We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept

What is Phishing? Attack Types & Anti-phishing Tools for Business

2022-07-29Data PrivacyInformation Security

Phishing has long been identified as an online scam that lures victims into giving out credentials via fraudulent emails, messages or websites.


Evolving Ransomware: A Multi-pronged Approach to Secure Your Business

2021-09-03 CloudInformation Security

Ransomware is becoming highly sophisticated, which a new model has taken shape merely to attack enterprises. Global enterprises will be at stake once ransomware loses its control as…


Build Competitive Advantage by Intelligently Unleashing Data Values

2021-08-13 AIBig DataInformation SecurityInnovation

Intensive enterprise digitalization suggests drastically increasing data volumes. With massive data available, how can enterprises make use of them? In the post-pandemic era, throu…


Reinforcing Infosecurity against persistent APTs Security Threats

2021-08-06 ConnectivityInformation SecurityNew NormalTransformation

Under digitalization era, information security become a challenging task, especially after Advanced Persistent Threats (APTs) hit the globe.


Equipped as a Digitally Resilient Enterprises for Post-pandemic Era

2021-07-30 ConnectivityInformation SecurityInnovationNew NormalTransformation

IDC’s COVID-19 Survey revealed that over 50% of organizations are going to increase their technology budgets for innovative technologies in 2021, enabling remote offices, secure co…


Digital Retail in 5G Era: Intelligent SD-WAN as the basis

2021-07-09 AIConnectivityInformation SecuritySD-WAN5G+

Digital transformation is not a “Nice to have”, is a matter of survival for companies. said Werner Vogels, CTO of Amazon.

Prioritizing Network Optimization in the Age of Artificial Intelligence

Prioritizing Network Optimization in the Age of Artificial Intelligence

2021-06-30 AIConnectivitySD-WAN

Facing the disruptions ahead, businesses are digitally transforming to adapt to the new market reality. Moving more and more business-critical applications and platforms online, the…

Secure Expanding SD-WAN Edge for Distributed Enterprises with SASE

Secure Expanding SD-WAN Edge for Distributed Enterprises with SASE

2021-06-28 Information SecuritySD-WAN

Companies are increasingly adopting SD-WAN to support hybrid workforces and distributed workloads. They also need an agile, robust, and holistic network security solution that scale…

5G+ Smart Industries - The Transportation and Logistics Accelerator

5G+ Smart Industries - The Transportation and Logistics Accelerator

2021-06-18 ConnectivityInnovation5G+

What 5G can offer the transportation and logistics industry is nothing less than revolutionary, and it will radically transform not only how items are moved from one place to anothe…


Enterprise Information Security: Reducing Ransomware Related Downtime with Disaster Recovery

2021-06-11 CloudInformation Security

The world’s largest meat and poultry processor has been targeted by a sophisticated ransomware attack and temporarily shut down some operations in the U.S., Canada and Australia, …


Enterprise Information Security: Infosecurity Management Resolves Security Crisis of Fintech

2021-06-03 Data PrivacyInformation Security

The Fintech revolution not only offers tremendous opportunities for the development of financial industry, but also poses unprecedented risks and challenges to financial institution…


5G - Smart Manufacturing Enabler

2021-05-28 ConnectivityTransformation5G+

For the manufacturing industry in particular, 5G will bring about a monumental paradigm shift so great, experts have described it as Industry 4.0.


Enterprises Information Security: Ransomware Attacks Surge, Threatening Global Enterprises

2021-05-21 Information Security

A global insurance giant was recently attacked by ransomware, Avaddon, and 3TB of sensitive data including customer identity, bank documents, medical and claim records were stolen, …

Products & Services
Private Network Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services Europe Solutions
Architecture, Engineering & Construction Automobile BFSI Logistics & Transportation Manufacturing Legal & Accounting Services Retail Healthcare
Technology & Services
Consulting Services Customer Services
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories Blog
About Us
Our Company Global Ecosystem Partners News Center Accreditation & Awards Careers
Contact Us

General Enquiry / Sales Hotline +852 2170 7401

Service Hotline +852 2331 8930

Contact Us

Follow Us

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.