FutureGov Singapore Forum 2014

2014-08-28

i-Sprint participated in the FutureGov Singapore 11th Annual Forum as one of the sponsors for this event. It was held on 22nd April 2014 in Marina Bay Sands, Singapore.FutureGov Forum focused on how future IT trends will solve key Information and Communications Technology ICT business challenges. This forum provided a gathering point for more than 350 senior civil servants from Singapore Public Sector to interact and collaborate with their local and international counterparts and the leading industry experts from over 14 different states and countries.The forum gave i-Sprint great brand exposure and presented a platform for i-Sprint to understand the needs of the public sector in information security, information management, mobility and cloud computing solutions.

Read more

i-Sprint featured on Network World Asia

2014-08-27

On 10th June, i-Sprint and its End-to-End Encryption E2EE solution are being mentioned on Network World Asia website. This article mainly explains how i-Sprint’s E2EE solution is able to address vulnerabilities such as the Heartbleed bug. Additionally, it was also written that i-Sprint’s AccessMatrix™ UAS platform is able to strengthen clients’ confidence and integrity of access across business e-channels by the establishment of a framework of trust based on effective and rapid responses to exploits.

Read more

Why end-to-end encryption holds the key to trusted clouds

2014-08-27

Whether dealing with public cloud providers or on-premise virtual private clouds or with partners and end users, the notion of trust must be at the center of managing many-to-many relationships in the cloud. For this to happen, businesses must first gain greater clarity on the levels of security offered by different cloud service providers CSPs.E2EE preserves both data confidentiality and integrity, a critical element of the trusted cloud, by preventing intermediaries, such as cloud or internet service providers from tampering with the data. E2EE secures the channel between the client’s access device and a hardware security module HSM located in a physically secure location within the organization. So, passwords and other sensitive data are encrypted at the client’s access device and can only be decrypted for verification by the HSM and not even the organization’s applications and servers.“Our proven end-to-end encryption for Transaction Data and Password Protection solution has been designed to address the potential data leakage vulnerabilities in web servers and on the network, i-Sprint’s CEO, Albert Ching, says.

Read more
TOP