FORGOT YOUR DETAILS?

Trustworthy network performance is crucial for enterprises and service providers. Some problem can threaten user experience such as a configuration errors, network or application faults and also security attacks. Engineers need to keep an eye on regularly their networks and quickly troubleshoot problems wherever they occur to make sure the network operating excellently.This enterprises and

What is cloud computing? Cloud computing is using the Internet (the cloud) to store, manage and process data rather than using the personal computer or local server. When using the cloud as a the storage of course the data are expose to the cyber risk. Security Governance also play an important role to prevent this

As been mention before, in security governance board members in the organisation accountable. It mean board members has the responsibility on their company security governance to prevent from cyber risk. Even though the board member has the authority to perform the information security but they lack in understanding the security issue. To have clear-cut insight

How to identify security policies problem area? How to quick fix information security from cyber threat? In this case we used what known as CIA Triad. Don’t get confuse with Central Intelligence Agency; a U.S. government agency that maintain national security from around the world. This CIA can be describe as security model that determine

What is security governance? Basically every company have their own framework of standards, processes and company activities to ensure the whole organisation run smoothly everyday. All this company data and activities must be keep in private and only authorized people can access the data and activities. This is security governance or in other simpler word

E-SPIN Integrated Cyber Security Center Facility

World had moving toward digitalization and replace traditional industry and sector, digital economy become mainstream worldwide. From corporate and e-government digital transformation (DT),  it become one of the mission critical infrastructure (MCI) regardless of country size, all will invest heavily to make sure at the national level maintain competitiveness in this national core competency. To

Data Center Automation and Orchestration Layers

There are entire organizations that are born from a cloud model which resides within the data center. Looking ahead, new cloud and data center control systems will only continue to become more critical. As more users utilize content delivered directly from cloud resources, the data center will need to be able to handle the influx

E-SPIN Unified Vulnerability Management (UVM) Explained

From real-time data analysis and enhanced application performance to much lower operating costs and scheduled downtime, there are plenty of reasons as to why organizations might begin to employ edge computing technologies into their network infrastructure, but what individual technologies are enabling enhanced networks such as 5G? How are they improving existing network infrastructures and

Competencies in Application Performance Monitor (APM) Solutions

Adoption of edge computing and applications will ultimately be determined by how well these technologies mesh with business goals and will depend on whether an organization has the resources to effectively implement, manage and monetize them. Several industries are particularly well poised to benefit from edge computing: 1. Smart cities. Edge computing can apply broadly

Top 5 Edge Computing Applications for Micro Data Center

Edge computing is used to push applications, data and services away from centralized nodes to the logical extremes of a network. It also enables analytics and knowledge generation to occur at the source of the data. Schneider Electric Micro DC Xpress It is a line of connected products that make it faster, easier and more

Since new products like composable infrastructure and on-premises cloud platforms could offer a way to achieve software-defined infrastructure (SDI) and software-defined data center (SDDC), you can see as new opportunity and path to do it, but you also need to aware for the pitfalls. Virtualization changed the data center when hypervisors and virtual machines abstracted

AI take over IT job

AI take over massive of IT job that in the past manual and brain work intensive work such as data entry, manipulate data, compile report and reactive, passive job that waiting for service request and then react, and off course majority of repeated work. From the news headline this year along, we saw Microsoft, Oracle,

10 technologies that will make the Internet of Things a reality Smart energy management 10 technologies that will make the Internet of Things a reality is smart energy management. Energy management was one of the original focuses of Internet of Things development, with smart thermostats like Google Nest , Hive, Tado and Honeywell offering systems that allow

Trend Micro Enterprise Security Suites Edition Trend Micro along the years had published various Enterprise Security Suites, despite the new package bundled, for existing customer can continue to renew what they previous subscribed. The package value is obvious for massive cost saving and more feature set available for user adoption. Protect and save with integrated,

Trend toward Endpoint Protection Platforms (EPP) Market Endpoint Protection Market evolving to Endpoint Protection Platforms (EPP) Market From the recent Magic Quadrant for Endpoint Protection Platforms 2017, we notice that EPP market listing criteria rise again and now required vendor to demonstrate even more capability beyond their previous core technology offering. The current standard for

VMware Horizon 6 Product Overview by E-SPIN, Three Ways Indicators of Compromise Help SOC Teams

Network security services (NSS) includes services that perform security enforcement or management. NSS includes services provided by the NSS IPSec discipline and NSS XMLAppliance discipline. Each discipline includes a subset of services provided by NSS and is intended for use by a specific type of NSS client. Network security is any activity designed to protect

Trustworthy network performance is crucial for enterprises and service providers. Some problem can threaten user experience such as a configuration errors, network or application faults and also security attacks. Engineers need to keep an eye on regularly their networks and quickly troubleshoot problems wherever they occur to make sure the network operating excellently.This enterprises and

Cloud Security Governance

What is cloud computing? Cloud computing is using the Internet (the cloud) to store, manage and process data rather than using the personal computer or local server. When using the cloud as a the storage of course the data are expose to the cyber risk. Security Governance also play an important role to prevent this

Security Governance Framework

As been mention before, in security governance board members in the organisation accountable. It mean board members has the responsibility on their company security governance to prevent from cyber risk. Even though the board member has the authority to perform the information security but they lack in understanding the security issue. To have clear-cut insight

CIA Triad in Security Governance

How to identify security policies problem area? How to quick fix information security from cyber threat? In this case we used what known as CIA Triad. Don’t get confuse with Central Intelligence Agency; a U.S. government agency that maintain national security from around the world. This CIA can be describe as security model that determine

What is Security Governance?

What is security governance? Basically every company have their own framework of standards, processes and company activities to ensure the whole organisation run smoothly everyday. All this company data and activities must be keep in private and only authorized people can access the data and activities. This is security governance or in other simpler word
E-SPIN Integrated Cyber Security Center Facility
World had moving toward digitalization and replace traditional industry and sector, digital economy become mainstream worldwide. From corporate and e-government digital transformation (DT),  it become one of the mission critical infrastructure (MCI) regardless of country size, all will invest heavily to make sure at the national level maintain competitiveness in this national core competency. To
Data Center Automation and Orchestration Layers
There are entire organizations that are born from a cloud model which resides within the data center. Looking ahead, new cloud and data center control systems will only continue to become more critical. As more users utilize content delivered directly from cloud resources, the data center will need to be able to handle the influx
E-SPIN Unified Vulnerability Management (UVM) Explained
From real-time data analysis and enhanced application performance to much lower operating costs and scheduled downtime, there are plenty of reasons as to why organizations might begin to employ edge computing technologies into their network infrastructure, but what individual technologies are enabling enhanced networks such as 5G? How are they improving existing network infrastructures and
Tagged under:
Competencies in Application Performance Monitor (APM) Solutions

Benefit of Edge Computing in Business

Adoption of edge computing and applications will ultimately be determined by how well these technologies mesh with business goals and will depend on whether an organization has the resources to effectively implement, manage and monetize them. Several industries are particularly well poised to benefit from edge computing: 1. Smart cities. Edge computing can apply broadly
Tagged under:
Top 5 Edge Computing Applications for Micro Data Center
Edge computing is used to push applications, data and services away from centralized nodes to the logical extremes of a network. It also enables analytics and knowledge generation to occur at the source of the data. Schneider Electric Micro DC Xpress It is a line of connected products that make it faster, easier and more
Tagged under:
Since new products like composable infrastructure and on-premises cloud platforms could offer a way to achieve software-defined infrastructure (SDI) and software-defined data center (SDDC), you can see as new opportunity and path to do it, but you also need to aware for the pitfalls. Virtualization changed the data center when hypervisors and virtual machines abstracted
AI take over IT job

AI take over IT job

AI take over massive of IT job that in the past manual and brain work intensive work such as data entry, manipulate data, compile report and reactive, passive job that waiting for service request and then react, and off course majority of repeated work. From the news headline this year along, we saw Microsoft, Oracle,
10 technologies that will make the Internet of Things a reality Smart energy management 10 technologies that will make the Internet of Things a reality is smart energy management. Energy management was one of the original focuses of Internet of Things development, with smart thermostats like Google Nest , Hive, Tado and Honeywell offering systems that allow
Tagged under: ,
Trend Micro Enterprise Security Suites Edition Trend Micro along the years had published various Enterprise Security Suites, despite the new package bundled, for existing customer can continue to renew what they previous subscribed. The package value is obvious for massive cost saving and more feature set available for user adoption. Protect and save with integrated,
Tagged under: ,
Trend toward Endpoint Protection Platforms (EPP) Market Endpoint Protection Market evolving to Endpoint Protection Platforms (EPP) Market From the recent Magic Quadrant for Endpoint Protection Platforms 2017, we notice that EPP market listing criteria rise again and now required vendor to demonstrate even more capability beyond their previous core technology offering. The current standard for
VMware Horizon 6 Product Overview by E-SPIN, Three Ways Indicators of Compromise Help SOC Teams
Network security services (NSS) includes services that perform security enforcement or management. NSS includes services provided by the NSS IPSec discipline and NSS XMLAppliance discipline. Each discipline includes a subset of services provided by NSS and is intended for use by a specific type of NSS client. Network security is any activity designed to protect
TOP