Day: May 19, 2022

12 Ways IT and OT Can Coexist in the Philippines

The coexistence of IT (Information Technology) and OT (Operational Technology) in the Philippines does not only mean the convergence of technology. Rather it brings together people from different domains to sit together and plan for the future. IT and OT both have fairly different networks. Hence, converging them does not only mean bringing and sorting a few desks together or scheduling meetings together.

The IT field deals with information as it adopts a business-oriented approach while the OT field deals and interacts with machines as it adopts a machine-oriented approach. Basically, both the fields have a difference of day and night between them!

It is definitely a huge challenge to bring together IT and OT, especially in a country like the Philippines. IT and OT industries in the Philippines have been booming. Therefore, the amalgamation of both fields would mean BUSINESS!

The Philippines is slowly and gradually becoming a hub of outsourcing. People from all over the world are outsourcing their IT and OT projects to the Philippines. Hence, both industries are flourishing at a rapid rate. The BPO industry in the Philippines is geared up to generate over 1.3 million jobs. Moreover, both sectors have full support from the government of the Philippines.

So, having read about the importance of IT and OT in the Philippines, let’s have a look at 12 ways through which it becomes possible to bring together IT and OT here. Here we go:

  1. Uniting Two Different Languages

As IT and OT both are different fields, their respective languages are different as well. The terminology is different. Hence, uniting two different languages would make it easier for the coexistence of IT and OT.

For example, CIP vs. SIP (both pronounced as sip but meanings are different). In the OT industry, CIP stands for Common Industrial Protocol which means having a protocol for automating industrial processes, controlling, safety, configuration, etc. However, in the IT industry, SIP stands for Session Initiation Protocol which means having a protocol that starts, maintains, and terminates real-time voice and messages.

So, if both the languages, the terminologies, the jargon, and the acronyms are collected in the same place, the task would become easier for the coexistence of IT and OT.

It is definitely hard but not impossible!

  1. Bringing Together the Diverse Cultures

IT and OT both have been present here for a lot of time. Therefore, the IT and OT cultures are quite diverse and profound. IT puts focus on the security of the offices and accessibility as it has been the custodian of ethernet technology for years now. OT focuses on reliability, availability, and quality.

Basically, both the fields had the requirement of different skillsets. Nonetheless, IT and OT convergence is changing that!

It is very much possible for both the groups to unite together. Nonetheless, honesty and patience are the keys to clearing the questions and truly understanding the connection between IT and OT.

  1. Cooperating with Each Other

A number of times, groups often oppose each other for several reasons. In short, they are adamant about not working together. The idea of one group being too dominant over the other is actually dangerous for coordination. Therefore, it creates rifts between the groups, and working together becomes harder.

In a bid to align IT and OT, the manufacturing and industrial sectors would need a person to step up in order to bring into line the priorities, engaging everyone to work together diligently. This single person would act as a third party and would not take any sides. The same person would have to represent both sides. Therefore, it is necessary for him/her to have knowledge in both fields.

The person must be able to persuade people from both sides in order to initiate cooperation.

  1. Fully Understanding the Meaning of Convergence

It is vital to understand that remaining on the same page in terms of IT and OT convergence is necessary!

Convergence does not mean that everyone would have equal accessibility to everything. When IT and OT are converged, the decisions would be based on mutual agreements. However, there will be dozens of challenges in converging both fields. It is not as simple as connecting two domains.

Through IT and OT convergence, you will have the benefits of IoT and process automation. You will be running after similar objectives to make sure that the convergence has proven to be fruitful.

In the end, a thorough convergence would ensure running a single system and managing it only.

  1. Faithful in Making the Convergence Works

It is all in your mind! If you believe you can do it, then no force can stop you from doing it!

Convergence is definitely very helpful in providing several benefits. In order to analyze the benefits, start with a pilot project or opt for some projects in which both IT and OT can work together. Slowly and gradually, build trust in the process, the team members, and your own approach, and then witness the feedback.

Plus, make sure to not get annoyed if any of the trials fail. Every member of the team must be ready for hiccups, mistakes, and total failures. Also, draw an insight regarding how the issues would be resolved.

  1. Converging the Process

Converging the process means aligning the workflows of both IT and OT. The IT and OT platforms must be able to modify their processes in order to accommodate each other while making sure that projects are communicated in the right manner. Newly converged technology would definitely take some time to prove its mettle. However, over time, you would realize that it was actually the right decision.

  1. Communicate Goals and Strategies

The best part about the convergence of IT and OT is that the communication of goals and strategies would make the job easier and faster. Developing a clear picture of the goals, discussing with each and every member, and ensuring that everyone understands the challenges and benefits of convergence are key to success. Nonetheless, it is important to make sure that members of both groups are equally participating in the discussion in order to avoid problems in the future.

  1. Defining Roles and Objectives

As two different groups are being amalgamated, the first and foremost task is to define the roles and objectives of each and every group member. The responsibilities must be assigned according to the skillset of the members. Moreover, both the IT and OT team members should get an equal amount of work.

There should not be any sort of discrimination if the idea is to keep both groups converged triumphantly.

