and ensures high availability through physical isolation zones.

  • Web-Based User Interface

It offers a simple web-based UI in Landscape that enables users to select compatible components for their cloud, streamlining the setup process.

  • OpenStack-Aware Monitoring

Once the cloud has been built, Landscape provides monitoring tools that track the health of cloud resources. Landscape doesn’t only monitor the running cloud environment. It also provides real-time predictions based on current utilization trends. This helps in capacity planning to determine when additional compute nodes or storage will be needed.

  • Vendor Flexibility

The Canonical Distribution supports a wide range of vendor components for network, storage, and compute resources, ensuring that organizations can choose solutions that best fit their needs.

Canonical continuously tests thousands of configurations of Canonical OpenStack built with third-party hardware and software in its OpenStack Interoperability Lab (OIL) to find more compatible cloud components, giving customers a wider range of options and allowing them to make flexible choices.

Markets and Sectors

Canonical OpenStack is utilized across diverse industries due to its versatility:

  • Telecommunications: Service providers leverage OpenStack for network function virtualization (NFV), allowing them to implement efficient virtualized networks.
  • Public sector: Canonical OpenStack is a popular choice for public sector organizations due to its open-source nature, scalability, and security features. Governments worldwide are increasingly adopting OpenStack to modernize their IT infrastructure, reduce costs, and improve efficiency.
  • Financial Services: Banks and financial institutions adopt Canonical OpenStack to manage data securely while complying with industry regulations.
  • Education: Universities use OpenStack for research projects requiring substantial computational resources without incurring prohibitive costs.
  • Healthcare: The healthcare sector benefits from the stability and security of Canonical OpenStack for managing sensitive patient data.

Use Cases for Canonical OpenStack

Organizations can leverage Canonical OpenStack in various ways:

  • Private Cloud Deployment: Businesses can establish their own private cloud infrastructures, optimizing costs while maintaining control over their data.
  • Public Cloud Services: Using Canonical OpenStack, local service providers can create public clouds offering options in countries where main hyperscalers might not be present.
  • Network Function Virtualization (NFV): OpenStack provides a basis for telecommunications companies to implement NFVI solutions. This allows these companies to have flexible and reasonably priced software-based telecom infrastructure.
  • Container Management: By extending OpenStack environments with container orchestration solutions like Kubernetes, organizations can improve workload granularity for cloud-native applications.

Data Protection for Canonical OpenStack

The integration of Storware Backup and Recovery with Canonical OpenStack and Canonical KVM ensures seamless operations within this cloud infrastructure, catering to the growing demand for robust cloud solutions. Storware offers a comprehensive backup and recovery solution specifically tailored for OpenStack environments, providing granular control, automation, and efficient data management. Its integration with Canonical’s offerings simplifies the backup and recovery process, allowing organizations to protect their critical data and ensure business continuity in the face of potential challenges.

Additionally, Storware Backup and Recovery integrates with the OpenStack Horizon plugin, providing a user-friendly interface for managing backups and recoveries directly within the OpenStack dashboard. Storware is also actively working on integrating with the OpenStack Skyline plugin, which will enable advanced monitoring and analytics of backup and recovery operations.

Learn more about Instant Restore option for OpenStack environments.

Conclusion

Canonical OpenStack is a robust solution for organizations seeking to build flexible, cost-effective cloud environments. Its automated deployment capabilities, modular architecture, and strong community support position it as a leading choice in the open-source cloud landscape. From telecoms to healthcare, Canonical OpenStack keeps becoming more and more popular as companies try to use open-source technology in their cloud plans based on its track record across several sectors.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

SealPath Shines at IT Security Conference 2024, Addressing Critical Data Protection Strategies

“We all agree that data is fundamental to an organization today. Without data, we lack the ground,” said João Arriaga, Country Manager at SealPath, in his speech on the Technical Tracks stage, where he also stressed the central importance of data for the operation and survival of companies.

In an insightful session at the annual IT Security Conference in Lisbon, SealPath once again demonstrated its commitment and leadership in innovative data protection solutions. Entitled “The Importance of Identifying the Most Risky Data in an Organisation”, our expert Joao’s presentation highlighted the emerging challenges and dynamic strategies for achieving robust data security in today’s business environment.

This year’s conference, which brought together top professionals and thought leaders in cybersecurity, provided the perfect backdrop for SealPath to articulate how advanced, data-centric security measures can profoundly shield and protect organizational data across all platforms. Our session, particularly noted for its depth and clarity, was also featured in the IT Security’s magazine article.

Reflecting on the event, Luis Ángel del Valle, CEO of SealPath, noted, “Our participation in this year’s IT Security Conference was yet another opportunity to share insights with our peers and demonstrate SealPath’s deep commitment to evolving data protection standards. We are pleased to provide thought leadership that resonates within the cybersecurity community.”

Read the full article in IT Security Magazine here. (Portuguese).

About IT Security Magazine

IT Insight Security appears in a context of accelerated digital transformation and, at the same time, growing vulnerability to cybercrime, with a different and innovative perspective. It is a publication born in the digital world, conceived from scratch for this new reality and which will combine a rigorous factual approach with an analysis of the market and the strategic and leadership challenges required to meet this growing challenge.

About SealPath
SealPath is the European leader in Data-Centric Security and Enterprise Digital Rights Management, working with significant companies in more than 25 countries. SealPath has been helping organizations from different business verticals such as Manufacturing, Oil and Gas, Retail, Finance, Health, and Public Administration, to protect their data for over a decade. SealPath’s client portfolio includes organizations within the Fortune 500 and Eurostoxx 50 indices. SealPath facilitates the prevention of costly mistakes, reducing the risk of data leakage, ensuring the security of confidential information, and protecting data assets.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Scalefusion Launches Veltar: Enhancing Device Management with Endpoint Security

ProMobi Technologies announced today that Scalefusion, its leading unified endpoint management solution (UEM), introduces Veltar, an innovative endpoint security product. Designed to enhance the enterprise security posture, Veltar combines advanced threat protection with seamless device management, enabling organizations to operate confidently in an increasingly complex digital landscape.

Veltar has been introduced to tackle the critical challenges posed by fragmented security tools and limited visibility into devices and their security. With the addition of Veltar, Scalefusion now seamlessly combines unified endpoint management (UEM), identity and access management (IAM), and endpoint security (EPS) into one comprehensive solution. As the third pillar of the product, Veltar aims to complete the solution so users can now effectively manage devices, access, and security within organizations.

With Veltar, IT admins get a curated set of security tools with the prime goal of protecting data loss, securing data at rest and in motion. Its features include VPN tunneling to secure data transmission to and from on-prem assets, secure web gateway (SWG) to block domains and websites based on categories, application control to ensure only trusted software runs on your devices, and I/O device control, among others.

“Veltar marks a major leap forward in endpoint security and management, bringing crucial security features together into a single platform. It is a critical component that combines endpoint security driven by the insights of device management. We had a goal of enabling enterprises to enhance their security posture while simplifying device, identity and access management and Veltar is the third piece of the puzzle.” — said Sriram Kakarala, Chief Product Officer at Scalefusion

Veltar is designed for organizations looking to streamline operations, and management of devices that hold critical data without compromising security.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

LDAP vs. Active Directory: Know the Differences and Use Cases

When managing user information and network resources, think of LDAP and Active Directory (AD) as two powerful tools in your digital toolbox. Suppose you’re organizing a large library. LDAP is like a universal cataloging system that helps you find any book from various libraries, regardless of its location. It provides a way to look up and manage the books, but it doesn’t come with the actual shelves or library services.

On the other hand, Active Directory is akin to a well-organized, high-tech library system that not only catalogs books but also manages everything in a library, from checking books in and out to controlling access to special collections.

LDAP vs Active Directory
LDAP or Active Directory: Which to Use and When

It’s a comprehensive system specifically designed to handle all the needs of a Windows-based library or network.

So, what sets these two apart?

