This post is also available in: Vietnamese

Delivering innovative cybersecurity
technology and solutions
across Asia Pacific since 2007.

From hardware appliances to software solutions
and training, DT Asia understands cybersecurity
challenges and can deliver solutions that help
organisations detect & identify, protect & secure,
authenticate & authorise, and degauss & destroy.

 

Our Solutions

We provide solutions covering key areas of the Cybersecurity Landscape

Our Services

Solution Design & Architecture

Preventive Maintenance

Technology Deployment

Hardware Spares

24/7 Support

Online & On-site Support

Our Vendors

Our solutions are sourced from the US, Europe and Asia.
Each solution is ingested and packaged for our customers, which include
top government organisations as well as global corporations.

News & Events

Automation in Identity and Access Management and what it means for businesses

Automation in Identity and Access Management and what it means for businesses

As organizations are looking to streamline processes and enhance security, pursuing automation in identity and access management is a key area businesses can target. By pursuing automation in identity and access management, IT teams can free up time to work on more important tasks, and reduce the friction required in managing team member and vendor access across necessary accounts, data and applications.

read more
Need to move to a new Office 365 tenant? Let Quest On Demand Migration do the heavy lifting!

Need to move to a new Office 365 tenant? Let Quest On Demand Migration do the heavy lifting!

Today we live in a fast-moving world. Mergers and acquisitions are occurring at a record pace. Impacts of the recent pandemic are only likely to increase this trend. Over the past several years many companies have made the move to Office 365 for their email and collaboration needs. Office 365 is a great solution to streamline collaboration and support work from home initiatives, but what happens when it’s time to move? How will Bill from Research & Development be able to look back at previous collaborative ideas in Teams?

read more
Why traditional sanitization methods as specified in DoD 5220.22-M are not sufficient for SSD erasure and can leave recoverable data behind?

Why traditional sanitization methods as specified in DoD 5220.22-M are not sufficient for SSD erasure and can leave recoverable data behind?

The DoD specification was set long ago, when rotating magnetic media hard drives ruled the IT world. To erase these drives, overwriting all data with zeros or random patterns – whatever the standard offered – was enough. But the world changed and entered the age of digitalization, and with it came new hard drives like SSDs (solid state drives).

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877