Plus, apart from assigning the duties, there should be an initiative to keep the teams together. Also, the focus should be on providing opportunities to collaborate so members can easily gel together.

  1. Make Use of the Accurate Tools

In every domain, the use of appropriate tools is extremely important. IT and OT teams do require tools to communicate with each other. Moreover, deploying accurate tools make sure that there is enough visibility on what is happening around the ongoing projects. Visibility is very important so that all the functions remain under the scanner and nothing could escape from the eyes.

  1. Train the members of both IT and OT Groups

Training is very important, no matter wherever you head! Training the members would create a new atmosphere for convergence where everything would happen in a sustained manner. Through cross-training, the members of the IT group would know the expectations of the OT group and vice versa.

So, both the groups would work hand in hand without making problems amidst any important project.

  1. Keep a Check on the Flow of Data

When IT and OT groups are brought together, the check on the flow of data becomes imminent. You must be able to identify the devices from which the flow of data has originated. Plus, with a number of IT and OT devices passing through your network, it is very important to know their actual location.

Therefore, if you know the actual location, you will be able to identify and eliminate the vulnerabilities.

While eliminating vulnerabilities, the basic aim should be to have a completely secured coexistence of IT and OT.

  1. Integration with Existing Systems

The coexistence of IT and OT is only possible through the integration of existing systems. It is not fully possible to completely replace all the previous systems in order to create adaptability among IT and OT systems. Hence, the task should be to bring together IT and OT and integrate them with existing systems.

By adopting this approach, you will be able to cut down a lot on costs. Moreover, the main agenda of coexistence is to do more with less!

The Bottom Line

So, the above-mentioned are the 12 fruitful ways of making IT and OT coexist in the Philippines or in every other country in the world. Basically, the approach always remains the same. Nowadays, the convergence of IT and OT can deliver a number of benefits for organizations. So, coexistence must be looked forward to!

Buyers Guide: Why Your Philippines Business Needs Cybersecurity Insurance?

Cyber threats are costing the Philippines’ businesses a huge amount of money. Therefore, a complete cyber insurance policy is a MUST in such situations. One report by Microsoft Philippines last year highlighted cyber threats that would go to hit around $3.5 billion in a single year.

The Insurance Commission (IC) said that the breaches in data privacy are the actual risks. Hence, the Philippines’ businesses should opt for a cybersecurity insurance policy. He further added that dealing with cyber attacks and breaches must be a part of a company’s risk management plan.

Moreover, talking about the industries that require cybersecurity insurance, Insurance Commissioner Dennis B. Funa said highlighted BPO (Business Process Outsourcing) as it mainly deals with a huge amount of data. Hence, the BPO industry requires the greatest protection against cyber threats.

Nonetheless, the BPO industry has not fully understood the intensity of the time and there’s a very low take-up of cybersecurity insurance policies as of now! It’s totally alarming at this point in time!

In November 2021, a lot of people got to know that their personal information was breached because of a ransomware attack on S&R Membership Shopping which is a warehouse club located in the city of Paranaque.

According to Manila’s National Privacy Commission, personal details such as name, phone numbers, or birthdate were revealed to the hackers. However, bank information was somehow preserved. So, the authorities are constantly working to improve the cyber environment in the Philippines.

Since mid-2020, there have been several cyber-attacks on the Philippines’ small and mid-size businesses. These attacks have caused the breach of the personal databases of the customers with companies bearing huge losses around US. $500,000 to US. $1 million.

Importance of a Cybersecurity Insurance

Cybersecurity insurance makes sure that your company fully recovers after a data breach or a cyber-attack. The insurance company would reimburse the costs like equipment damage, legal help, forensic examination, time loss, revenue loss, or costs related to business disruption. Moreover, an insurance company anticipates such cyber-attacks.

Therefore, they inform you in prior so that you are able to fight back at the right time without any major delay. Hence, cybersecurity insurance plays a crucial role in today’s dicey digital environment. A wide variety of businesses should opt for cybersecurity insurance before it is too late!

Why does Your Philippines Business Needs Cybersecurity Insurance?

After acknowledging the important details about the condition of businesses in the Philippines in terms of cybersecurity while understanding the importance of a cybersecurity insurance policy. Let’s have a broader look at why your Philippines business needs full-fledged cybersecurity insurance. Here we go!

  • Loss of Data

During a data breach, the sensitive information of the clients is compromised. In the Philippines, 43% of the companies took the help of cybersecurity measures in order to prevent data loss. As we all know that Filipino population is becoming more and more tech-savvy with each passing day. Hence, the need for cyber insurance has grown multifold. In 2016, the Philippines Election Commission suffered a major cyber-attack as it was the biggest data leak in the history of the Philippines. The sensitive data related to 70 million voters was compromised. Another study in 2019 highlighted that if the cybersecurity conditions are not improved in the country, the Philippines would have to be ready to face a loss of $3.5 billion.

However, during the pandemic, the cybersecurity conditions drastically improved. A survey was conducted in 2020 which stated that 43% of the businesses in the Philippines have become more active in investing in cybersecurity insurance.

Loss of data is still a huge cause of concern for the improving digital economy of the Philippines. A loss of data occurs, and the company is responsible for the breach no matter where the data is kept.

So, it is important that you keep a regular check on the places where sensitive information is stored.

Nonetheless, if a data breach occurs, a cybersecurity insurance policy would put efforts into the retention of the data. Plus, the insurance policy would also account for the defense mechanisms such as responding to the cyber threats and lending a hand to the investigators.

  • Loss of Devices

Today, everything happens through a small, portable, yet so powerful mobile phone. Apart from mobile phones, laptops are the primary devices used in companies. In the Philippines, mostly the workforce uses similar devices to operate in their companies.

So, when such devices are left on the premises of the company, it becomes very easy to hack or steal these devices. Nonetheless, it is not possible to fully protect the devices and prevent the loss of devices, but you can organize limited information on such gadgets.

Companies in the Philippines are now investing a lot in cybersecurity measures. For example, an allocation of 86% for anti-malware and antivirus tools, 59% for firewalls of the next generation, and 47% for cloud security tools have been invested in order to prevent any major or minor breach.

The important markets for cybersecurity insurance in the Philippines are the Philippine government, BPO industry, educational industry, telecommunication firms, health, and financial sectors. These industries are extremely vulnerable to the loss of devices and data breaches.

Therefore, the primary task is to safeguard all such industries for the betterment of the Philippines on whole.

Using effective passwords, placing two-factor authentication, and placing fingerprint access to all the devices would really help the companies to fight back against cyber threats. Moreover, sensitive and private information should not be stored on a laptop. Instead, encryption must be made mandatory.

Nonetheless, if a breach occurs then according to the cybersecurity insurance policy, the business would be compensated through Network and Information Security Liability coverage. Such coverage provides prevention from unauthorized access to devices or sensitive information with funding to cover the costs of lost devices such as laptops or mobile phones.

So, the businesses in the Philippines really need to step up their game and get cybersecurity insurance immediately.

  • Businesses at Risk

Several businesses in the Philippines are at a major risk of cyber threats due to which a number of businesses have winded up their operations within the country. In order to tackle the risk, cybersecurity insurance has literally become a mandatory thing to opt for before anything big happens.

The small and medium-sized businesses (SMBs) in the Philippines that went digital due to the pandemic are experiencing constant cyber-attacks, a study by Cisco Systems, Inc highlighted. Mainly, SMBs are the victims of such cyber-attacks. Therefore, a need for cybersecurity insurance is there!

Juan Huat Koo, director of Cisco for cybersecurity mentioned that as the SMBs are going digital due to the pandemic, the attackers are becoming more and more active in targeting the vulnerable areas. Moreover, when the companies go digital, they produce more data than before. So, concerns increase even more!

Around 77% of the SMBs have conducted surveys to find out the main reasons for the cyber-attacks. Every analysis indicated a number of feeble entry points that helped the hackers to breach into the systems with total ease. Hence, around 82% of SMBs have grown more conscious of cyber threats.

Robin Llamas who is Cisco Philippines’ managing director officer-in-charge mentioned that SMBs need to take immediate action to stop such cyber-attacks in order to avoid big losses. He further added that when the hackers spend a lot of time in the system, they automatically have the advantage to steal more and more data.

In order for businesses to reduce or eliminate risk related to cybersecurity, the first and foremost task is to get a cybersecurity insurance policy that not only deals with the aftermath of the incident. Rather it helps businesses throughout their journeys to combat cyber-attackers.

  • Cyber Risks are Evolving

The major problem of cyber-attacks is that they never remain safe. The art of cyber theft is constantly evolving. As technology is evolving, the methods of cyber-attackers are also evolving. In the Philippines, 7,000 ransomware attacks were inflicted on businesses in 2020 with web threats increasing to 59 percent.

Cyber-attackers are extremely interested in the cyber environment of the Philippines. As the attacks are evolving, the task has become extremely hard to improve cybersecurity on the daily basis. Hence, there is a huge need for implementing a cybersecurity insurance policy so that businesses in the Philippines remain on the safe side.

Phishing scams, unsolicited emails, ransomware attacks, and internet frauds are quite common in the Philippines. Nonetheless, the hackers are regularly adapting to the modern day’s needs as they are upping their game at every stage. So, getting cybersecurity insurance for businesses in the Philippines should not be an option but rather a requirement.

The Bottom Line So, here we have come to an end where we discussed the need for implementing cybersecurity insurance in businesses in the Philippines. As the country is adopting fresh and newer digital technologies, the requirement for strengthening the system has grown even more. It has become a priority to safeguard the systems right at the moment in order to avoid any major losses.

Hyperscale Cloud: Why the Philippines Will Be Talking About It Soon

The Philippines is all set to become the next hyperscale hub and it is definitely a great opportunity for the internet users in the Philippines. Hence, the Philippines is the talk of the town in terms of hyperscale cloud.

In the Philippines, the number of internet users is huge! Around 73.9 million Internet users are seeking opportunities as the Philippines ranks second in data center evolution which is massive, to say the least, among Southeast Asian countries. This is nothing in front of the growth which is going to be witnessed in the coming 3 to 4 years. According to Philippine Trade Secretary Ramon Lopez, the data centers in the Philippines would grow by around 24 percent in the coming time.

Also, the spending on cloud services in the Philippines is expected to grow from US$1.8 billion in 2020 to US$2.6 billion in 2024.

The hype around Hyperscale Cloud

Hyperscale is basically the ability of the architecture to scale down in the right manner in order to accommodate the growing demand which is added to the system. Hyperscalers are the enterprises that make sure to provide seamless delivery so that a scalable cloud could be built. Such popular enterprises are Amazon AWS, Google, and Microsoft.

The hype around hyperscale cloud is genuine because it helps in meeting the increased demand.

Moreover, it is cost-effective, accessible, fast, and reliable. Hence, the demand for hyperscale clouds is increasing day by day. A few key benefits of hyperscale are given below:

  • Speed: In terms of speed, hyperscale has left every other technology behind. Plus, for the exceeding computing needs these days, hyperscale cloud is necessary to adopt.
  • Little to no downtime: Downtime is the talk of the past. With hyperscale, there is little to no downtime due to increased demand or other problems.
  • Improved efficiency: The extra layers of control are reduced in hyperscale which means the computer operations would be easy to handle.
  • Digital Transformation: The digital transformation in the hyperscale cloud is extremely nonchalant.
  • Scale: Hyperscale helps you to scale up or scale down, depending on the demand.

Importance of Hyperscale Cloud

Today, the demand is exceeding every minute. Hence, there should be a technology to meet the ever-growing demand while taking benefits from the multi-cloud platforms to match the demand, promoting the business growth. Hyperscale cloud provides the opportunity to reduce downtime and stay connected, eliminating all sorts of disruption.

Moreover, the hyperscale cloud connects all the regions in the world through undersea connections.

Hence, the Philippines is one of those regions that has simplified getting connected to the entire world through undersea technology as well as through other solutions.

So, the Philippines is without a doubt, the go-to place for the hyperscalers.

Surely, the Philippines is going to be the next hyperscale hub. But why the Philippines? That’s the question!

Why the Philippines is going to be the next Hyperscale Hub?

Well, there are a number of factors due to which the Philippines is potentially strong enough to become the next hyperscale hub. The economic situation in the Philippines is improving which is a positive sign for the investors and the enterprisers. Moreover, the digital know-how is also captivating in the Philippines.

Also, digital growth has been a major factor in developing the interest of the hyperscalers in the Philippines.

The Internet economy is madly boosting in the Philippines. Therefore, internet users have multiplied in the past few years. Gary Ignacio who is the vice president and head of Strategic Business Development at PLDT Enterprise says that in 2025, internet users in the Philippines would increase to 90 million which is a BIG number!

Currently, the market opportunity is to capture the local presence and deploy cloud regions in the Philippines as much as one can in order to cater to the growing demand with a great chance to earn profits.

  • Suitable Location

The best part about the Philippines is its location for the hypescalers. The strategic location of the Philippines offers accessibility to host content and transmit data across Southeast Asia and other bigger Asian Pacific regions. Hence, enterprises are looking forward to adding cable systems, considering the supreme location of the Philippines.

Gary Ignacio stated that their team is adding around 16 cable systems. Moreover, in the coming years, they will look to add more. Plus, he highlighted the Jupiter subsea cable system which is commendable to connect the US and the Philippines, creating a trans-pacific link, for example.

Cable systems such as ADC and Apricot will go live within the next 2 to 3 years in order to bolster Inter-Asian connectivity. Hence, in order to cater to the growing number of cable systems, enterprises are also launching landing stations to ensure smooth connectivity. The hyperscale customers will be looking for such resilience offered through the landing stations.

  • International Connectivity

International connectivity is also a big cause for the next hyperscale hub in the Philippines. The Philippines offers continuous connectivity opportunities to worldwide data centers, without even a single hiccup. Resilience is offered and the providers in the Philippines are riding peacefully, thanks to this factor.

The data centers in the Philippines are carrier-neutral which means diversity is offered and connectivity is made simpler.

The international carriage capacity is also increasing due to a huge number of data centers. Undersea global partners have helped to develop such connections that make sure to connect several countries all at once.

The Philippines is becoming an excellent cloud region for exploring prospects. Moreover, the improvement in the digital economy of the country will by default assist the growth of cloud usage. One should not forget that the Philippines is one of the biggest Information Technology – Business Process Outsourcing (IT-BPO) markets in the world with BPO companies opting for cloud-based solutions, the Philippines’ market is going to be a sure-shot winner in the coming days!

  • Improved Industry

The government of the Philippines has also noted the increased demand for hyperscale clouds. Therefore, they are also offering opportunities to the companies to expand their cloud operations here. Hence, PLDT, last year announced that they will build the biggest data center in the Philippines.

Ignacio added that they will make sure to build a state-of-the-art data center that would comply with international standards. He also said that they will create a very unique hyperscale design for the data center.

