|By ACN Newswire||
|January 17, 2013 09:46 AM EST||
Hong Kong, Jan 17, 2013 - (ACN Newswire) - CITIC Telecom International CPC Limited (CITIC Telecom CPC), a wholly-owned subsidiary of CITIC Telecom International Holdings Limited (SEHK: 1883), today announced it will form a strategic partnership with next-generation firewall technology provider Palo Alto Networks. CITIC Telecom CPC is proud to be the FIRST managed security service partner of Palo Alto Networks in North Asia, furthering the company's fully-fledged managed security services for enterprises around the clock.
The partnership also sees the launch of TrustCSI Managed Firewall Services (MFS), which will offer enterprises a complete suite of 24x7 real-time and full-service managed firewall services based on Palo Alto Networks' next-generation firewall technology and CITIC Telecom CPC's TrustCSI managed security services.
The challenges with BYOD and complexity of security threats
The partnership and launch of TrustCSI MFS is a timely response to enterprise security requirements, including dealing with mobile devices, instigated by the Bring Your Own Device ("BYOD") trend, and the increasing complexity of security threats.
As cloud computing evolves, enterprises are becoming increasingly exposed to security threats such as malware, spyware, viruses, Trojans, etc. In addition, enterprises have to manage the high-level security risks and complex security threats brought by unmanaged devices or various connectivity to company network anytime, anywhere.
"Enterprises are quickly learning that traditional firewalls are not enough to protect their networks of device management issues from BYOD and other complex security threats, especially as some firewalls have shortcoming in their features or performance," said Daniel Kwong, Senior Vice President, Information Technology & Security Services, CITIC Telecom CPC.
Market leader with users and applications identification capabilities
Palo Alto Networks was positioned in the Leaders Quadrant of the Gartner Magic Quadrant for Enterprise Network Firewalls in 2011. According to Gartner, a next-generation firewall capability is becoming an important element as enterprises move away from having dedicated IPS appliances at their perimeter and remote locations. Palo Alto Networks, as a leader in the quadrant, leads the market in offering new safeguarding features, providing expert capability, and having a good track record of avoiding vulnerabilities in security products. It also handles the highest throughput with minimal performance loss and options for hardware acceleration.
Backed by Palo Alto Networks' patented App-ID technology, TrustCSI(TM) MFS enable policy-based visibility and control over applications, users, and content. With this technology, enterprises can accurately identify users and applications, as well as control applications, scan content to stop known and unknown threats, and prevent data leakage - all with a single network device. Companies can now truly enjoy one-stop security devices to achieve comprehensive protection.
With TrustCSI(TM) MFS, enterprises can also enjoy the managed security services delivered via CITIC Telecom CPC's world-class Security Operation Centers (SOCs). The SOCs are equipped with advanced correlation and classification Security Information and Event Management ("SIEM") engine, and are ISO 27001, ISO 20000 and ISO 9001 certified. TrustCSI(TM) MFS alleviate overheads associated with direct administration of equipment and staff allowing enterprises of any size and in any sector to enjoy a best-of-breed solution in a managed environment. This can lower total cost of ownership (TCO) and maximize return on investment (ROI). Enterprises can then focus on critical tasks and its core businesses.
"The general consensus is that consumerization and BYOD are creating a device proliferation problem that needs to be controlled. However, the real issue is controlling unmanaged devices, which is a network control problem. Enterprises are unable to control what users do with their own devices and are unable to manage what should be allowed onto devices. This creates key challenges to enterprises. Our technologies can detect and prevent any violation or attack on the latest applications running on the IT environment and provide both performance and features that other firewalls can't," said Sharat Sinha, VP APAC of Palo Alto Networks.
"Combined with CITIC Telecom CPC's knowledge of the region, reliable and secure network technologies, as well as the expertise of its security professionals, enterprises now have a comprehensive answer provided by TrustCSI(TM) Managed Firewall Services," said Sharat Sinha, VP APAC of Palo Alto Networks.
Uniqueness of TrustCSI(TM) MFS
The launch of TrustCSI(TM) MFS enables enterprise IT departments to have access to the full spectrum of security monitoring and management services with next-generation firewall technology, including:
-- Next Generation Firewall - Provide policy-based visibility and control over applications, users and contents, compatible to run in a virtualized environment.
-- Enterprise Directory Integration - Identify users regardless of IP addresses.
-- Real-Time Content Scanning - Detect and block a wide range of threats, limit unauthorized data transfers and control non-work Web surfing.
-- Multi-gigabit, In-line Deployment - Real-time protection that eliminates performance degradation compared to other security solutions.
-- Managed by SOCs - Year-round Security Incident Management and Monitoring via Security Operation Centers; multilingual customer support by dedicated professional team.
-- Instant Incident Notification - Real-time alerts by email and phone to ensure customers are always updated on security events.
-- In-depth Reporting - Comprehensive usage and security reports assist in response decisions and future planning.
"We will strive to continue to optimize the TrustCSI(TM) portfolio and provide enterprises with the security solutions that address their varying requirements. We believe that the new partnership and offerings will support customers with business ambitions in the Asia Pacific region," said Daniel Kwong.
In addition to TrustCSI(TM) MFS, the TrustCSI(TM) portfolio also includes TrustCSI(TM) Information Assessment Service that manages network vulnerability, TrustCSI(TM) Security-AcuView that provides accurate views of security status, as well as TrustCSI(TM) Unified Threat Management that provides first line network security to defense attacks from multiple sources.
