This post is also available in: Vietnamese
Delivering innovative cybersecurity
technology and solutions
across Asia Pacific since 2007.
From hardware appliances to software solutions
and training, DT Asia understands cybersecurity
challenges and can deliver solutions that help
organisations detect & identify, protect & secure,
authenticate & authorise, and degauss & destroy.
Solution Design & Architecture
Online & On-site Support
Our solutions are sourced from the US, Europe and Asia.
Each solution is ingested and packaged for our customers, which include
top government organisations as well as global corporations.
News & Events
Your Security Awareness Program Can Do More Than You Think: Fulfilling the Promise of “Training for All”
In the world of security awareness training, we like to think of ourselves as providing training for each employee in the building. There was a time when training non-cyber staff on cyber threats was a novel idea. But, as it became apparent that end users were increasingly becoming one of, if not the single largest, attack vector for cyber threat actors, the field of Security Awareness entered the mainstream.
This is the 12th part of my syslog-ng tutorial. Last time, we learned about enriching log messages using syslog-ng. Today, we learn about how to send log messages to Elasticsearch.
Anomalous behavior analytics is one of the many advantages that big data analytics brings to the table. What role does log monitoring have in this process, and how does it work together with behavioral analytics?
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
#02-72 WCEGA Tower,