Fortinet, Microsoft collaborate to securely move enterprises to the cloud
Fortinet and Microsoft have expanded their technology alliance to let enterprise customers benefit from integrated cybersecurity that can share intelligence in real-time and ensure automated protection...
View ArticleWhich iPhones and iPads can run iOS 11?
When Apple releases iOS 11 this fall, it will, as it has in the past, drop support for some of its older hardware to permanently lock them into 2016's operating system.More pressing, some four-year-old...
View ArticleGoogle wants to kill your phone
Google is working hard to make phones obsolete.The company wouldn't admit this. And they don't want me to say it. They still have to make nice with mobile phone carriers who support and sell Android...
View ArticleSolarWinds simplifies enterprise network management with new products
SolarWinds has announced two new unified network management solutions: SolarWinds Network Operations Manager and SolarWinds Network Automation Manager.The new SolarWinds offerings build on the...
View ArticleNegative perceptions about cloud computing are outdated myths: study
Businesses in Asia Pacific are rapidly embracing cloud infrastructure (IaaS) to boost performance and innovation levels, new research from Oracle has revealed.While negative perceptions around...
View ArticleAT&T, China Telecom to jointly create new services for MNCs in China
AT&T and China Telecom are strengthening their cooperation to develop more advanced network services for multinational companies doing business in China.The companies are looking to help...
View ArticleSingapore tops ITU's Global Cybersecurity Index 2017
Singapore has topped the International Telecommunication Union’s Global Cybersecurity Index (GCI) 2017, followed by United States and Malaysia.Other countries in the Top 10 include Oman, Estonia,...
View ArticleCloud computing: The next frontier for cybercrime
The advantages of cloud computing—scalability, speed to market, lower costs and higher productivity—are well known throughout most industries. But for cyber criminals, this new, borderless...
View ArticleCitrix ShareFile review: Secure cloud-based file-sharing for the workplace
It’s been about a year since we last looked at Citrix ShareFile, the cloud-based file sharing and synchronization service offered by Citrix. In that year, ShareFile has added Outlook and Gmail...
View ArticleAvoid the mouse trap: Old habits wreck new tech
Don't look now, but your desktop user interface dates back to the Nixon administration. Is it time to upgrade to the next UI?New technologies revolutionize business. And big shifts like artificial...
View ArticleWhat's the difference between MDM, MAM, EMM and UEM?
The difference between mobile management policies and technologies may come down to degrees of control, but deploying the wrong strategy can cost companies monetarily and kill employee morale.When...
View ArticleParallels launches RAS version 16
Parallels has launched Parallels Remote Application Server (RAS) version 16 at Microsoft’s Inspire conference in Washington D.C.New features include PowerShell API, white labelling for managed service...
View ArticleSo your company is on social media, are you practicing safe tweeting?
Social media has evolved from a mere millennial fad into a preferred marketing tool used by businesses across Asia Pacific. With Asia Pacific accounting for 54% of global social media users, and Asia...
View ArticleDarktrace enters into strategic partnership with CITIC Telecom CPC
Darktrace has entered into a strategic partnership with managed security services provider (MSSP) CITIC Telecom CPC, a wholly owned subsidiary of CITIC Telecom International Holdings Limited, to bring...
View ArticleDarktrace enters into strategic partnership with CITIC Telecom CPC
Darktrace has entered into a strategic partnership with managed security services provider (MSSP) CITIC Telecom CPC, a wholly owned subsidiary of CITIC Telecom International Holdings Limited, to bring...
View ArticleWhat's the difference between SDN and NFV?
SDN, NFV & VNF are among the alphabet soup of terms in the networking industry that have emerged in recent years.Software defined networking (SDN), network function virtualization (NFV) and the...
View ArticleCost of a data breach eased 10% to $3.6M globally
The average cost of a data breach is $3.62 million globally, a 10% decline from $4 million in 2016, according to a study sponsored by IBM Security and conducted by Ponemon Institute.This is the first...
View ArticleSiemens launches first fully integrated Digitalization Hub in Singapore
Siemens launched its first fully integrated Digitalization Hub to bring its expertise and innovations in the Internet of Things (IoT) to the Southeast Asian market. The company will be co-creating...
View ArticleHPE Software boosts security in its backup suite
Hewlett Packard Enterprise (HPE) Software has announced the latest version of its Adaptive Backup and Recovery (ABR) Suite with new features that help customers secure their digital environments, lower...
View ArticleOpen source in the security world -- a liability or strength?
To some, the terms ‘open source’ and ‘security’ may not exactly go hand in hand. Characterized by its transparent code—which means it’s highly accessible to anyone— as opposed to ‘closed’, proprietary...
View Article