Ignacio happily stated that the Philippines government has identified hyperscale data centers as the main industry sector. So, when the government itself is classifying the importance of hyperscale data centers, it is definitely a win-win situation for the companies. As the government of the Philippines identifies hyperscale cloud, there will be several tax breaks and government incentives to help this sector to grow even more.

Ignacio was enthusiastic to learn about the current and upcoming IT environment of the country where users are developing wired and wireless connections, seeking arrangements from PLDT and several other enterprises and developing the digital future in the Philippines.

The conditions in the country are quite welcoming for enterprises, looking to expand around the area of hyperscale cloud. The government of the Philippines is supporting them at every stage in order to set a positive environment to further increase growth.

Also, the government is providing relaxation in relevant laws and rules, data privacy, security, and other related departments so that the enterprises face no difficulty in working here in the Philippines as it would only help the economy of the country.

  • Growing BPO Sector

As mentioned above, the BPO sector in the Philippines is drastically improving and growing. The Philippines is amongst the biggest BPO leaders across the whole world and will be increasing at a rapid pace in the coming times.

Hence, it has driven the demand for Artificial Intelligence (AI) and cloud which is a shift caused due to the remote working setup of the companies where they seek to acknowledge the needs and demands of the customer through an online journey.

Enterprises are moving towards the cloud with vertical applications and hybrid operations in an effort to expand networks through fiber and 5G technology, led by the PLDT company in the Philippines. By 2025, the cloud market in the Philippines would grow to US$ 2.8 billion which is a massive figure, undoubtedly.

The Philippines has become one of the best outsourcing locations in the world. The country is offering amazing education, a hospitable culture, opportunities to grow, and a welcoming government. Hence, outsourcing cloud work here could be a great move as with all these advantages, low price is also a factor to remember.

The Bottom Line

Towards the end, we need to realize that hyperscale is not PERFECT! There could be a few hiccups with this sort of technology. Nonetheless, in the Philippines, the major enterprises are working hard to make the technology super-fast and highly adaptable to all users. The increased number of internet users require hyperscale cloud in order to smoothen their experience.

The speed and agility offered through hyperscale solutions are unimaginable. Moreover, the enterprises are also working hard to reduce carbon footprint which is again a huge positive for this technology. By 2030, the technology would achieve carbon neutrality, getting rid of carbon emissions.

IT (Information Technology) and OT (Operational Technology)

Manufacturing is a huge industry in Malaysia. It deals with both the fields; IT and OT. IT is basically all about digital information, network storage, cloud computing, and data-related hardware and software.

Whereas OT encompasses the systems that keep a check on the operations of physical equipment such as machines, devices, plants, and pumps. Both fields need to work together in order to bring laurels to the manufacturing industry in Malaysia.

However, due to risks regarding cybersecurity and a couple of other reasons, it is quite hard to bring both groups on the same page. Nonetheless, there is a need to bridge the gap so that IT and OT come together to create a full-fledged smart manufacturing industry.

The aspect of cybersecurity in IT and OT is essential because Malaysia has been flourishing really fast in the digital world. Due to the rapid popularity of digitalization in Malaysia, the risks of cybersecurity are also maximizing thereby. Hence, the convergence of IT and OT in manufacturing come across the challenge of cybersecurity at the forefront.

So, in this article, we will try to find out how to bridge the gap between IT and OT in manufacturing while dealing with the risks of cybersecurity in Malaysia.

Without any further ado, let’s delve in!

Role of IT and OT in Manufacturing and the Risks of Cybersecurity

Cybersecurity has been a priority for Malaysians across all the major sectors, emphasizing a lot on the manufacturing industry. In order to understand the interest of the government of Malaysia in cybersecurity, you can assume from their allocation of US$434 million to prepare for the upcoming challenges posed by cyber-attackers to strengthen the country’s cybersecurity.

Malaysia Cyber Security Strategy (MCSS) launched the program for the years 2020-2024.

Understanding IT in Manufacturing

  • What is IT?

IT in manufacturing is about transactional processes and includes a data management component, for example, a database. So, the data that is included in such storage and retrieval activities are mainly based on IT.

Deploying an IT Infrastructure in Manufacturing Industry

Basically, IT infrastructure falls into 3 major categories; system infrastructure, network infrastructure, and storage infrastructure.

  • System Infrastructure:

System infrastructure deals with a wide variety of critical actions. It encompasses the management of all the IT assets within the data centers. For all such tasks, a chief technical officer (CTO) is in-charge.

  • Network Infrastructure:

Network infrastructure makes sure that the configuration of all the linked networks is working fine and all the applications are having continuous access to the resources, ensuring that the network is safe.

  • Storage Infrastructure

Lastly, storage infrastructure is responsible for keeping safe all the important assets of the manufacturing industry.

In order to broaden the study of the IT infrastructure in the manufacturing industry, the categories are further divided into 5 main components. So, let’s discuss them NOW:

  1. Computer Hardware Platforms

All the tangible components of the infrastructure like computers, servers, cybersecurity tools, boosters, routers, repeaters, wires, supplies, or cooling units make up the computer hardware that ensures the use of the IT environment.

  1. Operating Systems Platform

This is the platform that deals with the interface of hardware with software, middleware, and the application layers of the IT infrastructure. Operating systems are the main components that enable the users to operate the hardware.

  1. Software Applications

The IT infrastructure mostly consists of physical components but it might extend to a few software applications as well. It consists of both enterprise-level software like Oracle, SAP, or Microsoft and client-level applications that take advantage of the enterprise layer. A number of layers of software combine in order to make the hardware intelligent, thereby performing actions like calculation, interaction, and even cognizance.

  1. Data Management and Storage

Data management and storage act as the main areas in the IT infrastructure. It basically deals with the storage of data and performs the actions like an oversight. Moreover, it handles the physical components as well like data servers. Plus, it handles software components like database management systems that are used to organize databases.

  1. Networking And Telecommunications

The networking and telecommunications of a manufacturing industry come under the domain of IT infrastructure. It deals with everything from virtual network software to modems, routers, or wires. Plus, it also includes the infrastructure linked with internal and external servers that are responsible for hosting cloud-oriented applications and websites.

Understanding OT in Manufacturing

  • What is OT?

OT is a group of computing systems that deal with managing, monitoring, and controlling the physical objectives of the operations in the manufacturing domain. Several OT activities include controlling the environment settings, keeping a check on infrastructures, or assigning tasks to the robots available on the manufacturing floor. OT is commonly used in the manufacturing industries.

Talking about OT data, it encompasses the raw data received from sensors, devices, and tools for further processing. The OT data provides information regarding controlling the processes within manufacturing workflows. This information is processed further to take help in decision-making.

How to Set an OT Infrastructure in Manufacturing?

OT systems are the core of OT/IT solutions that manufacturers require to promote production effectiveness to reach the targeted revenue. The cybersecurity challenges disrupt the IT/OT convergence. Hence, there is a need to plan and build the OT infrastructure in such a way that the environment remains secure.

Down below is the personalized 8-step approach to planning your OT infrastructure for manufacturing:

Step 1:

Develop policies that are matching to the OT environment of your manufacturing organization.

Step 2:

Identify the level of complexity in the OT environment through the following ways:

  • Keeping a check on the production process.
  • Monitoring and supervising the production process while lending automatic control.
  • Managing the workflow in order to obtain the desired results while maintaining the records and optimizing the production process.

Step 3:

Have a look at the IT and OT convergence points. Every floor in the manufacturing industry comprises an overlapping branch. Hence, it is essential to identify that particular branch to chart them accurately.

Step 4:

OT will help you to identify a huge amount of data when connected to the tools that are capable of drawing these inferences. Hence, the OT/IT convergence should be made easier for the final data parsing manufacturing tools and devices.

Step 5:

In this step, the workflows must be established in order to maintain change management, obsolescence management, and disaster management. The OT asset management is responsible for compliance with the laid standards and protocols.

Step 6:

In step 6, training and workforce development are critical to equip the necessary skills in the workers in order to manage the OT environment. Training is very much needed so that security is ensured and workflow is never hindered. The training must take place in a modern, fully-equipped arena for better learning.

Step 7:

Setting up and maintaining the OT environment is another effort that ensures smooth operations within the manufacturing industry.

Step 8:

OT infrastructure requires help and assistance from leaders that have already worked really well in their personal space. Business leadership is always critical and therefore, the results are actually seen in the outcomes.

Why Cybersecurity Is Essential in OT and IT?

As cybersecurity’s need is increasing in every other department, OT and IT also require a completely safe environment in order to maintain the operations of the manufacturing industry. The task of solidifying devices, protocols, systems, networks, and users is now mandatory as no one is willing to share their private information.

Cybersecurity has long been an issue in the IT and OT fields. In order to make sure that the users safely connect to the devices and networks, the main aim should be to anticipate such cyber-attacks.

Protecting the systems and networks becomes even more difficult when these get more and more connected.

Hence, new vulnerabilities are witnessed that are easily exploited by cyber-criminals in order to gain unauthorized access to networks. In Malaysia, more than 90% of the manufacturing organizations that operate IT/OT systems have come across one or more cyber-attacks in a single year, according to the Ponemon Institute of Research.

Apart from that, around 50% of the organizations faced OT infrastructure cyber-attacks that made the system go down entirely, disrupting the flow of information. The World Economic Forum highlighted that IT/OT cyber-attacks have been extremely critical and are ranked among the top 5 of the gravest cybersecurity risks. This is quite alarming!

The Bottom Line

As coming towards the end of the article, the concerns of cybersecurity are quite evident in IT/OT environments within the manufacturing industry in Malaysia and all over the world. But the main task is to make the system so strong that no power is able to break down the system in any case.

Otherwise, the main agenda should be to anticipate minor or major cyber-attacks so that an action could be taken beforehand in order to save the organizations from further damages. For it, the government of Malaysia is working really hard!

Malaysia’s End to End DevOps Tools, Standards, and Best Practices in 2022

As DevOps is a full-fledged culture, the need for having a full arsenal of the right DevOps tools, standards, and best practices ensures that you are able to implement DevOps successfully. In Malaysia, the scope of DevOps is increasing with each passing day due to the versatility of the technology in developing a variety of software. Moreover, Accenture comes on number 2nd where most of the DevOps people work!

Accenture is also located in Malaysia. Hence, you can easily notice the impact of DevOps in Malaysia.

Going into 2022, the year would be very exciting for DevOps, especially in Malaysia due to the increase in the usage of technology. Students here are becoming increasingly enthusiastic about learning software development in order to fill the gap in the computing industry of Malaysia.

Emerging technologies like Artificial Intelligence (AI), Machine Learning (ML), the Internet of Things (IoT), and cloud computing are gaining huge popularity in Malaysia. All these technologies are able to integrate DevOps. Therefore, in Malaysia, the trend of DevOps is working like magic!

The remarkable concept of DevOps is that it brings software development teams and operation teams together. DevOps also focuses on the automation of the software in order to save time!

So, without any further ado, let’s have a look at the DevOps tools, standards, and best practices that are going to rule in 2022 in Malaysia. Here we go!

What is DevOps?

DevOps is basically an approach to developing software that is extremely fast and quicker than other options available. Also, companies today are looking for codes that could be generated quickly. So, DevOps does the job for them.

DevOps is a combination of philosophies, standards, and practices that make it possible to replace long development hours with a faster approach. With DevOps, the idea is to be very prompt towards the customer demands and quickly adapt to the changes within the market.

Moreover, DevOps becomes an absolute gun of an approach with appropriate tools.

As mentioned above, the software teams and the operation teams form a group to work together on development projects. Quality Assurance teams and Security teams also work in coordination with the developers in order to get accurate and quick solutions.

What are the Best Practices in DevOps?

Down below are the best practices in DevOps:

  • Automation
  • Coordination
  • Uninterrupted Improvement
  • Uninterrupted Deployment
  • Customer-Oriented Action

Teams work in coordination in order to deploy new features and updates while keeping a check on the environment to ensure that things are working as planned. Companies in Malaysia that are using DevOps state that they have received benefits in terms of communication, scalability, and reliability.

The Best End to End DevOps Tools being used in Malaysia in 2022

  • Ansible

Ansible is an IT automation tool through which you are able to handle cloud provisioning, deployment of applications, orchestration, configuration, and several other tasks. Ansible is a versatile tool to model IT architecture. Moreover, it smoothly takes care of multi-tier deployments. This tool uses YAML.

YAML is a human-readable data serialization language that is used for the configuration of applications and files where all the data has been stored. The language has a minimalistic syntax.

For security, Ansible is known to use passwords, designed for SSH keys along with SSH agents or Kerberos. Plus, it is an open-source community project that is sponsored by Red Hat.

  • Slack

Slack is the best tool for the collaboration of teams. It was developed in 2013 and since then, it has been releasing quite effective updates to make it adaptable to the current market scenarios. The tool is able to shed the boundaries across the globe and bring the teams together so that they can work effectively.

Moreover, there are several options available in Slack to carry on with an optimal workflow, generating insights from each and every member of the team to make the project even better. DevOps is never easy to get uniform responses from the members.

Therefore, Slack makes sure to simplify the roadmap, automate tasks, and bring everyone on the same page.

  • Jenkins

Jenkins is again one of the best tools for DevOps. It is an open-source continuous integration server that automates the complete build cycle of a DevOps software project. The ultimate benefit that the DevOps engineers get through using this tool is the feature of ‘Pipeline’.

By using this feature, the code is committed into the repository automatically, running test cases, thereby fetching the reports of the tests as well. It is highly customizable to provide feedback in a few seconds. Plus, it would ring a bell for you if any sprint is leading into a broken build or disturbing it.

Jenkins is also able to automate tools and applications used in SDLC, increasing the effectiveness of the output.

  • Phantom

For all the DevOps teams, the security element makes them quite worried. Especially in Malaysia, cyber crimes have increased like crazy. So, the Phantom tool is actually a sigh of relief for those who are looking to build a secure and defensible infrastructure to deal with cyber-attacks in a great way.

By using this tool, you are able to coordinate in a centralized environment regarding an incident and make sure to be aware of the increasing security threats simultaneously. Plus, the tool also helps the DevOps engineers to alleviate the risk immediately by using tactics like device quarantine, file detonation, etc.

  • Docker

It is a tool that is present in the middle of containerization. Containerization is an ongoing trend that is rapidly increasing in value. The tool ensures the packaging, planning, and deploying of applications regardless of the current environment. Each application container consists of source codes, configuration files, supporting files, and several other things to make execution possible.

When containers are excessed, the applications would be able to execute in a remote environment.

Hence, the companies are able to save infrastructure costs. According to one of the studies, 2 out of 3 companies who have used this tool have ultimately adopted its usage within 30 days of using it.

The fact itself highlights the benefits and the impact of Docker in the DevOps world.