Difference Between LDAP and Active Directory

 LDAPActive Directory
Overview LDAP, or Lightweight Directory Access Protocol, is a protocol used for accessing and managing directory services. It’s like a set of rules that help applications communicate with a directory service. Think of LDAP as a universal language for talking to directories.Active Directory (AD), developed by Microsoft, is a directory service used mainly in Windows environments. It’s like a giant address book for your network, keeping track of all users, computers, and resources.
PurposeLDAP’s main job is to organize and retrieve information from a directory. It’s not a directory itself but rather a way to interact with one.AD is used to manage and organize users, computers, and other resources in a network. It’s more than just a protocol, it’s a full directory service with built-in management tools.
StructureLDAP directories are often structured as a tree with various branches, which makes it easy to navigate and find information.In AD, assets are sorted into one of three tiers, domains, trees, and Forests.  It includes features like Group Policy and Domain Services, which help manage network resources and user permissions.
FlexibilityLDAP can be used with different directory services and is often employed in various systems like email servers and corporate databases.AD is specifically designed to work seamlessly with Windows environments, offering a range of tools and features for system administrators.
Use CasesIdeal for querying and modifying directory information across various environments, including Unix and Linux systems. It’s versatile and can be used in diverse setups where different directory services are involved.Best suited for managing users and resources in a Windows-based network. It’s commonly used in corporate environments where integration with other Microsoft services is essential.
IntegrationsWorks with a variety of directory services beyond Microsoft’s ecosystem. Its broad compatibility makes it suitable for integrating with different systems and platforms.Specifically designed for Windows environments. It integrates deeply with other Microsoft products, offering features like Group Policy and Domain Services that enhance its functionality in a Windows-centric setup.

Similarities Between LDAP and Active Directory

Despite their differences, LDAP and Active Directory (AD) share several key similarities:

Directory Services

Both LDAP and Active Directory are integral to managing directory services. They play an important role in storing, organizing, and retrieving information about users, devices, and other network resources. Whether you’re using LDAP or AD, both systems help keep track of this critical data, ensuring it’s accessible and well-organized.

Hierarchical Structure

LDAP and Active Directory utilize a hierarchical structure to organize information. This tree-like structure makes it easier to locate and manage data within their directories. By arranging data in a hierarchy, both systems allow for efficient data retrieval and organization, simplifying administrative tasks.

Authentication and Authorization

Both LDAP and Active Directory are used to authenticate and authorize users. They ensure that individuals can only access the resources and information they are permitted to use. This process helps secure the network and control access, making sure that sensitive data and resources are protected from unauthorized users.

Also read: Authentication vs. Authorization

Support for Various Protocols

While LDAP is a protocol used for accessing directory services, Active Directory supports LDAP as one of its communication protocols. This means that LDAP clients can interact with Active Directory servers using the LDAP protocol, providing a level of compatibility and flexibility between the two systems.

Centralized Management

Both LDAP and Active Directory offer centralized management capabilities. This feature allows administrators to manage users and resources from a single location. Centralized management streamlines administrative tasks, making it easier to oversee and control various aspects of the network and directory services.

When to Use LDAP

If your organization needs a flexible, protocol-based solution for directory services, LDAP is a strong candidate. It is ideal when you require a versatile system that can interact with various directory services and platforms, regardless of their specific technology. For example, if you’re managing user accounts across a diverse set of systems, LDAP provides a standardized method for accessing and updating directory information. Its protocol-centric design makes it highly adaptable, allowing integration with different types of directory services without being tied to a particular vendor or technology stack.

LDAP is also suitable for environments where you need to interact with multiple types of directory systems or where a universal directory service is necessary. In scenarios where you are integrating with third-party systems or applications, its flexibility ensures seamless communication and data retrieval.

When to Use Active Directory

Active Directory is often the best choice for businesses predominantly using Windows as their operating system. Designed and developed by Microsoft, AD offers a comprehensive suite of tools and services specifically tailored for Windows environments. If your organization operates within a Windows-based network, AD seamlessly integrates with other Microsoft products, such as Exchange, SharePoint, and Office 365. This integration enhances efficiency by allowing admins to manage users, computers, and resources from a central point.

AD’s built-in features, like Group Policy, Domain Services, and Federation Services, further simplify administrative tasks. Group Policy allows for centralized management of settings and permissions across the network, while Domain Services handle user authentication and resource access. Federation Services enables single sign-on across different systems and applications. AD’s deep integration with Windows platforms and Microsoft services makes it the ideal choice for managing a Windows-centric network environment.

