Blog

Before IoT, let’s talk about rigorous application security

By |2019-05-24T10:13:21+00:00November 26th, 2014|Blog|

The use of web applications in the enterprise has grown exponentially in the last decade. This will likely continue into the next decade, driven by trends such as the Internet of Things (IoT).

Comments Off on Before IoT, let’s talk about rigorous application security

Authentication methods keeping pace with BYOD, cloud

By |2019-09-13T14:40:19+00:00November 12th, 2014|Blog|

The consumerization of IT and bring your own device (BYOD) initiatives in the workplace are challenging IT leaders to deliver secure mobility without spoiling users’ mobile experience.......

Comments Off on Authentication methods keeping pace with BYOD, cloud

How smart financial institutions develop versatile authentication

By |2019-05-24T10:19:38+00:00October 9th, 2014|Blog|

The survey of 725 senior financial services leaders in Australia, Hong Kong, Japan, the UAE, the UK and Singapore also showed that IT security is now more likely to get......

Comments Off on How smart financial institutions develop versatile authentication

NetworkWorld Asia Info Security Conference 2014

By |2019-05-24T10:20:10+00:00August 12th, 2014|Blog|

i-Sprint participated in the NetworkWorld Asia Info Security Conference 2014 4th annual conference as one of the sponsors for this event. It was held on 12 August 2014 at Prince Hotel, Kuala Lumpur, Malaysia....

Comments Off on NetworkWorld Asia Info Security Conference 2014

Biz Daily’s interview with Mr. Albert Ching, CEO of i-Sprint Innovations

By |2019-05-24T10:21:42+00:00August 6th, 2014|Blog|

Biz Daily’s readership spans across various countries, such as Singapore, the US, China, Japan and Australia. Its readers include high net worth individuals, investors and......

Comments Off on Biz Daily’s interview with Mr. Albert Ching, CEO of i-Sprint Innovations

Why end-to-end encryption holds the key to trusted clouds

By |2019-05-24T10:22:37+00:00July 9th, 2014|Blog|

E2EE preserves both data confidentiality and integrity, a critical element of the trusted cloud, by preventing intermediaries, such as cloud or internet service providers from......

Comments Off on Why end-to-end encryption holds the key to trusted clouds

i-Sprint is a Winner in 2014 NWA Information Management Awards

By |2019-05-24T10:23:08+00:00June 24th, 2014|Blog|

The NetworkWorld Asia IMA, inaugurated in 2012, recognizes Asia’s leaders in Information Security, Storage and Data Management for the huge advances made in these fields over the last few years.....

Comments Off on i-Sprint is a Winner in 2014 NWA Information Management Awards
Go to Top