sb-as logo
Story image

Exclusive Networks ramps up security offering with Singapore lab

Exclusive Networks Singapore has launched its Cyber Attack Remediation Mitigation (CARM) Lab in Singapore, offfering resellers and end users the chance to learn about attack trends and tactics.

The new lab builds on the distributors CARM cybersecurity platform, which integrates ‘disruptive and innovative’ cybersecurity technologies and solutions for internal and external business threats.

Geraldine Teo, Exclusive Networks Singapore country manager, says the lab will enable Exclusive Networks to provide a hands on, interactive experience for customers and partners.

“As a company, we’re constantly striving to work with market leading vendors to provide innovative solutions and technologies and we hope that the CARM Lab will be an effective way to bring these technologies to market and help our customers to get the most out of their security strategies, while also setting Exclusive Networks – and our resellers – apart from the competition,” Teo sys.

Exclusive Networks says the CARM Lab will include personalised state-of-the-art solutions showcases, ranging from business centric to technical deep dives, to highlight how the distributor and its CARM portfolio can assist with cybersecurity strategies.

“The Carm Lab’s facilities will give visitors the opportunity to acquire knowledge relating to all the latest attack treends and tactics and assist them in building a fortified IT business architecture that will withstand today’s increasingly complex and evolving threat landscape,” Exclusive says.

“Working under collaborative conditions, experts will share practical advice and even work alongside visitors on their real world cybersecurity strategies.”

Says Teo “Many businesses are forced to sacrifice innovation because of security concerns.

“With CARm’s extensive portfolio, we harness the most advanced cybersecurity solutions and allow businesses to digitalise with confidence.

“The Lab will give us a chance to demonstrate how, having the trusted support, tools and strategy in place for cybersecurity can open up many doors in terms of future digital enablement and growth.”

Story image
Report reveals relationship between boardroom and cybersecurity investments
“While boards are definitely listening and stepping up with increased budget for cybersecurity, they tend to view any investment as a cost rather than adding business value."More
Story image
Entrust launches cloud-based ID issuance solution
The Sigma instant ID solution uses encryption, trusted HSM technology and secure boot to issue highly secure physical and mobile identities.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More
Story image
Secureworks: Remote working exposes new security vulnerabilities
New vulnerabilities have been exposed as IT teams across the world respond to the ongoing COVID-19 pandemic.More