Simplify and Strengthen Access Management

Choosing between LDAP and Active Directory involves understanding your organization’s specific needs and infrastructure. LDAP offers flexibility and cross-platform compatibility, making it a versatile solution for diverse environments and various directory services. On the other hand, Active Directory is modified for Windows-centric setups, providing a comprehensive suite of tools that seamlessly integrate with Microsoft products for network management.

Ultimately, the right choice depends on aligning the solution with your access management goals and technical work-frame.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital
Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

不到1秒駭客就能破解的密碼,你的密碼安全性強度夠嗎?

根據數位安全領域的翹楚- Nord Security 旗下產品-密碼管理「NordPass
,近期公布今年全球民眾TOP 200最常使用的密碼排行榜,全球最愛用的爛密碼出爐!
「123456」再度蟬聯全球榜首,有超過300萬人使用。第2名的「123456789」有162萬多人使用,第3名的「12345678」約有88萬人使用。後面依序排名為「password」、「qwerty123」、「qwerty1」、「111111」、「12345」、「secret」、「123123」。

由於這前10名密碼過於簡單,駭客皆不到1秒就能破解,密碼管理權威NordPass強烈建議不要再使用,並建議大家多利用不同大小的英文字母、數字及符號,進行多樣化的排列組合,以確保自身的個資。讓您的密碼難以破解,探索>>NordPass/企業密碼管理解決方案

什麼是密碼管理器?
密碼管理器是一種數位保險箱,可加密和儲存您的登入憑證、金鑰、信用卡和個人詳細資料以及機密文件。有了它,還可以幫你產生強度高的密碼並自動填入。

我應該使用密碼管理器嗎?
根據 NordPass 的調查,平均每人擁有 168 個個人用途的密碼 和 87 個工作用途的密碼。對於需要管理多個線上帳戶的人,建議使用 密碼管理工具。

全球信賴的品牌背書
提供全球頂級隱私和安全服務著稱的品牌 Nord Security,旗下產品-密碼管理NordPass是一款功能強大的密碼管理工具,主要幫助用戶安全地存儲和管理他們的密碼。結合零知識架構,確保只有您能存取自己的數據,連 NordPass 的團隊都無法窺探,真正做到隱私至上

選擇 NordPass,就是選擇一款兼具安全性、易用性和靈活性的密碼管理工具。它不僅幫助您節省時間,更讓您在數位世界中安心無憂!現在就加入數百萬用戶的行列,讓 NordPass 成為您的得力助手! 探索>>NordPass/企業密碼管理解決方案

關於 NordPass
NordPass 由領先全球網路安全產品市場的 Nord Security 公司開發。網路已成為一個混亂的空間,網路犯罪和資料保護問題損害了安全和信任。因此,我們團隊的全球使命是為世界各地的人們塑造一個更值得信賴、更和平的線上未來。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

EasyVista Ranked as Leader in SPARK Matrix™: IT Service Management Tools for Second Consecutive Year

NEW YORK – EasyVista, a global SaaS provider for comprehensive IT service management (ITSM), IT monitoring , Enterprise Service Management, and Remote Support, is proud to announce that it has been named a Leader in the 2024 SPARK Matrix™: IT Service Management Tools by QKS Group (formerly known as Quadrant Technologies) for the second year in a row. The EasyVista Platform stood out for its advanced features, low total cost of ownership (TCO), built-in customization options, and comprehensive end-to-end service experience.

Continue reading

Pandora FMS NG 779 RRR 新功能概覽

Pandora FMS NG 779 RRR 新功能概覽
這是一個小更新的版本,帶來了一些新功能。目前穩定性最高的最新版本為 Pandora FMS 777 Andrómeda LTS(長期支援版本)。
LTS 版本每年發布一次,而常規版本(RRR)約每兩個月更新一次。您可以前往我們的網站了解更多有關版本和更新系統的詳細資訊。

新功能與改進

1. 漏洞監控的強化
針對 MS Windows® 代理新增了全新的清單模組,並改進了現有模組,可以監控已安裝的軟件和系統修補程式。此改進大幅拓展了漏洞數據庫,並同時增強對 Windows 和 Linux 系統的可見性與管理能力。

