For all the existing customers will know 11-Nov is the 15-years anniversary date for E-SPIN founded 15 years ago. From the previous pool of surveys, we have collected a range of important skills or what matters most from you. Originally we intended to run a range of the physical workshop for the customer, but as
We turn 15 globally, this year key theme is Born to be value integrator. From our humble beginning in 2005 to where we are today, we have never forgotten our true purpose, which is to be a value integrator for supplier partners, our business partner, and our customer for life. We are keeping evolving along
Dear Valued Clients and Partners, We are pleased to inform you Notice of E-SPIN Malaysia PJ Office Relocation to Infinity Tower. Our E-SPIN Malaysia office located at Perdana Business Centre, Petaling Jaya (PJ) that served for the past 10 years will be moving to the following new address in effective February 12th, 2020. It part
Dear customer, channel partner and supplier, Please be inform that Malaysia Government Implementation Of A New Registration Number Format For Business Entities Registered With Companies Commission Of Malaysia (SSM). The Companies Commission of Malaysia (SSM) will be using a new format of registration number containing 12 digit characters for company, business and Limited Liability Partnership
E-SPIN would like the take the opportunity for rolling “Thank You 15 Years Growing and Sharing campaign celebration” start from this Merry Christmas Season Greeting, and rolling over next year. E-SPIN found in 2005 and when entering 2020, E-SPIN already growing and sharing with customer partners for 15 years. As well know general fact, new
17-Oct-2019 Thursday 9am E-SPIN Group Malaysia had successful conduct the E-SPIN Tenable Cyber Exposure Risk Management Challenges and Solution Seminar following routine event in Kuala Lumpur – Malaysia, would like to thank you all the business partners and customers who attend and make it another successful event. For those who had attended it, the post
What is cloud computing? Cloud computing is using the Internet (the cloud) to store, manage and process data rather than using the personal computer or local server. When using the cloud as a the storage of course the data are expose to the cyber risk. Security Governance also play an important role to prevent this
Veracode Software Composition Analysis (SCA) can help organizations identify known vulnerabilities from open source components used by their applications, and alert businesses when new vulnerabilities are discovered after an application has been scanned or when existing known vulnerabilities have had their severity level upgraded. Reducing License Risk To Your Business , many open source libraries have
Security is extremely important for all businesses. Companies who do not take supply chain security seriously leave themselves vulnerable to potentially devastating attacks. Before we jump into the details, lets first define what supply chain security is. Supply chain security is a broad term that encompasses the efforts to reduce the risk of both external
Network Operation Center (NOCs) is a central location where organizations support computer networks and telecommunications infrastructure, track and resolve IT infrastructure incidents, and ultimately ensure availability of data centers. Sometimes they are located in the data center, sometimes externally. They are usually connected to a high-speed internet connection or directly to the internet’s backbone to