Idaptive reduces complexity, increases security fo...
By CyberArk | Dec 14, 2020 | Case Study, Sponsored | 0
Are we ready for the next big breach?
By Cisco | Oct 6, 2020 | Case Study, Sponsored | 0
Email Security Threat Report 2020
By Darktrace | Jul 23, 2020 | Case Study, Sponsored | 0
The ‘Goldilocks’ security operations architecture
By Proficio | Apr 5, 2021 | Case Study, Sponsored
Finding the right balance between managed services and internal resources for cybersecurity and control.
Read MoreIdaptive reduces complexity, increases security for NZ agricultural organization
By CyberArk | Dec 14, 2020 | Case Study, Sponsored
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase security and keep users engaged on key apps. New Zealand Avocado Growers Association (NZ Avocado)...
Read MoreAre we ready for the next big breach?
By Cisco | Oct 6, 2020 | Case Study, Sponsored
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats fast, and automate their network and security operations.
Read MoreEmail Security Threat Report 2020
By Darktrace | Jul 23, 2020 | Case Study, Sponsored
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information is shared, plans are hatched, and alliances formed. Yet, human-driven as it is, email often...
Read MoreLeading Malaysian developer zeroes in on threats with LogRhythm
By LogRhythm | Jul 22, 2020 | Case Study, Sponsored
Full visibility and intelligent detection eliminate cybersecurity blind spots and reduce response time for UDA. As a company that is responsible for many governmental, commercial, and residential property development projects...
Read MoreUWCSEA deploys Enterprise Immune System to protect campus network
By Darktrace | Jun 2, 2020 | Case Study
Defending a complex network environment with over 7,000 mobile and BYOD devices requires AI capabilities for real-time visibility. The United World College of South East Asia (UWCSEA) has two campuses...
Read MoreHong Kong firm VXRL reduces phishing threats with Green Radar
By Green Radar | May 19, 2020 | Case Study
Case Study: Hong Kong firm VXRL reduces phishing threats with Green Radar The cybersecurity service provider for SMBs in Hong Kong is often the...
Read MoreLogRhythm Named a Leader in 2020 Gartner SIEM Magic Quadrant
By LogRhythm | Apr 20, 2020 | Case Study, Sponsored
In the 2020 Magic Quadrant for Security Information and Event Management (SIEM), Gartner evaluated LogRhythm and 15 other vendors for completeness of vision and ability to execute. For the eighth...
Read MoreAn immune system for cloud security
By Darktrace | Apr 8, 2020 | Case Study, Cloud Security
As organizations increase their digital capabilities across hybrid, multi-cloud and IoT environments, they’re faced with more areas to protect and control.
Read MoreAn immune system for email
By Darktrace | Apr 8, 2020 | Case Study
More than ever, modern email security requires innovation and a shift in mindset to combat the evolving threat landscape. Traditional email defenses may be adequate for simple and indiscriminate threats,...
Read MoreBiometrics brings convenience, efficiency and fraud protection to Singapore’s driving license program
By HID Global | Feb 19, 2020 | Case Study
The HID Lumidigm biometric sensor’s patented multispectral imaging technology has helped improve identity-verification speed and efficiency as compared to their previous paper-based process, and its proven liveness-detection capabilities significantly diminish...
Read MoreIdentifying security vulnerabilities without impacting workflow
By Synopsys | Jan 14, 2020 | Case Study, Software Development Lifecycle Security
In this case study done by Synopsys with El Al Israel Airlines, we show how the airline incorporated an application security testing solution that...
Read MoreSuccessful BEC leveraging lookalike domains
By Matan Ben David, Incident Response Analyst, Check Point Software Technologies | Dec 11, 2019 | Case Study
Losing a million dollars to fraudsters via business email compromise (BEC) is no joke. Here’s what happened… Imagine that you’re the owner of a...
Read MoreICTSI deploys BlackBerry Cylance technology across global port network
By International Container Terminal Services, Inc. | Nov 20, 2019 | Case Study, News
Asia-based global transport organization takes a unified, preventive approach to cybersecurity, using AI to protect thousands of connected and...
Read MoreInternational SOS enhances security intelligence with analytics and AI
By CybersecAsia editors | Oct 16, 2019 | Case Study, Cyber Intelligence
Global workforce protected with Geospark Analytics’ Hyperion AI strengthening its analysis of emerging issues and trends. Driving innovation in...
Read MoreCyberSecurity Malaysia protects sensitive data with BlackBerry software
By CybersecAsia editors | Sep 25, 2019 | Case Study, Governance & Compliance, News
BlackBerry helps CyberSecurity Malaysia in accelerating digital transformation while keeping critical data safe, secure and compliant. BlackBerry...
Read MoreGlobal distributor assures network uptime with SD-WAN
By CybersecAsia editors | Sep 10, 2019 | Case Study
CASE STUDY: Global distributor assures network uptime with SD-WAN Westcon-Comstor gains up to tenfold increase in available bandwidth, and boosts...
Read MorePulse Secure brings convenience, security to 7-Eleven’s in-store network
By CybersecAsia editors | Aug 29, 2019 | Case Study, Network & Infrastructure Security, Network Security
To ensure both convenience to customers and security for its business, 7-Eleven looked to Pulse Secure for a secure and reliable network.
Read MoreDomino’s Pizza strengthens its endpoint security posture
By CybersecAsia editors | Aug 29, 2019 | Case Study, Mobile Security, Risk Management
Domino’s Pizza Japan is using technology to help deliver high-quality service also means realizing the importance of endpoint protection. It looked to Carbon Black to provide the best possible cloud-based...
Read MoreVirtual app delivery controller helps Atlassian deliver innovative SaaS collaboration solutions
By CybersecAsia editors | Aug 29, 2019 | Case Study, Cloud Security
Pulse Secure Virtual Application Delivery Controller helps Atlassian deliver innovative SaaS solutions to streamline collaboration.
Read More
Whitepapers
Preventing ransomware attacks from disrupting your business
Ransomware has been on the rise and growing more sophisticated. Old protection methods can’t deal …Download WhitepaperBuilding the foundation for digital trust
Securing the next generation of digital transformation with HSMs.Download WhitepaperThe 5 essential capabilities of an analytics-driven SOC
Security operations centers (SOCs) have evolved to address the volume and sophistication of cyber-attacks. Does …Download Whitepaper2020 Remote work-from-home cybersecurity report
How secure access solutions kept businesses running – and people and devices connected to the …Download Whitepaper
More News
Case Studies
The ‘Goldilocks’ security operations architecture
Finding the right balance between managed services and internal resources for cybersecurity and control.Read moreIdaptive reduces complexity, increases security for NZ agricultural organization
Challenge: find a single sign-on solution to reduce complexity, minimize calls for password assistance, increase …Read moreAre we ready for the next big breach?
How organizations across various industries prevent breaches, get deep visibility to detect and stop threats …Read moreEmail Security Threat Report 2020
Email and collaboration platforms are the connective tissue of most businesses and organizations, where information …Read more