Nonetheless, the increasing Cloud trend has brought security challenges to enterprises. With CITIC Telecom CPC's managed security expertise, its SmartCLOUD customers can benefit from secure Public, Private and Hybrid Cloud solutions as SmartCLOUD is well-equipped with Unified Threat Management features. This means that enterprises can now enjoy the benefits of Cloud, while being hassle-free from the security threats.
Driving service excellence in 2013
"Striving for Service Excellence" is always CITIC Telecom CPC's top priority. Looking into 2013, CITIC Telecom CPC has developed "CPC's App" - a FREE mobile app that showcases the subscribed services on-the-go. What's more, CITIC Telecom CPC will make full use of various digital channels, including a new website, to provide easier access and more information to customers. All of these moves are in place to better support those customers expanding their businesses in the region.
About CITIC Telecom CPC
CITIC Telecom International CPC Limited ("CITIC Telecom CPC"), a wholly owned subsidiary of CITIC Telecom International Holdings Limited (SEHK: 1883), is a trusted Information and Communication Technology (ICT) solutions provider with multiple branches across Asia Pacific, and a preferred partner by multinational corporations and business enterprises.
CITIC Telecom CPC delivers a range of innovative services, including: TrueCONNECT(TM) - an advanced MLPS VPN service which employs state-of-the-art fully meshed network, TrustCSI(TM) - an integrated suite of information security solutions, and SmartCLOUD - smarter, better and high performance cloud computing solutions which complement the company's managed network and managed security solutions.
As further testament to its commitment in providing premium quality services in the Asia Pacific region, the company became the first VPN service provider in Hong Kong to achieve all three ICT related certifications in ISO 9001 - Quality Management System, ISO 27001 - Information Security Management System and ISO 20000 - Information Technology Service Management System. Learn more at www.citictel-cpc.com.
About Palo Alto Networks
Palo Alto Networks(TM) is the network security company. Its innovative platform allows enterprises, service providers, and government entities to secure their networks and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The core of Palo Alto Networks platform is its Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture. Palo Alto Networks products and services can address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. Palo Alto Networks products are used by more than 10,000 customers in over 100 countries. For more information, visit www.paloaltonetworks.com.
Palo Alto Networks, "The Network Security Company," the Palo Alto Networks Logo, App-ID, GlobalProtect, and WildFire are trademarks of Palo Alto Networks, Inc. in the United States. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.
CITIC Telecom International CPC
Tel: +852 2170 7536
Email: rowena.leung@ citictel-cpc.com
Source: CITIC Telecom CPC
Rowena Leung CITIC Telecom International CPC Tel: +852 2170 7536 Email: rowena.leung@ citictel-cpc.com
Copyright 2013 ACN Newswire. All rights reserved.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
Nov. 26, 2014 05:45 PM EST Reads: 854
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 26, 2014 05:45 PM EST Reads: 1,176
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...
Nov. 26, 2014 05:30 PM EST Reads: 1,252
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Nov. 26, 2014 05:30 PM EST Reads: 1,101
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
Nov. 26, 2014 05:00 PM EST Reads: 1,185
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
Nov. 26, 2014 04:45 PM EST Reads: 560
Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more utilizing technologies such as Microsoft Azure, Visual Studio online, and Application Insights in this demo-heavy session.
Nov. 26, 2014 04:45 PM EST Reads: 564
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...
Nov. 26, 2014 04:45 PM EST Reads: 576
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
Nov. 26, 2014 04:00 PM EST Reads: 1,388
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device exp...
Nov. 26, 2014 03:45 PM EST Reads: 1,366
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
Nov. 26, 2014 02:00 PM EST Reads: 1,815
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time - bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of E...
Nov. 25, 2014 11:30 PM EST Reads: 1,634
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
Nov. 25, 2014 09:30 PM EST Reads: 1,827
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...
Nov. 25, 2014 09:30 PM EST Reads: 1,880
"Verizon offers public cloud, virtual private cloud as well as private cloud on-premises - many different alternatives. Verizon's deep knowledge in applications and the fact that we are responsible for applications that make call outs to other systems. Those systems and those resources may not be in Verizon Cloud, we understand at the end of the day it's going to be federated," explained Anne Plese, Senior Consultant, Cloud Product Marketing at Verizon Enterprise, in this SYS-CON.tv interview at...
Nov. 25, 2014 09:00 PM EST Reads: 1,755
"For the past 4 years we have been working mainly to export. For the last 3 or 4 years the main market was Russia. In the past year we have been working to expand our footprint in Europe and the United States," explained Andris Gailitis, CEO of DEAC, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 25, 2014 08:15 PM EST Reads: 1,709
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
Nov. 25, 2014 07:00 PM EST Reads: 1,477
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. Acco...
Nov. 25, 2014 07:00 PM EST Reads: 1,775
"Cloud consumption is something we envision at Solgenia. That is trying to let the cloud spread to the user as a consumption, as utility computing. We want to allow the people to just pay for what they use, not a subscription model," explained Ermanno Bonifazi, CEO & Founder of Solgenia, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 25, 2014 06:15 PM EST Reads: 1,556
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps,...
Nov. 25, 2014 04:30 PM EST Reads: 1,713