We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
Featured
【Beyond Gaming】Attack and Defense Card Game Event Deconstructs Security Strategic Thinking, Predicting Kill Chains to Precisely Intercept Intrusions

【Beyond Gaming】Attack and Defense Card Game Event Deconstructs Security Strategic Thinking, Predicting Kill Chains to Precisely Intercept Intrusions

2024-05-24

An "AI Red/Blue Gamification Experience" event was organized in partnership with Fortinet, enabling industry experts to engage in various cyberattack scenarios. The immersive experi…

More
CITIC Dicastal’s Digital Transformation and Innovation for Globalization

CITIC Dicastal’s Digital Transformation and Innovation for Globalization

2022-10-24 NetworkCustomer ExperienceDigital Transformation

Reshaped global economic structure and international competition pattern in the post-pandemic era have inevitably led to a booming digital economy. Now, CIOs are striving for innova…

More
A Complete Endpoint Security Guidance for Enterprises

A Complete Endpoint Security Guidance for Enterprises

2022-09-30 NetworkInformation Security

As businesses continue to embrace a blended and flexible working model, the number of mobile devices such as smartphones and tablets connecting to enterprise assets surges tremendou…

More
AI-driven SD-WAN: Unlock Immense Business Values

AI-driven SD-WAN: Unlock Immense Business Values

2022-09-16 Artificial IntelligenceNetworkSD-WAN

The advent of AI has raised the ceiling of SD-WAN technology and resulted in intelligent SD-WAN network solution.

More
What is ZTNA? Ultimate Guide to Zero Trust Network Access

What is ZTNA? Ultimate Guide to Zero Trust Network Access

2022-09-07 NetworkInformation SecuritySASE

We will introduce the most important ZTNA concepts and best practices to protect your business applications, data and services.

More
Containerization Technology - Unleashing Application Development Potential

Containerization Technology - Unleashing Application Development Potential

2022-08-26 Cloud ComputingDigital Transformation

In today's business world, digital transformation is driving enterprises to develop a plethora of applications with cloud computing in the hope that digitalized operation will lead …

More
What is Phishing? Attack Types & Anti-phishing Tools for Business

What is Phishing? Attack Types & Anti-phishing Tools for Business

2022-07-29 Information Security

Phishing has long been identified as an online scam that lures victims into giving out credentials via fraudulent emails, messages or websites.

More
CITIC Pacific Special Steel: Empowered by Integrated ICT Solution for Digitalization and Intelligentization

CITIC Pacific Special Steel: Empowered by Integrated ICT Solution for Digitalization and Intelligentization

2022-07-15 Cloud ComputingNetworkCustomer ExperienceData CenterInformation SecuritySD-WANDigital Transformation

Having gone through multiple reviews in 2012, CITIC Pacific Special Steel opted to partner with China Entercom, to improve its focus on the core business with streamlined production…

More
A New Era of Cloud Computing Solutions – IaaS & SaaS

A New Era of Cloud Computing Solutions – IaaS & SaaS

2022-07-06 Cloud Computing

According to S&P Global, the global cloud computing market is expected to reach USD$101 billion by 2025. As cloud computing is becoming more widespread and advanced in recent years.…

More
Leading the Digital Transformation: Non-ferrous Metal enterprise embarks on the DX journey

Leading the Digital Transformation: Non-ferrous Metal enterprise embarks on the DX journey

2022-06-09 NetworkCustomer ExperienceSD-WANDigital Transformation

Unlike steel and coal enterprises, it is more challenging to realize digital transformation in the non-ferrous metal industry, due to discrete and complex operation, obstacles in da…

More
Embracing Container Technology: Engender New Application Values

Embracing Container Technology: Engender New Application Values

2022-05-27 Cloud ComputingDigital Transformation

In the era of technology explosion, PaaS (Platform as a Service) is one of the most dynamic markets with exponential growth in the adoption rate over the last few years

More
Network Construction: Beyond “Eastern Data and Western Computing”

Network Construction: Beyond “Eastern Data and Western Computing”

2022-05-13 Cloud ComputingNetworkData CenterInformation Security

In face of “Eastern Data and Western Computing”, it is high time to figure out how to realize the interconnection between data centers in various locations

More
Surge in Phishing Attacks Puts Cybersecurity in Peril

Surge in Phishing Attacks Puts Cybersecurity in Peril

2022-03-25 Information Security

In retrospect, phishing attacks have struck from time to time over the years. While the range of victims and tactics are evolving with the ever-changing technology landscape, it rem…

More
Products & Services
Europe Solutions Networking Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services
Solutions
Architecture, Engineering & Construction Automobile BFSI Logistics & Transportation Manufacturing Legal & Accounting Services Retail Healthcare
Technology & Services
Consulting Services Customer Services
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories Blog
About Us
Our Company Global Ecosystem Partners News Center Accreditation & Awards Careers
Contact Us

General Enquiry / Sales Hotline +31 20 567 2000

Service Hotline +372 622 33 00

Contact Us

Follow Us

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue