This post is also available in: Vietnamese

News & Events

Security intelligence analytics: Planning Increases ROI

Security intelligence analytics: Planning Increases ROI

It’s been a week. A long week. After the most recent Board of Directors meeting, your senior leadership tasked you with finding a security analytics solution. Over the last month, you’ve worked with leadership to develop some basic use cases to determine which solution meets your security and budget needs.

read more
Third party patch management: Why it’s so crucial in modern businesses

Third party patch management: Why it’s so crucial in modern businesses

Third party applications have become the backbone of companies across the world. Adobe, Cisco, Slack and Zoom are common third party applications that have enhanced productivity and innovation. However, these third party applications can complicate a company’s patch management landscape, expose your organization to risks, expand attack surfaces and leave network security vulnerable.

read more
Beyond Factory Reset: Elevate Your Data Security with Securaze Solutions

Beyond Factory Reset: Elevate Your Data Security with Securaze Solutions

In today’s rapidly evolving technological landscape, the lifespan of our electronic devices is becoming increasingly shorter. Upgrades are the norm, leading to a surplus of discarded devices. However, simply performing a factory reset before selling or repurposing your device might not be enough to ensure your sensitive data is fully protected. The recent cautionary tale from Canon serves as a stark reminder of the potential risks.

read more
Sending logs to Splunk using syslog-ng

Sending logs to Splunk using syslog-ng

There are many ways you can collect log messages using syslog-ng and forward them to Splunk. In this blog I collect the history of Splunk support in syslog-ng, and the advantages and disadvantages of various solutions, both open source and commercial.

read more
Cybersecurity Trends to Look Out for in 2024

Cybersecurity Trends to Look Out for in 2024

The importance of cybersecurity has been on the rise for a while now. In 2024, cybersecurity will make its way into boardrooms, enter the AI battlefield, or change how businesses juggle their trade secrets and sensitive communications. 

read more
API protection: How to create a fortress around your data

API protection: How to create a fortress around your data

If data is the new oil, APIs are the pipelines through which it flows. If they aren’t secure, the resulting spill can be devastating to a business. In fact, it’s estimated that API insecurity results in a loss of $41 billion-$75 billion annually. 

read more
WHY NETWORK LOAD BALANCER MONITORING IS CRITICAL

WHY NETWORK LOAD BALANCER MONITORING IS CRITICAL

Your networks are the highways that enable data transfers and cloud-based collaboration. Like highways connect people to physical locations, networks connect people to applications and databases. As you would look up the fastest route between two physical locations, your workforce members need the fastest connectivity between two digital locations. Network load balancers enable you to prevent and identify digital “traffic jams” by redistributing incoming network requests across your servers.

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877