RidgeBot

Enterprise-Class Automated Penetration Testing Using Intelligent Validation RobotsRidge Security is changing the game with RidgeBot™, an intelligent security validation robot. Equipped with state-of-the-art hacking techniques, RidgeBot™ has a collective knowledge of threats, vulnerabilities, and exploits. Acting like an actual ethical attacker, RidgeBot™ relentlessly locates, and documents exploits. Automating penetration testing makes it affordable with the ability to run at scale. Working within a defined scope, RidgeBot™ instantly replicates to address highly complex structures. Ridge Security enables enterprises and web application teams, DevOps, ISVs, governments, healthcare, education—anyone responsible for ensuring software security—to affordably and efficiently test their systems. Asset ProfilingBased on smart crawl techniques and fingerprint algorithems, discover board types of IT assets: IPs, domains, hosts, OS, apps, websites, plugins, and network devices. Vulnerability MiningUtilizing proprietary scanning tools, our rich knowledge base of vulnerabilities and security breach events, plus various risk modeling Vulnerability ExploitUse a smart sandbox to simulate real-world attacks with toolkits. Collect more data for a further attack in a postbreach stage. Risk PrioritizationAutomatically form an analytic view, visualize a kill chain, and display a hacker’s script. Show hacking results like data and escalated privileges from the compromised objects. On-Premise DeploymentFor enterprise environment—deploy RidgeBot™ on the customer’s premise, provides...

Winmagic

SecureDoc is a comprehensive disk encryption and data security products for protecting data at rest which has two main components:The client (Standalone/Enterprise editions)The management server (SecureDoc Enterprise Server) 01 One Console, Any Device No matter where corporate data resides – on any device in any location running any operating system – SecureDoc can secure it and centrally manage it, making lives easier for IT and security administrators 02 Network-based Authentication PBConnex provides a means for authenticating encrypted devices to the network before the operating system ever loads. Simply put, it means data is never exposed until the user credentials are verified before the standard OS log-in process, keeping computer and network security intact. 03 Deploy & Manage with Ease SecureDoc Enterprise Server (SES) is capable of managing Self Encrypting Drives (SEDs) making it easier for organizations to deploy and manage. With an SED encryption is always on, the key never leaves the drive and authentication is done independent of the operating system.

Certero AssetStudio

Certero AssetStudio® - Enterprise Software Asset Management SolutionAssetStudio® covers all of the critical elements: Inventory, Software Delivery, and License Management and Compliance allowing organizations to gain an accurate picture of their software estate. Enabling the comprehensive management of Virtualized and Thin Client environments the solution offers a unique automation process to provide a real-time Effective License Position (ELP). With Certero SoftwareMetering for Decision Makers® organizations can progress to an Optimized License Position (OLP) by detecting and removing duplicate and unnecessary licenses and harvesting unused licenses for future use. Software Asset Management HighlightsManagement of dynamic virtualised assets (servers and PC's) simplifying software licence management and complianceComprehensive Software Recognition and ReconciliationHigh level of automation enabling a Real time Effective Licence Position (ELP) by organisation, vendor, product, entitlementMicrosoft MLS (Claret) report import with licence normalisationComprehensive dynamic report generation Ability to collate and upload inventory information on systems not on a networkCollate information on any Microsoft SQL server instances (version, processor type, edition)Navigate between network devices via the click of the mouseHigh performance (20,000 clients from an average server) with minimal network trafficRemote deployment of application packages with silent software installationWake on LAN, reboot and shutdown capability to allow installation of packages outside business...

Certero PowerStudio

PowerStudio® is a comprehensive, enterprise-wide web based PC Power Management Solution. This is a complete solution that has no dependencies on third party products (i.e. Microsoft SCCM). By applying centralized computer power policies organizations can reduce their carbon footprint and save thousands on Electricity bills. PowerStudio® provides an accurate baseline figure of PC power usage including the ability to remotely shutdown and wake PC clients and intelligently saves and reloads applications and documents. Reporting options within PowerStudio® are flexible and easy to use, organizations can dynamically report on usage to produce easy to understand reports that can be updated to ensure maximum savings. PowerStudio HighlightsAccurate PC Energy Consumptions ValuesPersonalised Dynamic Reporting that comes as part of Power StudioFlexible Power Schemes and PC Power Management ProfilesSimple to use web console that deploys the agent, groups PC's and applies policiesInvolve the User Community in Power SavingSecurely Manage DocumentsPowerStudio Business BenefitsReturn on Investment in the Region of MonthsComplete SolutionsInvolve the User CommunitySave Thousands on ElectricityReduce CO2 and Comply with Government Legislation

Splunk

Splunk is the first security in the world that use the Data-to-Everything Platform designed to remove the barriers between data and action, so that everyone thrives in the Data Age. Their empowering IT, DevOps and security teams to transform their organizations with data from any source and on any timescale. splunk protectPrivacy, Security, Compliance Splunk is dedicated to keeping your data secure and private — adhering to global and industry compliance initiatives. Splunk Ventures is guided by three core principles: Transformative innovation is only possible with a strong ecosystem Great teams that change the world are made up of diverse backgrounds and experiences We have an obligation to use data for the good of society 01 Splunk Core Splunk Cloud Splunk Enterprise Splunk Data Stream Processor 02 Splunk for IT Operations Splunk Infrastructure Monitoring Splunk IT Service Intelligence Splunk On-Call 03 Splunk for Security Splunk Enterprise Security Splunk Phantom Splunk User Behavior Analytics 04 Splunk for Devops Splunk Infrastructure Monitoring Splunk APM Splunk On-Call splunk > CloudThe flexible, secure and cost-effective data platform service. 01 Service Excellence You can focus on acting on your data while you IT backend manage by Splunk 02 Fewer Infrastructure Requirements Splunk can provisioned and...

Holm Security

Cloud based vulnerability managementMarket leading and comprehensive cloud based platform for automated and continuous vulnerability assessment. The platform is suitable for all industries, no matter the size of the organization, and scans for an ever-increasing number of vulnerabilities in networks, systems, web applications, APIs, cloud services, and cloud infrastructure. Local scanning is done using one or several Scanner Appliances that are installed in your virtual environment. Cloud administrationManage the service easily and efficiently with our web-based control panel Security Center, were you, your colleagues, and IT partner work with vulnerabilities. Larger organizations and partners are offered the possibility to create their own structure with several Security Centers with the help of our tool web based portal Organizer Powerful tools & featuresIncludes several powerful tools that enable you to effectively work with vulnerabilities, whether you have a smaller number or thousands, such as Asset Management, Vulnerability Manager, Continuous Monitoring, and remediation IntegrationsOffers a number of possibilities for integrations with other solutions. The Platform API makes it possible to integrate with e.g. CI/CD and SIEM products. There are also ready-made solutions for integration with e.g. Jira and Slack. You can also use Webhooks for integration with a variety of systems. HighlightComplete cloud-based...

Search Inform

Managing Internal TrackSearchInform helps your company fulfil its risk management program, facilitate regulatory compliance and investigation processes, prevent corporate fraud, and detect employee abnormal behavior. ChallengesAll the tools and features you need to keep your company protected and solve the most complex monitoring issues.

McAfee

McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates enterprise and consumer solutions that make our world a safer place for the benefit of all. Our holistic, automated, and open security platform and cloud-first approach to building security solutions allow all your products to coexist, communicate, and share threat intelligence with each other anywhere in the digital landscape. Where machine automation is converged with human intelligence so you can streamline workflows more efficiently. Where your team is freed from unnecessary operational burden and is empowered to strategically fight adversaries. Where you can orchestrate all things security on premises and in the cloud through a single Management system. Where all your security products adapt to new threats skillfully and work synergistically to increase protection—and speed up detection and correction—across the entire threat defense lifecycle.

