Skip to content

ESET家用Windows產品的最新版本有哪些新功能?

Each year, around autumn, ESET releases a new version of its Windows offering for home customers. This year sees the arrival of the fourteenth version of the home Windows lineup, with a long list of new and improved features for users. With cyberattacks surging massively over the past few months, this update meets users’ need for comprehensive online security in times of uncertainty and increased threats.

Included in the updates are ESET Internet Security, an advanced security solution that brings rock-solid protection for modern web users; ESET NOD32 Antivirus, a fast and light solution that is perfect for gamers and everyday users who don’t want any interruptions; and ESET Smart Security Premium, a comprehensive product built without compromise for users who want it all, including extra data encryption and easy password management. With the aim of creating a safer digital world for everyone to enjoy, version 14 adds a series of new features to these products, along with improvements in malware detection, online banking and password security.

A crucial upgrade was made in the Advanced Machine Learning module, which now has better detection while retaining a tiny footprint. The improvements in the data selection and algorithm components will lead to increased detection of threats, including those transmitted via email. Synchronous Advanced Machine Learning in the Cloud, which runs more heavyweight detection models on cloud platforms, also brings considerable improvements for the detection of new malware.

Similarly, ESET is continually working to improve behavioral detection, with a focus on extending protection across system components that are typically abused by malware. To this end, the Host-Based Intrusion Prevention System, which utilizes advanced behavioral analysis to protect your system from malware and unwanted activity, has also been bolstered with further detection methods. This includes improved detection of ransomware and other malware using suspicious encryption and decryption API calls.

The update also provides users with new protection in the form of the Windows Management Instrumentation (WMI) and System Registry Scanner, which are capable of detecting malicious uses of the WMI and the system registry.

Finally, version 14 also brings changes to Banking & Payment Protection, including a “secured browser” mode through which you can safely pay online. This mode gives users the option to run any supported browser in secured mode by default; after it has been set up, the browser will always start in secured mode. The improved Banking & Payment Protection automatically protects users when banking online and when accessing web-based cryptocurrency wallets. The update encrypts the communication of your keyboard and mouse for safer transactions in your browser, and notifies you when Remote Desktop Protocol is on – a possible sign that malware is spying on you.

For more information about the full list of features included in ESET’s home Windows offering, please see here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

RADIUS授權變更(CoA):這是什麼? 為什麼要使用它?

The RADIUS change of authorization (as defined in RFC 5176) provides a mechanism to change authorization dynamically after the device/user is authenticated. Once there is a policy change for a user, you can send RADIUS CoA packets from the authorization server to reinitiate authentication and apply the new policy.

The RADIUS CoA process allows you to change the user access immediately when needed, without the need to wait for the wired switch or access point to initiate a re-authentication process, or for the device to disconnect and re-connect again.

CoA use cases (for connected authenticated devices) include:

  • Access control policy update, such as VLAN assignment for a group of devices/users
  • Risk/posture assessment policy was updated for a group of devices/users
  • Administrator blocked a device/user
  • Device risk score/compliance changes: Device is out of compliance (such as AntiVirus or firewall was turned off), thus needs to be set to quarantine VLAN or have access completely blocked; Or device is back in compliance, thus needs to be set to the production VLAN.

The CoA process functions as follow:

  • A device is connected to a wired ethernet switch or WiFi SSID after a successful authentication
  • There was a policy update or a change on the endpoint which requires that the device completely disconnect from the network or reconnect with different access than the current one (i.e. different VLAN, apply ACL)
  • The RADIUS server sends the CoA packet to disconnect the device which leads to re-authentication and applies the new access policy

CoA Packets

The RADIUS CoA packet is sent on port UDP 3799 or UDP 1700 – as used by some network vendors.

Disconnect-Request (PoD – Packet of Disconnect) is a request being sent to the NAS – Network Access Server (i.e. switch/access point), in order to terminate the user session/s. As a reply, two packets can be sent from the NAS:

  • Disconnect-ACK – acknowledgment, successful disconnect
  • Disconnect-NAK – negative acknowledgment, disconnect session failed

CoA-Request packet can also be sent to initiate changes on the device or port such as re-authentication and bounce port. As a reply, two packets can be sent from the NAS: CoA-ACK (successful CoA action acknowledgment) and CoA-NAK (CoA failed action). When there’s a need for a VLAN change, using CoA-Request, might not force the endpoint IP address to be released and renew. Instead, it may only change the VLAN. Thus, for implementations that require VLAN change, it’s recommended to use the Disconnect-Request CoA packet which will lead to re-authentication, and for the device to get a new IP address on the updated VLAN.

CoA Disconnect-Request with 802.1X RADIUS Authentication Flow

>RADIUS Change of Authorization Packet Capture

CoA RADIUS codes

CoA Packet Radius Code
Disconnect-Request 40
Disconnect-ACK 41
Disconnect-NAK 42
CoA-Request 43
CoA-ACK 44
CoA-NAK 45

Packets Capture Examples using Wireshark

Disconnect-Request:

Disconnect-ACK:

These packets contain attributes with information on the NAS (wired switch/access point), endpoint involved, timestamp, and a link to the frame of the RADIUS server requests / NAS responses.

RADIUS Change of Authorization with Portnox CLEAR

Using Portnox CLEAR for CoA with dynamic VLAN assignment (previously discussed in Dynamic VLAN Assignment) implementation, allows the administrator to achieve a secure and segmented network for dynamic changes in the environment. Whether it’s an access policy change for a group of users/devices or a compliance change on a specific endpoint, the device(s) will be immediately placed on the relevant network, or blocked according to the policy.

In the following video, we’ll demonstrate a CoA use case of risk violation for a device with Portnox CLEAR. Scenario description:

  • Configure SSID to work with CLEAR services, including CoA.
  • In CLEAR, review risk assessment policy which requires AntiVirus to be up, running, and updated, and access control policy which places devices with risk violation in quarantine VLAN.
  • Connect a device with AgentP (CLEAR agent on the endpoint for risk assessment) enrolled to the configured SSID and authenticate successfully with a certificate.
  • Turn off AntiVirus on the endpoint, CLEAR identify the risk, and send CoA packet to disconnect the device.
  • The re-authentication process starting, and the device is being placed in the quarantine VLAN.
  • Add remediation action to start AntiVirus | AntiVirus is being enabled on the endpoint by CLEAR and the device is back in compliance.
  • CoA process is initiated, and the device is being placed back in the production VLAN.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

ESET合作夥伴連續第八年在日本領先的客戶滿意度調查中排名第一

Bratislava – Slovakia, October 21, 2020 – ESET, a global leader in IT and cybersecurity, today announces that its exclusive partner in Japan, Canon Marketing Japan Inc., has received the #1 ranking in the security products category of the Nikkei Computer’s customer satisfaction survey for the eighth year in a row. Nikkei Business Publications, Inc. is the largest content provider in the country. The prestigious 2020 survey was completed by the IT departments of over 12,000 businesses and local governments, assessing providers across seven groups of criteria; Overall Satisfaction, Performance & Functionality, Reliability, Operability, Cost, Support and Intent to Renew. Respondents assigned satisfaction scores to their selected products on a scale from Satisfied to Dissatisfied for each sub-category. Final scores were calculated as an average of all given points in each respective sub-category. Canon Marketing Japan Inc. won first place in the survey and is noted as particularly competitive in pricing, performance and functionality – having exceeded the industry average for the last five years. ESET’s portfolio of Endpoint Security solutions, a central part of Canon Marketing Japan Inc.’s security product portfolio, combines multi-layered antivirus capabilities with intuitive software and a low system footprint. The result is award-winning, comprehensive protection for organizations of all sizes. Hiroya Kuroda, Country Manager at ESET Japan, commented, “We are extremely pleased for our Partner, Canon Marketing Japan Inc., and our products to be recognized in Japan for helping to support cutting-edge security services. The threat landscape faced by businesses today is ever evolving and marked by never-ending attacks. To stay ahead of the game, ESET has doubled its R&D investment worldwide over the past five years with almost 40 per cent of employees working in research and development. This has allowed us to protect our customers with industry-leading security solutions that are innovative, powerful, reliable and easy to use.” Learn more about ESET Endpoint Security solutions here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

第一個以色列高科技代表團飛往阿聯酋

The first Israeli high-tech delegation to the Emirates departed this morning (Sunday), led by Jerusalem Venture Partners Fund and entrepreneur Erel Margalit. Over the next four days, the delegation is set to hold high-level meetings with senior officials as well as innovation and investment counterparts in Dubai and Abu Dhabi, to build cooperation between Israeli and Emirati hi-tech, and deepen the newly found relationship between the two countries.

Erel Margalit, CEO and founder of the Jerusalem Venture Partners (JVP), February 18, 2019. / Hadas Parush/Flash90

On Tuesday, participants will join first of their kind ’round table’ meetings between entrepreneurs from the two countries– both of which are renowned internationally as leaders in the field. Ahead of the visit, the delegation was honored to have received the warm welcome of the UAE Government and was looking forward to the opportunity to meet senior ministers during the visit.

“Hi-tech is the locomotive engine that leads the Israeli economy, so we have a key role in leading relations and cooperation with the Emirates, with an emphasis on partnership,” commented JVP founder and chairman of Margalit Startup City Erel Margalit.

He added, “I am proud to lead the first Israeli hi-tech delegation to the Emirates. Our companies have been in business contact with the Emirates for a number of years, and now an opportunity has arisen to expand this network of relationships, deepen the ties significantly, and allow more and more Israeli companies and entrepreneurs to be part of this connection and success.”

Margalit stressed, “This is not just a business opportunity, but a political opportunity for a new page between the Israeli hi-tech community and the entire Middle East. With us in the delegation, are the CEOs of emerging Israeli hi-tech companies from every field, and I am sure we will create real partnerships here that will contribute to building successful Israeli companies that will propel the Israeli economy forward, precisely during this period, and create more and more new jobs.”

The delegation was invited to the Emirates by the DIFC (Dubai International Financial Center), the body that manages the free trade area in the financial heart of Dubai – which is one of the global financial centers. Members of the delegation will also receive a comprehensive tour of the financial center.

Among the companies participating in the delegation: Earnix, one of the world’s leading companies in insurtech and personalization of insurance and banking, an area with great interest in the Emirates, which is considered a powerhouse in the field of insurance in the Middle East; Up Control, an emerging Israeli company leading a revolution in the management of remote work networks; Morphisec, from Beer Sheva, which is a leader in innovative technology for protecting endpoints in organizations, which is a particularly relevant development for the protection of banks and infrastructure; and Secret Double Octopus, also from Beer Sheva, which provides a leading biometric solution for passwords.

Also of significant interest to the Emirati Government, companies, and investors is the field of foodtech. Among the delegation in the field is InnovoPro, a company that produces a protein substitute from chickpeas with high nutritional values. One of the most interesting companies in the world in the field, it is already a major player in dairy products in some of Europe’s leading chains, with products from ice-cream to mayonnaise. The company is now preparing for a breakthrough in the Middle East. Another company participating in the delegation is Agrint, which has developed technology to identify diseases in trees before they cause damage. One of the most serious infections in the world is the palm bacteria that destroys entire palm groves. Agrint’s solution for this has significant potential for agriculture in the Middle East.

Members of the delegation included: Entrepreneur, and former senior official in the Mossad, David Meidan; Udi Ziv, CEO of Earnix; FrankZvi, CEO of Copilot; Elad Ben-Meir,-CEO of SCADAfence; Dror Liwer – Co-Founder& Chief Security Officer of Coronet; Asaf Ganot, CEO of Control Up; Omri Kohl, CEO of Pyramid Analytics; Gal Rimon, CEO of Centrical; Ronen Yehoshua, CEO of Morphisec; Raz Refaeli, CEO of Secret Double Octopus; Mark Gazit, CEO of Thetaray; Yaron Ravkaie, CEO of Teridion; Tali Nehushtan, CEO of InnovoPro; Yehonatan Ben Hamozeg, CEO of Agrint; they were joined by JVP partners Yoav Tzruya, Fiona Darmon, Gadi Porat, Michal Drayman, and Rinat Remler, senior VPs Shimrit Kenig, Guy Pross, Pnina Ben Ami, and communications director Omri Sheinfeld.

Source from: https://www.jewishpress.com/news/business-economy/first-israeli-hi-tech-delegation-takes-off-for-the-emirates/2020/10/25/

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

ESET與其他資安及電信業者協同打擊Trickbot殭屍網路

國際資安大廠ESET與Microsoft、Lumen的Black Lotus Labs,NTT Ltd.等協同合作打擊Trickbot殭屍網路;在這個合作項目中,ESET提供了技術分析、統計資訊以及已知的命令和控制伺服器域名和IP。

ESET於2016年底首次檢測到Trickbot,這段期間Trickbot的漏洞不斷地被報導,也成為目前規模最大,壽命最長的殭屍網路之一,正如ESET在《 2020年第一季資安威脅報告》中提到,Trickbot是最流行的銀行惡意軟體家族之一,至今Trickbot已感染了全球超過一百萬台電腦設備,僅僅在2020年,ESET的自動平台就分析了超過125,000個惡意樣本,並下載和解密了Trickbot不同模組使用的40,000多個配置文件,故可以充分了解此殭屍網絡使用的不同C&C伺服器。


