We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
Esiletõstetud
Forging Robust AI Guardrail: Safeguarding the Intelligent Future of Enterprises

Forging Robust AI Guardrail: Safeguarding the Intelligent Future of Enterprises

2025-08-04Küberturvalisus

Our latest blog explores the enterprise data security and compliance risks associated with AI implementation, including sensitive data leaks, prompt injection attacks, and the gener…

Rohkem
Holistic Cloud Management & Security in Cloudiverse

Holistic Cloud Management & Security in Cloudiverse

2023-07-11 PilvÜhendusedKüberturvalisus

Digital transformation has revolutionized business operations with multi-cloud strategy, offering enhanced business agility and efficiency. However, concerns such as resource alloca…

Rohkem
Empowering Sustainable Business Development with Data Security and Compliance

Empowering Sustainable Business Development with Data Security and Compliance

2023-06-30 PilvÜhendusedMajutuskeskusKüberturvalisus

In an era defined by the rapid growth of digital transformation, data has become the new currency. For numerous entities that process and manage sensitive data, especially in heavil…

Rohkem
Looking into the Driving Force Behind Datong Insurance’s Digital Transformation

Looking into the Driving Force Behind Datong Insurance’s Digital Transformation

2023-01-17 ÜhendusedCustomer ExperienceMajutuskeskusKüberturvalisusDigitaalne transformatsioon

Homogeneous and inefficient offline operations and agency means are no longer applicable to the new market and changing supervision policies, as the insurance industry is undergoing…

Rohkem
Middle Platforms of Data and Business: Expediting Digital Transformation for Cabbeen

Middle Platforms of Data and Business: Expediting Digital Transformation for Cabbeen

2022-12-12 ÜhendusedCustomer ExperienceMajutuskeskusKüberturvalisusDigitaalne transformatsioon

The fashion industry is entering a highway to a reshuffling and reshaping environment with the rapid development of the digital economy, the question is, how can the industry adapt …

Rohkem
Sparkling Biz Matters: Get Ready for 2023

Sparkling Biz Matters: Get Ready for 2023

2022-12-05 PilvÜhendusedMajutuskeskusÖkosfäärKüberturvalisus

Over the past few years, the challenges ahead of us have been daunting and has put the global economy to the test. For 2023, business prospects are likely to be clouded by uncertain…

Rohkem

A Complete Endpoint Security Guidance for Enterprises

2022-09-30 ÜhendusedKüberturvalisus

As businesses continue to embrace a blended and flexible working model, the number of mobile devices such as smartphones and tablets connecting to enterprise assets surges tremendou…

Rohkem
What is ZTNA? Ultimate Guide to Zero Trust Network Access

What is ZTNA? Ultimate Guide to Zero Trust Network Access

2022-09-07 ÜhendusedKüberturvalisusSASE

We will introduce the most important ZTNA concepts and best practices to protect your business applications, data and services.

Rohkem

What is Phishing? Attack Types & Anti-phishing Tools for Business

2022-07-29 Küberturvalisus

Phishing has long been identified as an online scam that lures victims into giving out credentials via fraudulent emails, messages or websites.

Rohkem
CITIC Pacific Special Steel: Empowered by Integrated ICT Solution for Digitalization and Intelligentization

CITIC Pacific Special Steel: Empowered by Integrated ICT Solution for Digitalization and Intelligentization

2022-07-15 PilvÜhendusedCustomer ExperienceMajutuskeskusKüberturvalisusSD-WANDigitaalne transformatsioon

Having gone through multiple reviews in 2012, CITIC Pacific Special Steel opted to partner with China Entercom, to improve its focus on the core business with streamlined production…

Rohkem
Network Construction: Beyond “Eastern Data and Western Computing”

Network Construction: Beyond “Eastern Data and Western Computing”

2022-05-13 PilvÜhendusedMajutuskeskusKüberturvalisus

In face of “Eastern Data and Western Computing”, it is high time to figure out how to realize the interconnection between data centers in various locations

Rohkem
Surge in Phishing Attacks Puts Cybersecurity in Peril

Surge in Phishing Attacks Puts Cybersecurity in Peril

2022-03-25 Küberturvalisus

In retrospect, phishing attacks have struck from time to time over the years. While the range of victims and tactics are evolving with the ever-changing technology landscape, it rem…

Rohkem
Global luxury beauty group partners with CITIC Telecom CPC undergo digital transformation

Global luxury beauty group partners with CITIC Telecom CPC undergo digital transformation

2022-03-18 PilvÜhendusedCustomer ExperienceMajutuskeskusKüberturvalisusDigitaalne transformatsioon

As digitalization becomes the new normal across all industries especially during a time when staying at home is encouraged, beauty is no exception. For nearly a decade, CITIC Teleco…

Rohkem
Tooted ja Teenused
Euroopa lahendused Võrgustiku loomine Infoturve Pilvelahendused Pilvandmekeskus Internetiteenused Haldatavad teenused ICT-MiiND
Lahendused
Arhitektuur, projekteerimine ja ehitus Autotööstus BFSI Logistika ja transport Tootmine Õigus- ja raamatupidamisteenused Jaemüük Healthcare
Tehnoloogia ja teenused
Konsultatsiooniteenused Klienditeenindus
Infomaterjalid
Teenuste brozüürid Uued pakkumised Videod Valge raamat Edulood Blogi CPC Spotlights
Firmast
Meie firma Globaalsed ökosüsteemi partnerid Uudised Akrediteerimised ja auhinnad Karjäär
Võtke ühendust

Üldtelefon:
+3726223399
Müük:
+3726223360

Tehniline abi +372 622 33 90

Võtke ühendust

Jälgi meid

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Kuidas saada ühendust
Helistage meile

372 622 33 99

Kirjutage meile

Saatke meile oma küsimus