RP The Power Of Continuity

Cleafy

Cleafy innovative threat detection and protection technology is available in an open and flexible platform that can be easily adopted to address several needs for protecting your online services and users 01 Stop online fraud, now Will protecting your online services and users from today's most attacks and avoid account takeover, credential hijacking, transaction tampering and payment frauds 02 Achieve PSD2 compliance, easily PSD2 regulations - Transactional Risk Analysis to minimize fraudulent transactions. Compliance be easily achieved without either impacting services or touching applications with Cleafy. 03 Seize market new opportunities with confidence New products not always take security and compliance requirements. Cleafy will help you stay ahead of the market without compromising security

Contrast Security

Fortinet

Checkpoint

iOmniscient

Who is HuaweiFounded in 1987, Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. We have more than 194,000 employees, and we operate in more than 170 countries and regions, serving more than three billion people around the world. Our vision and mission is to bring digital to every person, home and organization for a fully connected, intelligent world. To this end, we will drive ubiquitous connectivity and promote equal access to networks; bring cloud and artificial intelligence to all four corners of the earth to provide superior computing power where you need it, when you need it; build digital platforms to help all industries and organizations become more agile, efficient, and dynamic; redefine user experience with AI, making it more personalized for people in all aspects of their life, whether they’re at home, in the office, or on the go. Lossless EthernetZero packet loss for local and long-distance transmission. Convergence of computing and storage networks. Full Lifecycle AutomationAutomation of planning, construction, maintenance, and optimization. Intent-driven networking, enabling network servitization. Network-Wide Intelligent O&MNetwork-wide intelligent Operations and Maintenance (O&M) of devices, interfaces, and optical modules. Predictive and proactive maintenance, ensuring zero service interruption. Enquiry

Dahua

About DahuaZhejiang Dahua Technology Co., Ltd. is a world-leading video-centric smart IoT solution and service provider. Based on technological innovations, Dahua Technology offers end-to-end security solutions, systems, and services to create values for city operations, corporate management, and consumers. With more than 16,000 employees all over the world, Dahua solutions, products, and services are used in over 180 countries and regions. Dahua has 54 subsidiaries and representative offices globally covering Asia, the Americas, Europe, Middle East, Oceania, Africa, etc. With its surveillance solutions, Dahua delivers unparalleled quality, reliability and stability. Enquiry

Citirx

Lenovo

About LenovoOur story began more than three decades ago with a team of eleven engineers in China. Today, we are a diverse group of forward thinkers and innovators in more than 160 countries, constantly reimagining technology to make the world more interesting and to solve tough global challenges. We are dedicated to transforming our customers’ experience with technology—and how it, and they, interact with the world around us. We call this Intelligent Transformation. We are setting the stage for what’s possible with technology shaped by Augmented Intelligence, capable of enhancing and elevating human capability. NetworkingInteroperable, high performance, great value. High-performance ethernet and converged networking switches offer great value. Scale your business with Lenovo networking switches that are built for modern data centers. Ethernet Switches for FlexGet on-demand scalability and flexible port mapping for dynamic configuration of active ports in these industry-standard ports, which offer simple interoperability with existing networks. ServersThe heart of the data center. Drive your business forward with a server that matches your needs. Reduce costs and complexity by investing in a system that handles today's workload and expands to accommodate future growth. Enquiry

Huawei

Who is HuaweiFounded in 1987, Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. We have more than 194,000 employees, and we operate in more than 170 countries and regions, serving more than three billion people around the world. Our vision and mission is to bring digital to every person, home and organization for a fully connected, intelligent world. To this end, we will drive ubiquitous connectivity and promote equal access to networks; bring cloud and artificial intelligence to all four corners of the earth to provide superior computing power where you need it, when you need it; build digital platforms to help all industries and organizations become more agile, efficient, and dynamic; redefine user experience with AI, making it more personalized for people in all aspects of their life, whether they’re at home, in the office, or on the go. Lossless EthernetZero packet loss for local and long-distance transmission. Convergence of computing and storage networks. Full Lifecycle AutomationAutomation of planning, construction, maintenance, and optimization. Intent-driven networking, enabling network servitization. Network-Wide Intelligent O&MNetwork-wide intelligent Operations and Maintenance (O&M) of devices, interfaces, and optical modules. Predictive and proactive maintenance, ensuring zero service interruption. Enquiry

