Quantcast
Channel: Networks Asia - IT news
Browsing all 2029 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Fortinet, Microsoft collaborate to securely move enterprises to the cloud

Fortinet and Microsoft have expanded their technology alliance to let enterprise customers benefit from integrated cybersecurity that can share intelligence in real-time and ensure automated protection...

View Article


Image may be NSFW.
Clik here to view.

Which iPhones and iPads can run iOS 11?

When Apple releases iOS 11 this fall, it will, as it has in the past, drop support for some of its older hardware to permanently lock them into 2016's operating system.More pressing, some four-year-old...

View Article


Image may be NSFW.
Clik here to view.

Google wants to kill your phone

Google is working hard to make phones obsolete.The company wouldn't admit this. And they don't want me to say it. They still have to make nice with mobile phone carriers who support and sell Android...

View Article

Image may be NSFW.
Clik here to view.

SolarWinds simplifies enterprise network management with new products

SolarWinds has announced two new unified network management solutions: SolarWinds Network Operations Manager and SolarWinds Network Automation Manager.The new SolarWinds offerings build on the...

View Article

Image may be NSFW.
Clik here to view.

Negative perceptions about cloud computing are outdated myths: study

Businesses in Asia Pacific are rapidly embracing cloud infrastructure (IaaS) to boost performance and innovation levels, new research from Oracle has revealed.While negative perceptions around...

View Article


Image may be NSFW.
Clik here to view.

AT&T, China Telecom to jointly create new services for MNCs in China

AT&T and China Telecom are strengthening their cooperation to develop more advanced network services for multinational companies doing business in China.The companies are looking to help...

View Article

Image may be NSFW.
Clik here to view.

Singapore tops ITU's Global Cybersecurity Index 2017

Singapore has topped the International Telecommunication Union’s Global Cybersecurity Index (GCI) 2017, followed by United States and Malaysia.Other countries in the Top 10 include Oman, Estonia,...

View Article

Image may be NSFW.
Clik here to view.

Cloud computing: The next frontier for cybercrime

The advantages of cloud computing—scalability, speed to market, lower costs and higher productivity—are well known throughout most industries. But for cyber criminals, this new, borderless...

View Article


Image may be NSFW.
Clik here to view.

Citrix ShareFile review: Secure cloud-based file-sharing for the workplace

It’s been about a year since we last looked at Citrix ShareFile, the cloud-based file sharing and synchronization service offered by Citrix. In that year, ShareFile has added Outlook and Gmail...

View Article


Image may be NSFW.
Clik here to view.

Avoid the mouse trap: Old habits wreck new tech

Don't look now, but your desktop user interface dates back to the Nixon administration. Is it time to upgrade to the next UI?New technologies revolutionize business. And big shifts like artificial...

View Article

Image may be NSFW.
Clik here to view.

What's the difference between MDM, MAM, EMM and UEM?

The difference between mobile management policies and technologies may come down to degrees of control, but deploying the wrong strategy can cost companies  monetarily and kill employee morale.When...

View Article

Image may be NSFW.
Clik here to view.

Parallels launches RAS version 16

Parallels has launched Parallels Remote Application Server (RAS) version 16 at Microsoft’s Inspire conference in Washington D.C.New features include PowerShell API, white labelling for managed service...

View Article

Image may be NSFW.
Clik here to view.

So your company is on social media, are you practicing safe tweeting?

Social media has evolved from a mere millennial fad into a preferred marketing tool used by businesses across Asia Pacific. With Asia Pacific accounting for 54% of global social media users, and Asia...

View Article


Image may be NSFW.
Clik here to view.

Darktrace enters into strategic partnership with CITIC Telecom CPC

Darktrace has entered into a strategic partnership with managed security services provider (MSSP) CITIC Telecom CPC, a wholly owned subsidiary of CITIC Telecom International Holdings Limited, to bring...

View Article

Image may be NSFW.
Clik here to view.

Darktrace enters into strategic partnership with CITIC Telecom CPC

Darktrace has entered into a strategic partnership with managed security services provider (MSSP) CITIC Telecom CPC, a wholly owned subsidiary of CITIC Telecom International Holdings Limited, to bring...

View Article


Image may be NSFW.
Clik here to view.

What's the difference between SDN and NFV?

SDN, NFV & VNF are among the alphabet soup of terms in the networking industry that have emerged in recent years.Software defined networking (SDN), network function virtualization (NFV) and the...

View Article

Image may be NSFW.
Clik here to view.

Cost of a data breach eased 10% to $3.6M globally

The average cost of a data breach is $3.62 million globally, a 10% decline from $4 million in 2016, according to a study sponsored by IBM Security and conducted by Ponemon Institute.This is the first...

View Article


Image may be NSFW.
Clik here to view.

Siemens launches first fully integrated Digitalization Hub in Singapore

Siemens launched its first fully integrated Digitalization Hub to bring its expertise and innovations in the Internet of Things (IoT) to the Southeast Asian market. The company will be co-creating...

View Article

Image may be NSFW.
Clik here to view.

HPE Software boosts security in its backup suite

Hewlett Packard Enterprise (HPE) Software has announced the latest version of its Adaptive Backup and Recovery (ABR) Suite with new features that help customers secure their digital environments, lower...

View Article

Image may be NSFW.
Clik here to view.

Open source in the security world -- a liability or strength?

To some, the terms ‘open source’ and ‘security’ may not exactly go hand in hand. Characterized by its transparent code—which means it’s highly accessible to anyone— as opposed to ‘closed’, proprietary...

View Article
Browsing all 2029 articles
Browse latest View live