|By ACN Newswire||
|January 17, 2013 09:46 AM EST||
Hong Kong, Jan 17, 2013 - (ACN Newswire) - CITIC Telecom International CPC Limited (CITIC Telecom CPC), a wholly-owned subsidiary of CITIC Telecom International Holdings Limited (SEHK: 1883), today announced it will form a strategic partnership with next-generation firewall technology provider Palo Alto Networks. CITIC Telecom CPC is proud to be the FIRST managed security service partner of Palo Alto Networks in North Asia, furthering the company's fully-fledged managed security services for enterprises around the clock.
The partnership also sees the launch of TrustCSI Managed Firewall Services (MFS), which will offer enterprises a complete suite of 24x7 real-time and full-service managed firewall services based on Palo Alto Networks' next-generation firewall technology and CITIC Telecom CPC's TrustCSI managed security services.
The challenges with BYOD and complexity of security threats
The partnership and launch of TrustCSI MFS is a timely response to enterprise security requirements, including dealing with mobile devices, instigated by the Bring Your Own Device ("BYOD") trend, and the increasing complexity of security threats.
As cloud computing evolves, enterprises are becoming increasingly exposed to security threats such as malware, spyware, viruses, Trojans, etc. In addition, enterprises have to manage the high-level security risks and complex security threats brought by unmanaged devices or various connectivity to company network anytime, anywhere.
"Enterprises are quickly learning that traditional firewalls are not enough to protect their networks of device management issues from BYOD and other complex security threats, especially as some firewalls have shortcoming in their features or performance," said Daniel Kwong, Senior Vice President, Information Technology & Security Services, CITIC Telecom CPC.
Market leader with users and applications identification capabilities
Palo Alto Networks was positioned in the Leaders Quadrant of the Gartner Magic Quadrant for Enterprise Network Firewalls in 2011. According to Gartner, a next-generation firewall capability is becoming an important element as enterprises move away from having dedicated IPS appliances at their perimeter and remote locations. Palo Alto Networks, as a leader in the quadrant, leads the market in offering new safeguarding features, providing expert capability, and having a good track record of avoiding vulnerabilities in security products. It also handles the highest throughput with minimal performance loss and options for hardware acceleration.
Backed by Palo Alto Networks' patented App-ID technology, TrustCSI(TM) MFS enable policy-based visibility and control over applications, users, and content. With this technology, enterprises can accurately identify users and applications, as well as control applications, scan content to stop known and unknown threats, and prevent data leakage - all with a single network device. Companies can now truly enjoy one-stop security devices to achieve comprehensive protection.
With TrustCSI(TM) MFS, enterprises can also enjoy the managed security services delivered via CITIC Telecom CPC's world-class Security Operation Centers (SOCs). The SOCs are equipped with advanced correlation and classification Security Information and Event Management ("SIEM") engine, and are ISO 27001, ISO 20000 and ISO 9001 certified. TrustCSI(TM) MFS alleviate overheads associated with direct administration of equipment and staff allowing enterprises of any size and in any sector to enjoy a best-of-breed solution in a managed environment. This can lower total cost of ownership (TCO) and maximize return on investment (ROI). Enterprises can then focus on critical tasks and its core businesses.
"The general consensus is that consumerization and BYOD are creating a device proliferation problem that needs to be controlled. However, the real issue is controlling unmanaged devices, which is a network control problem. Enterprises are unable to control what users do with their own devices and are unable to manage what should be allowed onto devices. This creates key challenges to enterprises. Our technologies can detect and prevent any violation or attack on the latest applications running on the IT environment and provide both performance and features that other firewalls can't," said Sharat Sinha, VP APAC of Palo Alto Networks.
"Combined with CITIC Telecom CPC's knowledge of the region, reliable and secure network technologies, as well as the expertise of its security professionals, enterprises now have a comprehensive answer provided by TrustCSI(TM) Managed Firewall Services," said Sharat Sinha, VP APAC of Palo Alto Networks.
Uniqueness of TrustCSI(TM) MFS
The launch of TrustCSI(TM) MFS enables enterprise IT departments to have access to the full spectrum of security monitoring and management services with next-generation firewall technology, including:
-- Next Generation Firewall - Provide policy-based visibility and control over applications, users and contents, compatible to run in a virtualized environment.
-- Enterprise Directory Integration - Identify users regardless of IP addresses.
-- Real-Time Content Scanning - Detect and block a wide range of threats, limit unauthorized data transfers and control non-work Web surfing.
-- Multi-gigabit, In-line Deployment - Real-time protection that eliminates performance degradation compared to other security solutions.
-- Managed by SOCs - Year-round Security Incident Management and Monitoring via Security Operation Centers; multilingual customer support by dedicated professional team.
-- Instant Incident Notification - Real-time alerts by email and phone to ensure customers are always updated on security events.
-- In-depth Reporting - Comprehensive usage and security reports assist in response decisions and future planning.
"We will strive to continue to optimize the TrustCSI(TM) portfolio and provide enterprises with the security solutions that address their varying requirements. We believe that the new partnership and offerings will support customers with business ambitions in the Asia Pacific region," said Daniel Kwong.
In addition to TrustCSI(TM) MFS, the TrustCSI(TM) portfolio also includes TrustCSI(TM) Information Assessment Service that manages network vulnerability, TrustCSI(TM) Security-AcuView that provides accurate views of security status, as well as TrustCSI(TM) Unified Threat Management that provides first line network security to defense attacks from multiple sources.
Nonetheless, the increasing Cloud trend has brought security challenges to enterprises. With CITIC Telecom CPC's managed security expertise, its SmartCLOUD customers can benefit from secure Public, Private and Hybrid Cloud solutions as SmartCLOUD is well-equipped with Unified Threat Management features. This means that enterprises can now enjoy the benefits of Cloud, while being hassle-free from the security threats.
Driving service excellence in 2013
"Striving for Service Excellence" is always CITIC Telecom CPC's top priority. Looking into 2013, CITIC Telecom CPC has developed "CPC's App" - a FREE mobile app that showcases the subscribed services on-the-go. What's more, CITIC Telecom CPC will make full use of various digital channels, including a new website, to provide easier access and more information to customers. All of these moves are in place to better support those customers expanding their businesses in the region.
About CITIC Telecom CPC
CITIC Telecom International CPC Limited ("CITIC Telecom CPC"), a wholly owned subsidiary of CITIC Telecom International Holdings Limited (SEHK: 1883), is a trusted Information and Communication Technology (ICT) solutions provider with multiple branches across Asia Pacific, and a preferred partner by multinational corporations and business enterprises.
CITIC Telecom CPC delivers a range of innovative services, including: TrueCONNECT(TM) - an advanced MLPS VPN service which employs state-of-the-art fully meshed network, TrustCSI(TM) - an integrated suite of information security solutions, and SmartCLOUD - smarter, better and high performance cloud computing solutions which complement the company's managed network and managed security solutions.
As further testament to its commitment in providing premium quality services in the Asia Pacific region, the company became the first VPN service provider in Hong Kong to achieve all three ICT related certifications in ISO 9001 - Quality Management System, ISO 27001 - Information Security Management System and ISO 20000 - Information Technology Service Management System. Learn more at www.citictel-cpc.com.
About Palo Alto Networks
Palo Alto Networks(TM) is the network security company. Its innovative platform allows enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of Palo Alto Networks platform is its Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture. Palo Alto Networks products and services can address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. Palo Alto Networks products are used by more than 10,000 customers in over 100 countries. For more information, visit www.paloaltonetworks.com.
Palo Alto Networks, "The Network Security Company," the Palo Alto Networks Logo, App-ID, GlobalProtect, and WildFire are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.
CITIC Telecom International CPC
Tel: +852 2170 7536
Email: rowena.leung@ citictel-cpc.com
Source: CITIC Telecom CPC
Rowena Leung CITIC Telecom International CPC Tel: +852 2170 7536 Email: rowena.leung@ citictel-cpc.com
Copyright 2013 ACN Newswire. All rights reserved.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
Jul. 26, 2016 02:00 AM EDT Reads: 1,297
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
Jul. 26, 2016 01:45 AM EDT Reads: 1,296
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
Jul. 26, 2016 01:30 AM EDT Reads: 986
The 19th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Digital Transformation, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportuni...
Jul. 26, 2016 01:15 AM EDT Reads: 2,518
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...
Jul. 26, 2016 12:45 AM EDT Reads: 629
“delaPlex Software provides software outsourcing services. We have a hybrid model where we have onshore developers and project managers that we can place anywhere in the U.S. or in Europe,” explained Manish Sachdeva, CEO at delaPlex Software, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 26, 2016 12:00 AM EDT Reads: 1,540
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
Jul. 25, 2016 11:15 PM EDT Reads: 2,014
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 25, 2016 11:15 PM EDT Reads: 1,310
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Jul. 25, 2016 10:00 PM EDT Reads: 2,507
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Jul. 25, 2016 08:30 PM EDT Reads: 1,941
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Jul. 25, 2016 08:00 PM EDT Reads: 1,981
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
Jul. 25, 2016 07:30 PM EDT Reads: 1,894
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 25, 2016 07:15 PM EDT Reads: 1,800
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
Jul. 25, 2016 07:15 PM EDT Reads: 1,025
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Jul. 25, 2016 06:30 PM EDT Reads: 1,003
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Jul. 25, 2016 06:15 PM EDT Reads: 1,763
Unless your company can spend a lot of money on new technology, re-engineering your environment and hiring a comprehensive cybersecurity team, you will most likely move to the cloud or seek external service partnerships. In his session at 18th Cloud Expo, Darren Guccione, CEO of Keeper Security, revealed what you need to know when it comes to encryption in the cloud.
Jul. 25, 2016 06:00 PM EDT Reads: 2,445
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Jul. 25, 2016 06:00 PM EDT Reads: 2,079
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Jul. 25, 2016 03:45 PM EDT Reads: 971
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Jul. 25, 2016 03:30 PM EDT Reads: 1,703