Trickbot原本是隻鎖定Windows的金融木馬,它利用時事並透過網釣郵件散布,於郵件中夾帶惡意文件或連結,一旦進駐受害者的電腦,即可執行一連串的秘密行為來挾持受害者的瀏覽器,竊取受害者的網路銀行登入憑證與其它個人資料,再將資訊傳送至C&C伺服器,此外,Trickbot還被用來遞送Ryuk勒索軟體。Trickbot不只能感染Windows裝置,也能感染Linux裝置,使得它的感染範圍從個人電腦蔓延到家庭及組織中的路由器。

原文出處:https://www.welivesecurity.com/2020/10/12/eset-takes-part-global-operation-disrupt-trickbot/


為避免殭屍網路威脅,企業(組織單位)應做好資安防禦措施,歡迎洽詢台灣二版資安專業團隊,服務電話:(02)7722-6899,或上官網查詢:https://version-2.com.tw/?skip=1


關於 Version 2 Digital
資安解決方案 專業代理商與領導者
台灣二版 ( Version 2 ) 是亞洲其中一間最有活力的 IT 公司,多年來深耕資訊科技領域,致力於提供與時俱進的資安解決方案 ( 如EDR、NDR、漏洞管理 ),工具型產品 ( 如遠端控制、網頁過濾 ) 及資安威脅偵測應 變服務服務 ( MDR ) 等,透過龐大銷售點、經銷商及合作伙伴,提供廣被市場讚賞的產品及客製化、在地化的專業服務。

台灣二版 ( Version 2 ) 的銷售範圍包括台灣、香港、中國內地、新加坡、澳門等地區,客戶涵 蓋各產業,包括全球 1000 大跨國企業、上市公司、公用機構、政府部門、無數成功的中小企業及來自亞 洲各城市的消費市場客戶。

關於ESET
ESET成立於1992年,是一家面向企業與個人用戶的全球性的電腦安全軟體提供商,其 獲獎產品——NOD32防病毒軟體系統,能夠針對各種已知或未知病毒、間諜軟體 (spyware)、rootkits和其他惡意軟體為電腦系統提供實時保護。ESET NOD32佔用 系統資源最少,偵測速度最快,可以提供最有效的保護,並且比其他任何防病毒產品獲 得了更多的Virus Bulletin 100%獎項。ESET連續五年被評為“德勤高科技快速成長500 強”(Deloitte’s Technology Fast 500)公司,擁有廣泛的合作夥伴網絡,包括佳 能、戴爾、微軟等國際知名公司,在布拉迪斯拉發(斯洛伐克)、布里斯托爾(英國 )、布宜諾斯艾利斯(阿根廷)、布拉格(捷克)、聖地亞哥(美國)等地均設有辦事 處,代理機構覆蓋全球超過100個國家。

三菱電機MELSEC iQ-R系列CPU中的CVSS 8.6 DoS漏洞

Our Researchers Discover Another Vulnerability 

As part of our mission to secure the world’s OT, IoT and Cyber Physical infrastructures, we invest resources into offensive research of vulnerabilities and attack techniques.

CVE-2020-16850 (US ICS-CERT) is a CVSS 8.6 remote CPU DoS vulnerability in Mitsubishi Electric iQ-R Series that has been discovered by SCADAfence researcher Yossi Reuven.

Mitsubishi Electric is one of the world’s leading electronics and electrical equipment manufacturing companies, and is in use by many of our customers. We have been working with Mitsubishi Electric for the last few months in handling multiple vulnerabilities, and on October 8th, Mitsubishi Electric published an official security advisory reporting this vulnerability and its mitigations.

About The Vulnerability – CVE-2020-16850

MELSEC iQ-R Series is Mitsubishi Electric flagship product line – designed for high productivity automation systems. iQ-R CPUs’ communication with GX Works 3 (Engineering software package) is done via Mitsubishi Electric proprietary protocol MELSOFT (which works on both TCP and UDP).

single specially crafted packet sent by an attacker over the MELSOFT UDP protocol on port 5006 will cause a denial-of-service (DoS) vulnerability due to uncontrolled resource consumption (CWE-400). The PLC’s CPU will get into fault mode, causing a hardware failure (error code: 0x3C00 – hardware failure). The PLC then becomes unresponsive and requires a manual restart to recover.

What SCADAfence Recommends Vendors To Do

Perform an Industrial Vulnerability Management Process

Please refer to our guide on this topic: https://www.scadafence.com/public-preview-a-comprehensive-guide-to-industrial-device-patching/

Monitor for Unauthorized Network Activity and Exploitation

Some devices will always remain unpatched. Monitoring is an early warning system that allows you to act before attackers have gained full control over your network.

Upgrade to the Latest Firmware (When Available)

Currently no firmware update is available (will be released soon by Mitsubishi Electric)

Prevent Unauthorized and Untrusted Access

– Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required.

