Banner Shadow

Services

Gallery

About

Confidential information is costly to maintain. Imagine all the 3 data states (data-in-motion, data-at-rest, data-in-use) will require technology and the
This is widely adopted in various process like: Asset discovery: to scan the network and take inventory of the components
Worry about breaching GDPR or PCIDSS? The most effective means is to avoid capturing these info that need protection. Accepting
At certain situations, enforcement of policy relies on administrative control when technical controls are not feasible. But how do we
Durnig pandemic situation, InfraRed body temperature detection technology is great - contactless, accurate, multi-persons processing, seamlessly and transparent to customers.
Two lanes but 3 traffic signs. Is the middle lane hidden? Information concealment is one of the techniques to hide
In physical world, it is a geographical critical and strategic passage. Armed force is able to control what is allowed
GRC is the typical jargon when we talk about the cybersecurity posture in an organization. Risks, no matter in terms
The commodities (toys) are encapsulated in the vending machine (plastic containers). All containers share the same Point of Sales (PoS)
We face many "policies" (directives) everyday - whether in real world or in the cyber space. And we are told
DMZ becomes the de facto standard for network segmentation. It is used to control network traffic across trust and untrusted
Sometimes, security protection needs reinforcement to avoid deterioration of effectiveness over time. This can easily be visualized in real world.