Sangfor

About SangforSangfor Technologies is a leading global vendor of IT infrastructure solutions, specializing in Cloud Computing & Network Security with a wide range of products & services including Hyper-Converged Infrastructure, Virtual Desktop Infrastructure, Next-Generation Firewall, Internet Access Management, Endpoint Protection, Ransomware Protection, Managed Detection and Response, WAN Optimization, SD-WAN, and many others. Sangfor takes customers’ business needs and user experience seriously, placing them at the heart of our corporate strategy. Constant innovation and commitment to creating value for our customers help them achieve sustainable growth. Established in 2000, Sangfor currently has 6,500 + employees with more than 60 branch offices globally in exciting locations like Hong Kong, Malaysia, Thailand, Indonesia, Singapore, Philippines, Vietnam, Myanmar, Pakistan, UAE, Italy, and the USA. Production LineThe integrated architecture design of the Thin client ensures the system reliability of long-term operation in harsh factory environment. Dramatically improve the production efficiency. and the production efficiency. Solution provide peripherals and data security control policy to prevent data leakage. Student Computer LabCloud can greatly reduce the workload of PC operation and maintenance in classrooms, and support cross-platform resource sharing for mobile teaching preparation, creating a new information education model. OfficeSangfor aDesk can realize rapid deployment and efficient operation...

Aruba

Why Aruba?Aruba has repeatedly been recognized by third party analysts as a leader in Wi-Fi 6, switching, SD-Branch, and a visionary in Data Center networking. The world’s largest companies rely on us to provide a secure, AI-powered edge services platform that spans across campus, branch, data center, and remote working environments. A single OS for simplicityDeliver a consistent operator experience, simplify network design, and unify management by giving IT the flexibility they need to deploy the same hardware and software, from edge access to data center. Automation to improve efficiencyLeverage the agility of cloud-native software, promote programmability, reduce manual tasks, and enjoy error-free configurations. Enable always-on networks — even during upgrades. Faster troubleshootingGet real-time, network-wide visibility with Aruba Network Analytics Engine (NAE) so you can troubleshoot and resolve issues before users and business are impacted. Enquiry

CISCO

NetworkingOur networking solutions take a software-delivered approach to automate and assure services across your WAN, campus, and branch networks. Cisco DNA SoftwareUnlock policy-based automation, secure connectivity, end-to-end visibility, analytics, and assurance in your network. Cisco DNA Software for SD-WAN and RoutingSimplify your WAN architecture. Make the WAN easier to deploy, manage, and operate. Cisco DNA Software for SwitchingSimplify your WAN architecture. Make the WAN easier to deploy, manage, and operate. Cisco DNA Software for WirelessDeliver exceptional wireless performance for high-density environments. Get end-to-end visibility and remediation guidance. Cisco MerakiDeploy smart, cloud-managed IT solutions that make life simpler. Cisco KineticGet the right IoT data to the right applications at the right time--securely. Enquiry

Nutanix

What We DoWe strive to delight customers with a simple, flexible, and cost-efficient cloud platform, one that offers freedom of choice and enables true hybrid and multicloud computing. How We Do ItNutanix leverages its industry leading, 100% software-defined hyperconverged infrastructure to provide a single cloud platform that seamlessly brings to life your hybrid and multicloud strategy. Whether on-prem or in the cloud, you get unified management and operations with one-click simplicity, intelligent automation, and always-on availability. Enquiry

Field Map

IFER – Monitoring & Mapping SolutionsField-Map – Tool for Computer Aided Field Data CollectionDevelopment and services activityField-Map technology (development, selling, technical support, etc.)Data processingServices (mapping, inventory, other data collecting)Hardware and software developing, (re)selling and maintenanceFeaturesStatistical forest inventory (from regional up to national level)Monitoring (forest monitoring, carbon offset monitoring, etc.)Yield tables, growth function, tree assortmentPermanent and temporary research plotsEcosystem processes and functionsGIS and remote sensingForest management and planningGame ecologyHow Does It Works:FM Project ManagerFM Data CollectorFM Inventory AnalystFM Stem Analyst

IBM Malayasia

H3C Malayasia

VMWare Malaysia

Veeam Malaysia

Veritas Malaysia

APC Schneider Electric

Commvault Malaysia

Avaya Malaysia

Palo Alto

Synology

SocRadar

Blackberry

Certero PowerStudio

PowerStudio® is a comprehensive, enterprise-wide web based PC Power Management Solution. This is a complete solution that has no dependencies on third party products (i.e. Microsoft SCCM). By applying centralized computer power policies organizations can reduce their carbon footprint and save thousands on Electricity bills. PowerStudio® provides an accurate baseline figure of PC power usage including the ability to remotely shutdown and wake PC clients and intelligently saves and reloads applications and documents. Reporting options within PowerStudio® are flexible and easy to use, organizations can dynamically report on usage to produce easy to understand reports that can be updated to ensure maximum savings. PowerStudio HighlightsAccurate PC Energy Consumptions ValuesPersonalised Dynamic Reporting that comes as part of Power StudioFlexible Power Schemes and PC Power Management ProfilesSimple to use web console that deploys the agent, groups PC's and applies policiesInvolve the User Community in Power SavingSecurely Manage DocumentsPowerStudio Business BenefitsReturn on Investment in the Region of MonthsComplete SolutionsInvolve the User CommunitySave Thousands on ElectricityReduce CO2 and Comply with Government Legislation

RidgeBot

Enterprise-Class Automated Penetration Testing Using Intelligent Validation RobotsRidge Security is changing the game with RidgeBot™, an intelligent security validation robot. Equipped with state-of-the-art hacking techniques, RidgeBot™ has a collective knowledge of threats, vulnerabilities, and exploits. Acting like an actual ethical attacker, RidgeBot™ relentlessly locates, and documents exploits. Automating penetration testing makes it affordable with the ability to run at scale. Working within a defined scope, RidgeBot™ instantly replicates to address highly complex structures. Ridge Security enables enterprises and web application teams, DevOps, ISVs, governments, healthcare, education—anyone responsible for ensuring software security—to affordably and efficiently test their systems. Asset ProfilingBased on smart crawl techniques and fingerprint algorithems, discover board types of IT assets: IPs, domains, hosts, OS, apps, websites, plugins, and network devices. Vulnerability MiningUtilizing proprietary scanning tools, our rich knowledge base of vulnerabilities and security breach events, plus various risk modeling Vulnerability ExploitUse a smart sandbox to simulate real-world attacks with toolkits. Collect more data for a further attack in a postbreach stage. Risk PrioritizationAutomatically form an analytic view, visualize a kill chain, and display a hacker’s script. Show hacking results like data and escalated privileges from the compromised objects. On-Premise DeploymentFor enterprise environment—deploy RidgeBot™ on the customer’s premise, provides...

Winmagic

SecureDoc is a comprehensive disk encryption and data security products for protecting data at rest which has two main components:The client (Standalone/Enterprise editions)The management server (SecureDoc Enterprise Server) 01 One Console, Any Device No matter where corporate data resides – on any device in any location running any operating system – SecureDoc can secure it and centrally manage it, making lives easier for IT and security administrators 02 Network-based Authentication PBConnex provides a means for authenticating encrypted devices to the network before the operating system ever loads. Simply put, it means data is never exposed until the user credentials are verified before the standard OS log-in process, keeping computer and network security intact. 03 Deploy & Manage with Ease SecureDoc Enterprise Server (SES) is capable of managing Self Encrypting Drives (SEDs) making it easier for organizations to deploy and manage. With an SED encryption is always on, the key never leaves the drive and authentication is done independent of the operating system.

Certero AssetStudio

Certero AssetStudio® - Enterprise Software Asset Management SolutionAssetStudio® covers all of the critical elements: Inventory, Software Delivery, and License Management and Compliance allowing organizations to gain an accurate picture of their software estate. Enabling the comprehensive management of Virtualized and Thin Client environments the solution offers a unique automation process to provide a real-time Effective License Position (ELP). With Certero SoftwareMetering for Decision Makers® organizations can progress to an Optimized License Position (OLP) by detecting and removing duplicate and unnecessary licenses and harvesting unused licenses for future use. Software Asset Management HighlightsManagement of dynamic virtualised assets (servers and PC's) simplifying software licence management and complianceComprehensive Software Recognition and ReconciliationHigh level of automation enabling a Real time Effective Licence Position (ELP) by organisation, vendor, product, entitlementMicrosoft MLS (Claret) report import with licence normalisationComprehensive dynamic report generation Ability to collate and upload inventory information on systems not on a networkCollate information on any Microsoft SQL server instances (version, processor type, edition)Navigate between network devices via the click of the mouseHigh performance (20,000 clients from an average server) with minimal network trafficRemote deployment of application packages with silent software installationWake on LAN, reboot and shutdown capability to allow installation of packages outside business...

Splunk

Splunk is the first security in the world that use the Data-to-Everything Platform designed to remove the barriers between data and action, so that everyone thrives in the Data Age. Their empowering IT, DevOps and security teams to transform their organizations with data from any source and on any timescale. splunk protectPrivacy, Security, Compliance Splunk is dedicated to keeping your data secure and private — adhering to global and industry compliance initiatives. Splunk Ventures is guided by three core principles: Transformative innovation is only possible with a strong ecosystem Great teams that change the world are made up of diverse backgrounds and experiences We have an obligation to use data for the good of society 01 Splunk Core Splunk Cloud Splunk Enterprise Splunk Data Stream Processor 02 Splunk for IT Operations Splunk Infrastructure Monitoring Splunk IT Service Intelligence Splunk On-Call 03 Splunk for Security Splunk Enterprise Security Splunk Phantom Splunk User Behavior Analytics 04 Splunk for Devops Splunk Infrastructure Monitoring Splunk APM Splunk On-Call splunk > CloudThe flexible, secure and cost-effective data platform service. 01 Service Excellence You can focus on acting on your data while you IT backend manage by Splunk 02 Fewer Infrastructure Requirements Splunk can provisioned and...

Holm Security

Cloud based vulnerability managementMarket leading and comprehensive cloud based platform for automated and continuous vulnerability assessment. The platform is suitable for all industries, no matter the size of the organization, and scans for an ever-increasing number of vulnerabilities in networks, systems, web applications, APIs, cloud services, and cloud infrastructure. Local scanning is done using one or several Scanner Appliances that are installed in your virtual environment. Cloud administrationManage the service easily and efficiently with our web-based control panel Security Center, were you, your colleagues, and IT partner work with vulnerabilities. Larger organizations and partners are offered the possibility to create their own structure with several Security Centers with the help of our tool web based portal Organizer Powerful tools & featuresIncludes several powerful tools that enable you to effectively work with vulnerabilities, whether you have a smaller number or thousands, such as Asset Management, Vulnerability Manager, Continuous Monitoring, and remediation IntegrationsOffers a number of possibilities for integrations with other solutions. The Platform API makes it possible to integrate with e.g. CI/CD and SIEM products. There are also ready-made solutions for integration with e.g. Jira and Slack. You can also use Webhooks for integration with a variety of systems. HighlightComplete cloud-based...

Search Inform

Managing Internal TrackSearchInform helps your company fulfil its risk management program, facilitate regulatory compliance and investigation processes, prevent corporate fraud, and detect employee abnormal behavior. ChallengesAll the tools and features you need to keep your company protected and solve the most complex monitoring issues.

McAfee

McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates enterprise and consumer solutions that make our world a safer place for the benefit of all. Our holistic, automated, and open security platform and cloud-first approach to building security solutions allow all your products to coexist, communicate, and share threat intelligence with each other anywhere in the digital landscape. Where machine automation is converged with human intelligence so you can streamline workflows more efficiently. Where your team is freed from unnecessary operational burden and is empowered to strategically fight adversaries. Where you can orchestrate all things security on premises and in the cloud through a single Management system. Where all your security products adapt to new threats skillfully and work synergistically to increase protection—and speed up detection and correction—across the entire threat defense lifecycle.

