We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
Featured
Looking into the Driving Force Behind Datong Insurance’s Digital Transformation

Looking into the Driving Force Behind Datong Insurance’s Digital Transformation

2023-01-17NetworkData CenterInformation SecurityDigital Transformation

Homogeneous and inefficient offline operations and agency means are no longer applicable to the new market and changing supervision policies, as the insurance industry is undergoing…

More
Looking into the Driving Force Behind Datong Insurance’s Digital Transformation

Looking into the Driving Force Behind Datong Insurance’s Digital Transformation

2023-01-17 NetworkData CenterInformation SecurityDigital Transformation

Homogeneous and inefficient offline operations and agency means are no longer applicable to the new market and changing supervision policies, as the insurance industry is undergoing…

More
Middle Platforms of Data and Business: Expediting Digital Transformation for Cabbeen

Middle Platforms of Data and Business: Expediting Digital Transformation for Cabbeen

2022-12-12 NetworkCustomer ExperienceData CenterInformation SecurityDigital Transformation

The fashion industry is entering a highway to a reshuffling and reshaping environment with the rapid development of the digital economy, the question is, how can the industry adapt …

More
Sparkling Biz Matters: Get Ready for 2023

Sparkling Biz Matters: Get Ready for 2023

2022-12-05 Cloud ComputingNetworkData CenterEcosystemInformation Security

Over the past few years, the challenges ahead of us have been daunting and has put the global economy to the test. For 2023, business prospects are likely to be clouded by uncertain…

More
A Complete Endpoint Security Guidance for Enterprises

A Complete Endpoint Security Guidance for Enterprises

2022-09-30 NetworkInformation Security

As businesses continue to embrace a blended and flexible working model, the number of mobile devices such as smartphones and tablets connecting to enterprise assets surges tremendou…

More
What is ZTNA? Ultimate Guide to Zero Trust Network Access

What is ZTNA? Ultimate Guide to Zero Trust Network Access

2022-09-07 NetworkInformation SecuritySASE

We will introduce the most important ZTNA concepts and best practices to protect your business applications, data and services.

More

What is Phishing? Attack Types & Anti-phishing Tools for Business

2022-07-29 Information Security

Phishing has long been identified as an online scam that lures victims into giving out credentials via fraudulent emails, messages or websites.

More

CITIC Pacific Special Steel: Empowered by Integrated ICT Solution for Digitalization and Intelligentization

2022-07-15 Cloud ComputingNetworkCustomer ExperienceData CenterInformation SecuritySD-WANDigital Transformation

Having gone through multiple reviews in 2012, CITIC Pacific Special Steel opted to partner with China Entercom, to improve its focus on the core business with streamlined production…

More

Network Construction: Beyond “Eastern Data and Western Computing”

2022-05-13 Cloud ComputingNetworkData CenterInformation Security

In face of “Eastern Data and Western Computing”, it is high time to figure out how to realize the interconnection between data centers in various locations

More

Surge in Phishing Attacks Puts Cybersecurity in Peril

2022-03-25 Information Security

In retrospect, phishing attacks have struck from time to time over the years. While the range of victims and tactics are evolving with the ever-changing technology landscape, it rem…

More

Global luxury beauty group partners with CITIC Telecom CPC undergo digital transformation

2022-03-18 Cloud ComputingNetworkCustomer ExperienceData CenterInformation SecurityDigital Transformation

As digitalization becomes the new normal across all industries especially during a time when staying at home is encouraged, beauty is no exception. For nearly a decade, CITIC Teleco…

More

“Eastern Data and Western Computing” is in Full Swing

2022-03-04 Cloud ComputingNetworkData CenterInformation SecurityDigital Transformation

Subsequent to the projects of “South–North Water Transfer”, “West–East Gas Pipeline” and “West–East Electricity Transmission”, one can expect a whole new national initiativ…

More

Email Security is Essential to Preventing Ubiquitous Phishing Attacks

2022-02-25 Information Security

As the COVID-19 pandemic becomes more severe around the globe, more enterprises allow employees to work from home to lower infection risks. Email has therefore become the main daily…

More
Products & Services
Private Network Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services Europe Solutions
Solutions
Architecture, Engineering & Construction Automobile BFSI Logistics & Transportation Manufacturing Legal & Accounting Services Retail Healthcare
Technology & Services
Consulting Services Customer Services
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories Blog
About Us
Our Company Global Ecosystem Partners News Center Accreditation & Awards Careers
Contact Us

General Enquiry / Sales Hotline +852 2170 7401

Service Hotline +852 2331 8930

Contact Us

Follow Us

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue