This post is also available in: Vietnamese

News & Events

NEXT-LEVEL THREAT HUNTING: SHIFT YOUR SIEM FROM REACTIVE TO PROACTIVE

NEXT-LEVEL THREAT HUNTING: SHIFT YOUR SIEM FROM REACTIVE TO PROACTIVE

Threat hunting is proactively identifying and thwarting unusual network activity that could indicate an attempted security breach. It’s a historically manual activity, making it time-intensive and arduous. It’s no wonder, then, why most organizations don’t have the time, budget, or resources to undertake it effectively…if at all. That’s why many organizations rely on “reactive” threat response solutions, including firewalls, intrusion detection, and SIEM to alert analysts to an event after it occurs. Without the resources to commit to proactive threat hunting, reactive solutions are the next best option.

read more
7 tenant-to-tenant migration planning tips

7 tenant-to-tenant migration planning tips

Tenant-to-tenant migrations are increasingly common. Some are necessitated by business changes like mergers, acquisitions, and divestitures, while others are driven by the desire to clean up or consolidate the IT infrastructure to facilitate business processes and reduce administrative overhead.

read more
Getting data to Splunk

Getting data to Splunk

Getting data to Splunk can be challenging. Syslog is still the most important data source, and it can provide you with hard-to-solve problems (for example, like high volume, non-compliant messages, unreliable network protocol (UDP), and more). The syslog-ng Premium Edition (PE) and syslog-ng Store Box (SSB) by One Identity can make these challenges manageable.

read more
How MFT Helps Move Large Files

How MFT Helps Move Large Files

What is Needed to Move Large Files?

Big files need big solutions, or rather solutions capable of reliably and securely moving files in and out of an organization. Instead of relying on free or open-sourced solutions that “might” move a big file, consider your organization’s needs around file sizes, security, encryption, compliance requirements for auditing and reporting file transfer activity, reliability, and automation. Yes, file size does matter, but it’s just one piece of the data movement puzzle for most organizations.

read more
SSH Communications Security Launches Secure Collaboration 2024 for Secure Human-to-Human Interaction

SSH Communications Security Launches Secure Collaboration 2024 for Secure Human-to-Human Interaction

Helsinki, Finland – September 7, 2023 – SSH Communications Security extends SSH Zero Trust Suite to a modern, real-time, secure, and audited (who did what when?) human-to-human communications platform. It consists of multiple modules helping people to share private and sensitive data in semi-interactive (email) mode and in real-time (calls, video calls, and instant messaging) and on-demand (sharing data) inside and across organizational and country borders.  

read more
Protecting Sensitive Information at the End of the IT Asset Lifecycle

Protecting Sensitive Information at the End of the IT Asset Lifecycle

Data is one of the most valuable assets that an organization owns. In today’s world, data increasing value comes the need for greater responsibility for data privacy and security. Data breaches, legal and financial penalties, and reputational damage are disastrous consequences for improper handling of sensitive data. Meanwhile government agencies and industry segments are stipulating the proper handling of data such as Singapore PDPA (Personal Data Protection Act 2012) and Banking Act.

read more
14 Best Practices For Firewall Network Security

14 Best Practices For Firewall Network Security

Back in the early days of corporate networking, IT departments typically deployed firewalls to keep employees from accessing non-work related content, like social media sites. While content filtering remains part of a firewall’s job, it’s no longer the primary reason for using one. In today’s connected world, firewalls are fundamental to network security. Further, today’s firewall solutions have evolved to respond to companies’ changing needs, enabling organizations to micro-segment networks and protect web-applications.

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877