We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
Featured
Forging Robust AI Guardrail: Safeguarding the Intelligent Future of Enterprises

Forging Robust AI Guardrail: Safeguarding the Intelligent Future of Enterprises

2025-08-04Cybersecurity

Our latest blog explores the enterprise data security and compliance risks associated with AI implementation, including sensitive data leaks, prompt injection attacks, and the gener…

More
“Eastern Data and Western Computing” is in Full Swing

“Eastern Data and Western Computing” is in Full Swing

2022-03-04 CloudNetworkData CenterCybersecurityDigital Transformation

Subsequent to the projects of “South–North Water Transfer”, “West–East Gas Pipeline” and “West–East Electricity Transmission”, one can expect a whole new national initiativ…

More
Email Security is Essential to Preventing Ubiquitous Phishing Attacks

Email Security is Essential to Preventing Ubiquitous Phishing Attacks

2022-02-25 Cybersecurity

As the COVID-19 pandemic becomes more severe around the globe, more enterprises allow employees to work from home to lower infection risks. Email has therefore become the main daily…

More
Bridging Virtuality and Reality to Meet the Rise of Metaverse

Bridging Virtuality and Reality to Meet the Rise of Metaverse

2022-02-18 CloudNetworkData CenterCybersecurity

A time of crisis indeed opens up rare opportunities, and the pandemic has set the stage to enter the metaverse era. In the early days of the pandemic, many enterprises addressed the…

More
Upgrade Endpoint Security to Keep You Away from Data Breach!

Upgrade Endpoint Security to Keep You Away from Data Breach!

2022-02-11 Cybersecurity

During festive seasons, online purchases soar while cybercriminals gear up to launch attacks or frauds. Just before this Chinese New Year, a leading online shopping platform in Hong…

More
Endpoint Detection & Response: Panacea for New Wave of Cyber Threats

Endpoint Detection & Response: Panacea for New Wave of Cyber Threats

2021-12-03 AICybersecurity

Given a multitude of advanced cybersecurity threats, traditional security solutions are less effective in mitigating damage from data breaches or system failure.

More
SD-WAN Reshapes Businesses and Breaks New Grounds in Connectivity

SD-WAN Reshapes Businesses and Breaks New Grounds in Connectivity

2021-10-15 NetworkCybersecuritySD-WANDigital Transformation

Subsequent to globalization, business expansion and new branch networks have raised the demand for cross-border communications. Enterprises have to seek a more advanced connectivity…

More
Evolving Ransomware: A Multi-pronged Approach to Secure Your Business

Evolving Ransomware: A Multi-pronged Approach to Secure Your Business

2021-09-03 CloudCybersecurity

Ransomware is becoming highly sophisticated, which a new model has taken shape merely to attack enterprises. Global enterprises will be at stake once ransomware loses its control as…

More
Reinforcing Infosecurity against persistent APTs Security Threats

Reinforcing Infosecurity against persistent APTs Security Threats

2021-08-06 CybersecurityDigital Transformation

Under digitalization era, information security become a challenging task, especially after Advanced Persistent Threats (APTs) hit the globe.

More
Equipped as a Digitally Resilient Enterprises for Post-pandemic Era

Equipped as a Digitally Resilient Enterprises for Post-pandemic Era

2021-07-30 AINetworkCybersecuritySD-WAN

IDC’s COVID-19 Survey revealed that over 50% of organizations are going to increase their technology budgets for innovative technologies in 2021, enabling remote offices, secure co…

More
Secure Expanding SD-WAN Edge for Distributed Enterprises with SASE

Secure Expanding SD-WAN Edge for Distributed Enterprises with SASE

2021-06-28 CybersecuritySD-WAN

Companies are increasingly adopting SD-WAN to support hybrid workforces and distributed workloads. They also need an agile, robust, and holistic network security solution that scale…

More
Enterprise Information Security: Reducing Ransomware Related Downtime with Disaster Recovery

Enterprise Information Security: Reducing Ransomware Related Downtime with Disaster Recovery

2021-06-11 CloudCybersecurity

The world’s largest meat and poultry processor has been targeted by a sophisticated ransomware attack and temporarily shut down some operations in the U.S., Canada and Australia, …

More
Enterprise Information Security: Infosecurity Management Resolves Security Crisis of Fintech

Enterprise Information Security: Infosecurity Management Resolves Security Crisis of Fintech

2021-06-03 Cybersecurity

The Fintech revolution not only offers tremendous opportunities for the development of financial industry, but also poses unprecedented risks and challenges to financial institution…

More
Products & Services
Europe Solutions Networking Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services ICT-MiiND
Solutions
Architecture, Engineering & Construction Automobile BFSI Logistics & Transportation Manufacturing Legal & Accounting Services Retail Healthcare
Technology & Services
Consulting Services Customer Services
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories Blog CPC Spotlights
About Us
Our Company Global Ecosystem Partners News Center Accreditation & Awards Careers
Contact Us

General Enquiry / Sales Hotline +31 20 567 2000

Service Hotline +372 622 33 00

Contact Us

Follow Us

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue