Sitemap

Site Feeds

Pages

Categories

Monthly Archives

Tags

All Articles

  1. Vietnam Security Summit 2019
    19-Apr-19 • Comments Off on Vietnam Security Summit 2019
  2. DTASIA’s CHRISTMAS GATHERING 2018!
    4-Jan-19 • Comments Off on DTASIA’s CHRISTMAS GATHERING 2018!
  3. Cyber Security and Vietnam Retail Banking 2018
    28-Nov-18 • Comments Off on Cyber Security and Vietnam Retail Banking 2018
  4. Microsoft Accounts announced support for YubiKey and secure passwordless login
    21-Nov-18 • Comments Off on Microsoft Accounts announced support for YubiKey and secure passwordless login
  5. Solid State Drive Disintegrator
    26-Oct-18 • Comments Off on Solid State Drive Disintegrator
  6. HDD Destroyer
    26-Oct-18 • Comments Off on HDD Destroyer
  7. Cloud Expo Asia, CEA 2018
    1-Oct-18 • Comments Off on Cloud Expo Asia, CEA 2018
  8. SSH.COM’s PrivX cloud access management
    18-Sep-18 • Comments Off on SSH.COM’s PrivX cloud access management
  9. SECURITY AWARENESS TRAINING
    17-Sep-18 • Comments Off on SECURITY AWARENESS TRAINING
  10. FPT 30th Anniversary
    14-Sep-18 • Comments Off on FPT 30th Anniversary
  11. GovWare 2018
    12-Sep-18 • Comments Off on GovWare 2018
  12. VIETNAM BANKING CONFERENCE 2018
    28-Jun-18 • Comments Off on VIETNAM BANKING CONFERENCE 2018
  13. Terms and conditions
    12-Jun-18 • Comments Off on Terms and conditions
  14. Privacy policy
    12-Jun-18 • Comments Off on Privacy policy
  15. Cloud Expo Asia, May 2018, HKCEC, Hong Kong
    10-Apr-18 • Comments Off on Cloud Expo Asia, May 2018, HKCEC, Hong Kong
  16. Japan IT Week Spring 2018
    10-Apr-18 • Comments Off on Japan IT Week Spring 2018
  17. CYBER SECURITY AND DATA PROTECTION IN THE CONNECTED WORLD, Security World 2018
    25-Mar-18 • Comments Off on CYBER SECURITY AND DATA PROTECTION IN THE CONNECTED WORLD, Security World 2018
  18. Proton T-1 High Security Degausser
    7-Nov-17 • Comments Off on Proton T-1 High Security Degausser
  19. Cloud Expo 11-12th Oct 2017
    6-Oct-17 • Comments Off on Cloud Expo 11-12th Oct 2017
  20. GOVERNMENTWARE 2017
    18-Sep-17 • Comments Off on GOVERNMENTWARE 2017
  21. IT Security Executive (Post-sales)
    29-Aug-17 • Comments Off on IT Security Executive (Post-sales)
  22. IT Security Executive (Pre-sales)
    29-Aug-17 • Comments Off on IT Security Executive (Pre-sales)
  23. Interpol World 2017
    8-Jul-17 • Comments Off on Interpol World 2017
  24. 26th Japan IT Week Spring 2017
    8-May-17 • Comments Off on 26th Japan IT Week Spring 2017
  25. 2017 Security 100: 25 Coolest Network Security Vendors
    10-Mar-17 • Comments Off on 2017 Security 100: 25 Coolest Network Security Vendors
  26. Beware the skeletons in your reformatted hard drive
    27-Feb-17 • Comments Off on Beware the skeletons in your reformatted hard drive
  27. RSA Conference 2017 – San Francisco
    8-Feb-17 • Comments Off on RSA Conference 2017 – San Francisco
  28. MAXXeGUARD Shredder
    6-Oct-16 • Comments Off on MAXXeGUARD Shredder
  29. SCIW – BUILDING A SECURE AND RESILIENT DIGITAL FUTURE THROUGH PARTNERSHIP
    3-Oct-16 • Comments Off on SCIW – BUILDING A SECURE AND RESILIENT DIGITAL FUTURE THROUGH PARTNERSHIP
  30. Advancing Security Leaders 25-26 July, Bangkok, Thailand
    25-Jul-16 • Comments Off on Advancing Security Leaders 25-26 July, Bangkok, Thailand
  31. Proton 1100 HDD Degausser Wand
    19-Jul-16 • Comments Off on Proton 1100 HDD Degausser Wand
  32. PDS 88 Solid State Shredder
    19-Jul-16 • Comments Off on PDS 88 Solid State Shredder
  33. T-1.5 DEGAUSSER
    19-Jul-16 • Comments Off on T-1.5 DEGAUSSER
  34. Cambodia Banking Micro-finance Conference & Awards
    5-Jul-16 • Comments Off on Cambodia Banking Micro-finance Conference & Awards
  35. Balabit Shell Control Box extends its coverage
    29-May-16 • Comments Off on Balabit Shell Control Box extends its coverage
  36. Fidelis XPS
    16-May-16 • Comments Off on Fidelis XPS
  37. Vietnam Digital Government 2016 Conference
    29-Mar-16 • Comments Off on Vietnam Digital Government 2016 Conference
  38. What is syslog and Syslog Store Box?
    27-Jan-16 • Comments Off on What is syslog and Syslog Store Box?
  39. Linoma’s Goanywhere MFT
    27-Jan-16 • Comments Off on Linoma’s Goanywhere MFT
  40. PDS-75 Hard Drive Crusher
    6-Jan-16 • Comments Off on PDS-75 Hard Drive Crusher
  41. PDS-100 Hard Drive Crusher
    6-Jan-16 • Comments Off on PDS-100 Hard Drive Crusher
  42. Privileged User Monitoring
    7-Dec-15 • Comments Off on Privileged User Monitoring
  43. What Financial Institutions Need to Know About Secure Shell
    18-Nov-15 • Comments Off on What Financial Institutions Need to Know About Secure Shell
  44. Preventing Data Loss Through Privileged Access Channels
    18-Nov-15 • Comments Off on Preventing Data Loss Through Privileged Access Channels
  45. Managed file transfer
    24-Sep-15 • Comments Off on Managed file transfer
  46. Tectia SSH Client and Server
    23-Sep-15 • Comments Off on Tectia SSH Client and Server
  47. GoAnywhere MFT
    23-Sep-15 • Comments Off on GoAnywhere MFT
  48. What is managed file transfer, why MFT, all about MFT
    22-Sep-15 • Comments Off on What is managed file transfer, why MFT, all about MFT
  49. RSA Conference 2015 – Asia Pacific & Japan
    15-Jul-15 • Comments Off on RSA Conference 2015 – Asia Pacific & Japan
  50. Prevent persistant threats and Fidelis solution for Finance
    16-Apr-15 • Comments Off on Prevent persistant threats and Fidelis solution for Finance
  51. INTERPOL World Event
    8-Apr-15 • Comments Off on INTERPOL World Event
  52. Transforming Retail Banking Into A Futuristic Banking Model
    1-Dec-14 • Comments Off on Transforming Retail Banking Into A Futuristic Banking Model
  53. 23rd GovernmentWare (GovWare) 2014
    9-Sep-14 • Comments Off on 23rd GovernmentWare (GovWare) 2014
  54. Privileged Activity Monitoring
    11-Jul-14 • Comments Off on Privileged Activity Monitoring
  55. RSA – 2014
    3-Jul-14 • Comments Off on RSA – 2014
  56. RSA Conference Asia Pacific & Japan
    3-Jul-14 • Comments Off on RSA Conference Asia Pacific & Japan
  57. DT MFS901M High Security
    28-Jun-14 • Comments Off on DT MFS901M High Security
  58. Secure Data Erasure, Destruction Degaussing Services
    16-Jun-14 • Comments Off on Secure Data Erasure, Destruction Degaussing Services
  59. Enterprise Fraud Management
    14-Jun-14 • Comments Off on Enterprise Fraud Management
  60. Banking Vietnam Event – May 20th, 2014
    14-Jun-14 • Comments Off on Banking Vietnam Event – May 20th, 2014
  61. NSA Data Wipe Software
    13-Jun-14 • Comments Off on NSA Data Wipe Software
  62. Hard Drive Crusher
    13-Jun-14 • Comments Off on Hard Drive Crusher
  63. Harddisk Shredder
    13-Jun-14 • Comments Off on Harddisk Shredder
  64. Proton T-4 NSA Approved Degausser
    13-Jun-14 • Comments Off on Proton T-4 NSA Approved Degausser
  65. Aegis Padlock Pro – eSATA USB 2.0
    13-Jun-14 • Comments Off on Aegis Padlock Pro – eSATA USB 2.0
  66. Apricorn Padlock – USB 2.0
    13-Jun-14 • Comments Off on Apricorn Padlock – USB 2.0
  67. Aegis Padlock DT – USB 3.0 Drive
    13-Jun-14 • Comments Off on Aegis Padlock DT – USB 3.0 Drive
  68. Aegis Padlock – USB 3.0
    13-Jun-14 • Comments Off on Aegis Padlock – USB 3.0
  69. Aegis Secure Key – USB 2.0 Drive
    13-Jun-14 • Comments Off on Aegis Secure Key – USB 2.0 Drive
  70. Banking Vietnam Post Event – May 20th, 2014
    13-Jun-14 • Comments Off on Banking Vietnam Post Event – May 20th, 2014
  71. Enterprise Syslog System
    12-Jun-14 • Comments Off on Enterprise Syslog System
  72. Privileged Access Monitoring
    11-Jun-14 • Comments Off on Privileged Access Monitoring
  73. Intrution Prevention Solutions
    9-Jun-14 • Comments Off on Intrution Prevention Solutions
  74. Network Access Control
    8-Jun-14 • Comments Off on Network Access Control
  75. Web Application Firewall
    7-Jun-14 • Comments Off on Web Application Firewall
  76. Secured Web Sessions
    5-Jun-14 • Comments Off on Secured Web Sessions
  77. SSH Key Management
    4-Jun-14 • Comments Off on SSH Key Management
  78. User Activity Monitoring
    2-Jun-14 • Comments Off on User Activity Monitoring
  79. Cyber Intelligence Asia 2014
    15-Mar-14 • Comments Off on Cyber Intelligence Asia 2014
  80. SSH Communications Security launches new product
    13-Jun-13 • Comments Off on SSH Communications Security launches new product
  81. Father of SSH working on new version of crypto standard
    13-Jun-13 • Comments Off on Father of SSH working on new version of crypto standard
  82. Save The Date Event: Coverging Threats and Reducing Risks across business units
    13-Jun-13 • Comments Off on Save The Date Event: Coverging Threats and Reducing Risks across business units
  83. Government Ware Event
    13-Jun-13 • Comments Off on Government Ware Event
  84. Secure Shell key mismanagement poses big risk to your data
    13-Jun-13 • Comments Off on Secure Shell key mismanagement poses big risk to your data
  85. Meeting the Revised MAS Technology Risk Management Guidelines
    13-Jun-13 • Comments Off on Meeting the Revised MAS Technology Risk Management Guidelines
  86. Nine Questions to Ask When Selecting a Security Vendor
    13-Jun-13 • Comments Off on Nine Questions to Ask When Selecting a Security Vendor
  87. Enterprise 2012
    13-Jun-12 • Comments Off on Enterprise 2012
  88. Technology Risk Management Guidelines by Monetary Authority of Singapore
    13-Jun-12 • Comments Off on Technology Risk Management Guidelines by Monetary Authority of Singapore
  89. SSH key mismanagement potentially worse in Asia, says founder
    13-Jun-12 • Comments Off on SSH key mismanagement potentially worse in Asia, says founder
  90. Observe IT
    17-Jun-11 • Comments Off on Observe IT
  91. ObserveIT Overview – How to Audit SSH, RDP and Citrix Sessions
    17-Jun-11 • Comments Off on ObserveIT Overview – How to Audit SSH, RDP and Citrix Sessions
  92. What is Syslog-ng
    17-Jun-11 • Comments Off on What is Syslog-ng
  93. Portnox introduction
    17-Jun-11 • Comments Off on Portnox introduction
  94. Syslog-ng Store Box – Trusted Log Server Appliance
    17-Jun-11 • Comments Off on Syslog-ng Store Box – Trusted Log Server Appliance
  95. Digital Photocopiers Loaded With Secrets
    17-Jun-11 • Comments Off on Digital Photocopiers Loaded With Secrets
  96. Best in class Solution Provider
    17-Jun-11 • Comments Off on Best in class Solution Provider
  97. Technology Partners
    17-Jun-11 • Comments Off on Technology Partners
  98. Key System Integrators, Resellers
    17-Jun-11 • Comments Off on Key System Integrators, Resellers
  99. Key Customer Segments
    16-Jun-11 • Comments Off on Key Customer Segments