– Use within a LAN and block access from untrusted networks and hosts through firewalls.

Block UDP Port 5006 and Use MELSOFT TCP

MELSOFT is an engineering software for Mitsubishi PLCs and gives users the option to use either the (connectionless) UDP and (connection-oriented) TCP protocols for programming and configuring the devices. SCADAfence recommends to block Block UDP port 5006 since the cyberattack leverages the connectionless UDP protocol and can cause the PLCs to stop functioning and cause a denial of service. Instead, users should use the TCP protocol for communicating with devices in the shop floor or the control network.

Special Thanks & Recognition

The SCADAfence Research team would like to thank the Mitsubishi Electric team for a speedy vulnerability reporting process even during the challenging COVID-19 times.

SCADAfence is committed to continued research of offensive technologies and development of new defensive technologies.

Exploit PoC

We wrote a Python POC (GPLv3) script of the exploit in action.

Currently, there’s no patch available. As a result, we limit the access to the exploit to vetted individuals only. The exploit is only available for educational and legal research purposes.

Warning: The script will crash the PLC’s CPU – do not use it in production.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

台灣二版獨家代理Portnox網路存取控管(NAC)解決方案,協助企業內部資安防禦輕鬆佈局

近年來駭客入侵內網的事件頻傳,知名企業重要資料被偷竊的事件不斷時有所聞,故對於防範從企業內部入侵與攻擊的需求,也隨之成為關注的話題。談到企業內部網路防禦,長久以來乙太網路已成為基礎網路的標準,但是同時也因先天上簡單的設計,沒有任何管理或控制連網設備的機制,造成不易管理、無法有效監控上線設備的問題;又隨著BYOD(Bring Your Own Device)各種移動設備的盛行,需求不斷地成長,再加上內網安全與管理需求不斷地增加,NAC (Network Access control)解決方案也隨之產生,而其主要的功能就在於解決設備在連上企業或組織內部網路的第一時間,如何來判斷其是否合法,有無權限進入網路的問題。就好像從旅客國外回國進入海關,海關第一時間就會檢查你是否有合法授權可以入境。

台灣二版多年來深耕資訊科技領域,致力於提供與時俱進的產品及解決方案,結合亞洲區的代理優勢與在地化專業的服務經驗,獨家引進Portnox 的網路存取控管(NAC)解決方案,提供了完整的網路存取控制、可視性、管理和策略合規性,以確保企業於當今複雜的網路環境裡能夠平穩、安全地運行。

Portnox成立於2007年,為網路存取控管(NAC)解決方案,其遍及所有網路層面-乙太網、無線、虛擬、VPN和雲,它可以直接與所有現有的交換機、無線存取控制器、路由器和防火牆進行通訊,進而可以在接入網路的第一時間,就能對設備或使用者進行身份認證並監控企業內部或外部的每個端點,無論是IoT、BYOD或公司託管的設備。由於Portnox的解決方案不需要更改任何設備、代理或現有的基礎架構,且無論規模大小,它都能在所有的環境中快速部署。其尖端的技術可協助企業保護、聯繫和管理任何用戶、任何設備、任何地方的網路所面臨的可能風險,以確保當今複雜的網路能夠平穩,安全地運行。

欲完整了解Portnox網路存取控管(NAC)解決方案,產品連結網址:
https://version-2.com.tw/portnox/
或歡迎電洽台灣二版專業資安團隊(02)7722-6899。

【關於台灣二版 Version 2】

台灣二版(V2) 是立足亞洲的代理商及IT開發者。公司發展及代理各種不同的互聯網、資訊科技、多媒體產品,其中包括資安、網絡、雲端、基礎設施、通訊系統、軟體開發運營、商業應用、多媒體、生產力及消費市場產品。透過公司龐大的網絡、銷售點、分銷商及合作夥伴,台灣二版(V2)提供廣被市場讚賞的產品及服務。台灣二版(V2)的銷售網絡包括台灣、香港、澳門、中國大陸、新加坡、馬來西亞等各亞太地區,客戶來自各行各業,包括全球 1000 大跨國企業、上市公司、公用事業、醫療、金融、教育機構、政府部門、無數成功的中小企及來自亞洲各城市的消費市場客戶。

【關於Portnox】

Portnox提供了易於部署、操作和維護及具安全性、可視性的網路存取控管(NAC)解決方案,該公司的創新成果獲得了”Info Security Products Guide “及”Cyber Defense Magazine”等媒體的肯定,Portnox在美國,歐洲和亞洲皆設有辦事處,協助全球數百家企業解決因互聯世界不斷發展所產生的多元網路挑戰。