Cleafy

Cleafy innovative threat detection and protection technology is available in an open and flexible platform that can be easily adopted to address several needs for protecting your online services and users 01 Stop online fraud, now Will protecting your online services and users from today's most attacks and avoid account takeover, credential hijacking, transaction tampering and payment frauds 02 Achieve PSD2 compliance, easily PSD2 regulations - Transactional Risk Analysis to minimize fraudulent transactions. Compliance be easily achieved without either impacting services or touching applications with Cleafy. 03 Seize market new opportunities with confidence New products not always take security and compliance requirements. Cleafy will help you stay ahead of the market without compromising security

Contrast Security

Fortinet

Checkpoint

IBM Malayasia

Palo Alto

SocRadar

Blackberry

RP The Power Of Continuity

iOmniscient

Who is HuaweiFounded in 1987, Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. We have more than 194,000 employees, and we operate in more than 170 countries and regions, serving more than three billion people around the world. Our vision and mission is to bring digital to every person, home and organization for a fully connected, intelligent world. To this end, we will drive ubiquitous connectivity and promote equal access to networks; bring cloud and artificial intelligence to all four corners of the earth to provide superior computing power where you need it, when you need it; build digital platforms to help all industries and organizations become more agile, efficient, and dynamic; redefine user experience with AI, making it more personalized for people in all aspects of their life, whether they’re at home, in the office, or on the go. Lossless EthernetZero packet loss for local and long-distance transmission. Convergence of computing and storage networks. Full Lifecycle AutomationAutomation of planning, construction, maintenance, and optimization. Intent-driven networking, enabling network servitization. Network-Wide Intelligent O&MNetwork-wide intelligent Operations and Maintenance (O&M) of devices, interfaces, and optical modules. Predictive and proactive maintenance, ensuring zero service interruption. Enquiry

Dahua

About DahuaZhejiang Dahua Technology Co., Ltd. is a world-leading video-centric smart IoT solution and service provider. Based on technological innovations, Dahua Technology offers end-to-end security solutions, systems, and services to create values for city operations, corporate management, and consumers. With more than 16,000 employees all over the world, Dahua solutions, products, and services are used in over 180 countries and regions. Dahua has 54 subsidiaries and representative offices globally covering Asia, the Americas, Europe, Middle East, Oceania, Africa, etc. With its surveillance solutions, Dahua delivers unparalleled quality, reliability and stability. Enquiry

Citirx

Lenovo

About LenovoOur story began more than three decades ago with a team of eleven engineers in China. Today, we are a diverse group of forward thinkers and innovators in more than 160 countries, constantly reimagining technology to make the world more interesting and to solve tough global challenges. We are dedicated to transforming our customers’ experience with technology—and how it, and they, interact with the world around us. We call this Intelligent Transformation. We are setting the stage for what’s possible with technology shaped by Augmented Intelligence, capable of enhancing and elevating human capability. NetworkingInteroperable, high performance, great value. High-performance ethernet and converged networking switches offer great value. Scale your business with Lenovo networking switches that are built for modern data centers. Ethernet Switches for FlexGet on-demand scalability and flexible port mapping for dynamic configuration of active ports in these industry-standard ports, which offer simple interoperability with existing networks. ServersThe heart of the data center. Drive your business forward with a server that matches your needs. Reduce costs and complexity by investing in a system that handles today's workload and expands to accommodate future growth. Enquiry

Huawei

Who is HuaweiFounded in 1987, Huawei is a leading global provider of information and communications technology (ICT) infrastructure and smart devices. We have more than 194,000 employees, and we operate in more than 170 countries and regions, serving more than three billion people around the world. Our vision and mission is to bring digital to every person, home and organization for a fully connected, intelligent world. To this end, we will drive ubiquitous connectivity and promote equal access to networks; bring cloud and artificial intelligence to all four corners of the earth to provide superior computing power where you need it, when you need it; build digital platforms to help all industries and organizations become more agile, efficient, and dynamic; redefine user experience with AI, making it more personalized for people in all aspects of their life, whether they’re at home, in the office, or on the go. Lossless EthernetZero packet loss for local and long-distance transmission. Convergence of computing and storage networks. Full Lifecycle AutomationAutomation of planning, construction, maintenance, and optimization. Intent-driven networking, enabling network servitization. Network-Wide Intelligent O&MNetwork-wide intelligent Operations and Maintenance (O&M) of devices, interfaces, and optical modules. Predictive and proactive maintenance, ensuring zero service interruption. Enquiry