2. 新增報表項目:事件列表
全新報表元素「事件列表」已加入,使用者可像傳統事件視圖一樣篩選和查看事件。未來版本中,此功能將逐步取代現有的事件報表元素。

3. 新增審核資訊小工具
儀表板新增了審核資訊小工具,可顯示當前使用者的詳細資訊,進一步提升系統操作的透明度與可追溯性。

4. 更多更新

Pandora FMS 779 除了推出全新功能外,還優化平台性能與自訂功能的技術改進。SAML 認證已升級,確保與 Azure 和 simpleSAML 2 的兼容性,同時增強安全性並提升企業環境中的整合效率。

另一個重大改進是支援為事件配置通用指令,即使沒有特定的狀態變更指令,也能加速事件回應。Windows® 的 IPAM 外掛現在支援更新例如「已佔用」和「可用」等數據,並可在 Satellite 伺服器上執行 IPAM 任務,進一步提高分佈式環境的操作靈活性。

為了加強系統安全,Satellite 伺服器新增了憑證存儲功能,支援 SSH、WMI 和 SNMPv3,並在配置檔中提供了加密選項。MongoDB® 的 Discovery 外掛新增了支援自訂 SQL 查詢的功能,用戶可據此創建專屬的監控模組,為資料庫管理提供了更大的靈活性。

在代理自動配置方面,Pandora FMS 779 引入了策略優先級功能,優先執行高優先級策略以提升效能。此外,新增的“agentalias”與“agentname”可作為網絡模組中的 IP 目標。現在可以透過「子類型」欄位過濾 SNMP 陷阱警報。在日誌收集中,Web 控制台加入了全新的 OpenSearch® 配置選項,可針對不同環境進行精確調整。

 

SAML Authentication Enhancements

Updated and improved authentication in Pandora FMS console using SAML, ensuring compatibility with SAML environments in Azure and with simpleSAML 2.

New General Event Instructions

Just like the instructions for changing the state of events, it is now possible to configure general default instructions that will be displayed when the instructions for changing the state are missing or should not be displayed.

IPAM Plugin Improvements

The IPAM Discovery MS Windows® Agent Plugin has new enhancements that allow you to update all the “Occupied”, “Available”, “Managed” and “Unmanaged” data that was previously only possible to update from Pandora FMS server.

IPAM Tasks from Satellite Servers

It is now possible to configure IPAM tasks in Pandora FMS console so that they can be run from a Satellite server with remote configuration enabled.

Credential Store Improvement in Satellite servers

Pandora FMS Satellite Servers now have the credential store for SSH, WMI and SNMPv3 modules. These credentials can also be encrypted in the configuration files used by Satellites to ensure their privacy.

Improvement in Discovery Plugin: MongoDB®

Included the ability to launch custom SQL queries to generate monitoring modules in the Discovery MongoDB plugin.

Policy Enforcement Priority in Autoconfiguration

To improve performance in monitoring policy enforcement, it is now possible to prioritize agent autoconfiguration rules, so that policies with higher priority are applied before the rest.

New macros for network modules

It is now possible to use “_agentalias_” and “_agentname_” macros as the target IP address in network modules.

Improved SNMP Trap Alerts

SNMP trap alerts can be configured to filter their triggers by the “Subtype” field.

Improved Alert Recovery

Included an option in alert recovery to be performed only upon the change of status to “normal” of a module. This option is configurable on each alert template.

Configuration Options for Collecting Logs

OpenSearch® setup in Pandora FMS Web Console for collecting logs now has more options that allow you to adjust some OpenSearch® configuration parameters for each environment.

Improvements and small changes

Case#GitLab#Description
N/A2361New feature for credential encryption in monitoring through SSH, WMI and SNMP 3. It includes new tokens that are used globally in the Satellite server or at agent level for their corresponding modules.
107196728By means of the macros _agentalias_ and _agentname_, and if these fields contain a valid IP address, these macros can be added to the Target IP field of the modules for subsequent monitoring.
12514

8092

  • Related: MR 79
Alerts by SNMP trap can also be filtered by subtype (Subtype trap).
N/A9669New audit Information widget.
14567 and 145859905You may add general read-only instructions to any type of event, regardless of the rest of the fields. Included the same mechanism for API 2.0 and PFMS CLI.
N/A11527For IPAM discovery tasks, you may now configure PFMS server or the Satellite server to handle said task.
N/A11748Added prioritization to agent autoconfiguration when applying monitoring policies.
N/A12755New event list report based on saved filter.
N/A13638Added the Recovery only on Normal status token to alert templates, so that alert recovery is performed only for normal state.
N/A

13785

  • Related: 12463, 12489, 13786, 13787, 13790, 14110, 14643.
New feature for Software Agents in MS Windows® performed through Inventory of installed patches and comparison with the list of patches to be installed.
N/A14193New custom queries for MongoDB® database monitoring using Discovery PFMS

Known changes and limitations

Case#GitLab#Description
N/A

9918

  • Related: 13642 and 13991
Added support for user authentication with SAML 2.0 (SimpleSAMLphp server) while supporting previous versions.
N/A12781Module-based, agent-based, and group-based event reports will be deprecated in the LTS release in 2025.
N/A13945Added new index configuration section to the Log Collector, so that, optionally, four important parameters may be defined in OpenSearch.

Fixed vulnerabilities

Case#GitLab#Description
N/A CVE-2024-35308 Acknowledgement: i[@]qvq.im14684Fixed the arbitrary reading of the operating system file by a user registered in PFMS Web Console (plugins section).
N/A CVE-2024-9987 Acknowledgement: i[@]qvq.im14685Fixed access to read-only CSV data for any agent module by a registered user in PFMS Web Console (console extensions section).

Bug Fixes

Case#GitLab#Description
N/A10062Fixed searches by module name in the Monitor detail view to make literal queries with the following characters: %, _, [, ], {, }, -, ^.
The only non-verbatim search character is the asterisk, so it can be searched literally if between quotation marks (and any search that includes quotation marks will be literal).
N/A

12962

  • Related: MR 79
Fixed special days for leap years.
N/A13073Fixed the display and style of the applied updates view (Warp Journal) to the product style.
N/A13114Fixed the description of the DNS plugin.
N/A13250Fixed the CLI PFMS command update_agent option update_gis_data, to only take values zero and one.
N/A13255Fixed the update_group command (PFMS CLI) to avoid hierarchy paradoxes against the same group or with groups related to other groups.
N/A13442Fixed the default value and description of token syncserver.
N/A

13511

  • Related: MR 79
Removed widget “Welcome message to” for failing to function as expected.
N/A13522Fixed visual glitches for both dark and light themes in the Credential Store.
N/A13523Added a warning message to module template management in case you did not select any Private Enterprise Number (PEN).
N/A13553Fixed visual glitches in Permissions Report PDF.
N/A13747

Fixed the following commands in HTTP 500 errors in API 1.0:

  • get id_group_agent_by_name
  • get id_group_agent_by_alias
  • get group_agent_by_name
1762013782Fixed Cron Jobs task editing and/or addition in the Command Center (Metaconsole).
N/A13792Fixed the scope of users regarding the special group All in Inventory Alerts, so that they may have access to it only if they have specific permissions on it.
N/A13794Fixed the Cluster view so that only users who have permissions on the group to which the cluster belongs may access it.
N/A13797Fixed and limited agent deletion in Monitoring Policies for users who do not have permissions on the agent groups.
N/A

13799

  • Related: 14585
Fixed the display of tasks belonging to group ALL in IPAM if users do not have permission on said group. Fixed other permissions for different types of user profiles.
N/A13811Fixed the first uninitialized state in web module creation if applicable.
N/A

13818

  • Related: 13731, 13783, 14581
Fixed the correct interpretation and execution of macros in custom event responses if the display command option is enabled when running a command (view used for debugging).
N/A

13857

  • Related: 13803, 13804, 13840, 13848
Fixed a major bug in the Command Center (Metaconsole) that affected centralized services and services on nodes when added as a service element.
N/A13819Restricted access to Visual Consoles both in nodes and in the Command Center (Metaconsole) by means of the use of URLs by users without a VM profile.
1773813826Fixed the application of Regex conditions for received monitoring data in character string imodules, to detect state changes.
1765613829Fixed external alert addition in monitoring policies when extended characters are used in modules. To that end, the exact matching feature in regular expressions was also added.
N/A13836Removed repetitive message in HA environment alerting. It is verified that it appears in a timely manner according to the type of detected error and without repetitions.
N/A13854Removed the warning message in the event alerts view, which was only valid for versions prior to 779.
N/A13855Fixed the operation of basic security monitoring in the installation of the Software Agent for MS Windows® (Windows Server 2022®).
1782713865Fixed error HTTP 500 when saving bulk monitoring policy operations without having made any changes.
N/A13917Fixed mass operations on agents in centralized environments, specifically in the secondary group description editing.
N/A13952Fixed agent group disabling for counting agents in use according to license terms.
1754114065Fixed the token to explore all virtual machines and CPU and memory data collecting for monitoring XenServer® with Discovery PFMS.
N/A14095Fixed the token generation process for users using the PFMS API 2.0.
N/A14109Fixed several errors in the API 2.0 PFMS when paying certain fields with special enumeration.
1832914137Fixed image display in base64 in WUX monitoring when generating PDF.
1834914147Fixed unsolicited login to Web Console when using PFMS API 2.0.
1836214152Fixed inverse threshold application in monitoring policies.
N/A14163Fixed the WUX server to stop if the specified IP address to be monitored is out of reach.
N/A

14171

  • Related: 12374, MR 79
Fixed Oracle monitoring to connect in sysdba, thick and thin mode while maintaining cryptographic compatibility ®.
18394

14189

  • Related: MR 79
Fixed the use of threads and cores used to streamline data collecting in VMWare monitoring in Discovery PFMS.
1846514192Fixed duplicity in agent creation caused by a misconfigured token in VMWare monitoring with Discovery PFMS.
18651

14273

  • Related: 11815
Fixed the possibility of choosing another agent in synthetic module creation.
18691

14305

  • Related: 14289
Fixed access to users with ACLs and secondary groups to remote operation with Pandora RC.
N/A

14291

  • Related: 12941, 13973, MR 79
Interval correction in Dataserver modules.
N/A14342Fixed token display in the PFMS API 1.0.
1884814381En Fixed graph display in Monitor view in the Command Center (Metaconsole).
N/A

14417

  • Related: 14418
Fixed inventory enablement (basic options) in Software Agents.
1890214507Fixed agent duplication in MySQL monitoring with Discovery PFMS.
N/A14822Fixed connection to the nodes for alert display from the Command Center (Metaconsole).
N/A14521Fixed the default event filter assignment in every user profile in both Command Center and nodes.
N/A14533 and 14639Fixed the use of the Command Center as an update repository for centralized nodes.
N/A

14536

  • Related: 14164
Fixed the use of double quotation marks (character escape) in event update in PFMS API 2.0.
N/A14540Fixed the Discovery server for updating the extra_data field (data received in JSON).
N/A14651Fixed Error 500 when accessing the View Map in Recon Task.
N/A

14657

  • Related: 14256
Fixed filter in event reports for the Command Center and nodes.
N/A14701Fixed offline update (version comparison).
N/A14706Visually enhanced the agent configuration interface and the module interface.
N/A14734Fixed plugin pandora_df_used to always return values in bytes and thresholds in percentages.
N/A

14825

  • Related: 14844 and 14848
Checked the operation in Visual Consoles of the elements Serialized pie graph, Bars graph, Event history graph and Simple value.
N/A

14867

  • Related: 14865
Fixed ratings in vulnerability monitoring so that they fit a range of 0 to 10 points.
N/A14865Fixed the duplicated addition of the same software with different versions in vulnerability monitoring. Now it only takes into account the next version to the one installed for rating calculation.
N/A14862Fixed PFMS server restart for version 780 after an online update. For version 779, Pandora FMS must be manually restarted.

關於 PandoraFMS
Pandora FMS 是一個靈活的監控系統,能夠監控設備、基礎設施、應用程式、服務和業務流程。當然,Pandora FMS 可以控制的東西之一就是您電腦的硬碟。

關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。