Sangfor

About SangforSangfor Technologies is a leading global vendor of IT infrastructure solutions, specializing in Cloud Computing & Network Security with a wide range of products & services including Hyper-Converged Infrastructure, Virtual Desktop Infrastructure, Next-Generation Firewall, Internet Access Management, Endpoint Protection, Ransomware Protection, Managed Detection and Response, WAN Optimization, SD-WAN, and many others. Sangfor takes customers’ business needs and user experience seriously, placing them at the heart of our corporate strategy. Constant innovation and commitment to creating value for our customers help them achieve sustainable growth. Established in 2000, Sangfor currently has 6,500 + employees with more than 60 branch offices globally in exciting locations like Hong Kong, Malaysia, Thailand, Indonesia, Singapore, Philippines, Vietnam, Myanmar, Pakistan, UAE, Italy, and the USA. Production LineThe integrated architecture design of the Thin client ensures the system reliability of long-term operation in harsh factory environment. Dramatically improve the production efficiency. and the production efficiency. Solution provide peripherals and data security control policy to prevent data leakage. Student Computer LabCloud can greatly reduce the workload of PC operation and maintenance in classrooms, and support cross-platform resource sharing for mobile teaching preparation, creating a new information education model. OfficeSangfor aDesk can realize rapid deployment and efficient operation...

Aruba

Why Aruba?Aruba has repeatedly been recognized by third party analysts as a leader in Wi-Fi 6, switching, SD-Branch, and a visionary in Data Center networking. The world’s largest companies rely on us to provide a secure, AI-powered edge services platform that spans across campus, branch, data center, and remote working environments. A single OS for simplicityDeliver a consistent operator experience, simplify network design, and unify management by giving IT the flexibility they need to deploy the same hardware and software, from edge access to data center. Automation to improve efficiencyLeverage the agility of cloud-native software, promote programmability, reduce manual tasks, and enjoy error-free configurations. Enable always-on networks — even during upgrades. Faster troubleshootingGet real-time, network-wide visibility with Aruba Network Analytics Engine (NAE) so you can troubleshoot and resolve issues before users and business are impacted. Enquiry

CISCO

NetworkingOur networking solutions take a software-delivered approach to automate and assure services across your WAN, campus, and branch networks. Cisco DNA SoftwareUnlock policy-based automation, secure connectivity, end-to-end visibility, analytics, and assurance in your network. Cisco DNA Software for SD-WAN and RoutingSimplify your WAN architecture. Make the WAN easier to deploy, manage, and operate. Cisco DNA Software for SwitchingSimplify your WAN architecture. Make the WAN easier to deploy, manage, and operate. Cisco DNA Software for WirelessDeliver exceptional wireless performance for high-density environments. Get end-to-end visibility and remediation guidance. Cisco MerakiDeploy smart, cloud-managed IT solutions that make life simpler. Cisco KineticGet the right IoT data to the right applications at the right time--securely. Enquiry

Nutanix

What We DoWe strive to delight customers with a simple, flexible, and cost-efficient cloud platform, one that offers freedom of choice and enables true hybrid and multicloud computing. How We Do ItNutanix leverages its industry leading, 100% software-defined hyperconverged infrastructure to provide a single cloud platform that seamlessly brings to life your hybrid and multicloud strategy. Whether on-prem or in the cloud, you get unified management and operations with one-click simplicity, intelligent automation, and always-on availability. Enquiry

H3C Malayasia

VMWare Malaysia

Veeam Malaysia

Veritas Malaysia

APC Schneider Electric

Commvault Malaysia

Avaya Malaysia

Synology

Field Map

IFER – Monitoring & Mapping SolutionsField-Map – Tool for Computer Aided Field Data CollectionDevelopment and services activityField-Map technology (development, selling, technical support, etc.)Data processingServices (mapping, inventory, other data collecting)Hardware and software developing, (re)selling and maintenanceFeaturesStatistical forest inventory (from regional up to national level)Monitoring (forest monitoring, carbon offset monitoring, etc.)Yield tables, growth function, tree assortmentPermanent and temporary research plotsEcosystem processes and functionsGIS and remote sensingForest management and planningGame ecologyHow Does It Works:FM Project ManagerFM Data CollectorFM Inventory AnalystFM Stem Analyst

Enquire Now