  • Nagios

This tool is quite similar to the Phantom tool. It basically provides monitoring in order to keep the tabs open on the applications, servers, as well as in your entire business infrastructure. Having said that, the tool is exceptional for larger companies rather than smaller organizations. It keeps a check on a large amount of circuitry of a huge organization. The circuitry might include routers, wires, repeaters, etc.

Moreover, it immediately notifies the users in case of any problem occurring in the backend or in case of a failure of any device.

Plus, it maintains a performance graph and notifies the users prior in case of any upcoming error.

  • Vagrant

Vagrant is an effective DevOps tool to manage and work with virtual machines by maintaining the same workflow. Through this tool, the team members are able to share the environment of a running software while testing applications at a rapid pace to not waste any time on setting configurations.

Plus, the tool makes sure that the environment of the software remains the same on every developer’s machine so that there is no chance of excuses like ‘runs-on-my-system’.

  • GitHub

Talking about the most demanded DevOps tools in Malaysia, you cannot forget GitHub in any case. The tool was launched in 2000 and since then it has proved its mark all the time! Developers use the tool to make quick iterations into the code and the notification is also sent quickly to every member without any possible delays. Moreover, in case of any errors, instant rollbacks are done to the previous versions, that too in seconds!

So, the speed of GitHub has always remained a major factor in adopting its usage across several industries.

The tool is able to remember the history of changes that are being stored side by side into the tool. Hence, rolling back to the original version is also not a hassle at all!

  • Sentry

In DevOps, Sentry is the best tool to use in order for bug or error detection. Mostly, the tool is used by Uber and Microsoft. It is a free tool and it supports languages like JavaScript, IOS, Ruby, etc. Moreover, there are in-built SDKs in Sentry that make it possible to support more languages and frameworks.

The tool keeps on scanning the lines of codes across the whole system and immediately notifies in case of any error detection. It not only highlights the problem. Rather it provides a number of solutions to be applied to the current scenarios that can be obtained with just a single click.

The Bottom Line

So, these are the best end-to-end DevOps tools being used in Malaysia and all over the globe in 2022 and in years to come! DevOps is an emerging field that has a huge scope to grow, considering the benefits that companies could get by using DevOps. So, what are you waiting for? Change your developing strategy NOW!

The Future of Malaysia’s Businesses: Virtual Worlds or Virtual Reality?

Virtual worlds and Virtual Reality (VR) both are shaping up nicely for businesses in Malaysia. As most of the businesses in Malaysia are approaching digitalization, the impact of virtual worlds such as Metaverse has multiplied over time. Moreover, Virtual Reality (VR) is part and parcel of a virtual world.

Hence, for Malaysian businesses, the main focus is on both the virtual world and VR as VR could easily become a part of virtual worlds.

The traditional way of running a business has long gone now. There is a need for every business to step up and reflect on something extraordinary to remain in the race. Thanks to the technology that you would be experiencing through virtual worlds and VR. Through virtual worlds, the consumer experience would also take a U-turn and they would come across something that they have never imagined.

However, people are still confused between virtual worlds and VR. So, today we are going to explain everything related to virtual worlds and VR in terms of businesses in Malaysia. So, without any further ado, let’s keep going:

What is a Virtual World?

A virtual world is similar to the real world where you are currently living. Basically, a virtual world is an online persistent, and shared world where you can interact with other people within the virtual world. You will require the help of VR technology in order to interact and communicate here.

A virtual world has a large population and people come together to experience the whole virtual world.

People in a virtual world are available in the form of avatars. Each and every entity has its own personalized avatar which is recognized through personal characteristics. As metaverse is one of the examples of a virtual world, you can observe that a number of businesses have accounted for its hype.

Popular brands like Nike, Gucci, Louis Vuitton, Tommy Hilfiger, and Forever 21 have shown interest in building their virtual stores in the metaverse so that people can shop in real terms without even leaving their homes or comfort zones. Therefore, many Malaysian businesses are following the same way.

 In the virtual world, the ownership is always with the users and the companies have no relation to it.

What is Virtual Reality (VR)?

Virtual Reality (VR) is a computer-simulated online environment where users think of it as the actual reality. An environment in VR could be similar to the actual world. But at the same time, it could be totally opposite to what you see in your daily life. Basically, a person creating VR has all the power to shape and reshape a Virtual Reality. Virtual reality systems make use of VR headset technology to get the feel of it.

TERMS AND CONDITIONS

This Agreement was last revised on Oct 15th, 2020.

Contents

Introduction

https://edxevents.com/ welcomes you.

We offer you access to our services through our “Website” (defined below) subject to the following Terms of this agreement, which may be updated by us from time to time with or without notice to you.  By accessing and using this Website, you acknowledge that you have read, understood, and agree to be lawfully bound by these terms and conditions and our Privacy Policy, which are hereby incorporated by reference (collectively, this “Agreement”). In case you do not agree with any of these terms, then please do not use the Website. 

Definitions

  • Agreement” denotes to this Terms and Conditions and the Privacy Policy and other documents provided to you by the Website; 
  • User”, “You” and “your” denotes the person who is accessing it to take any service from us. User shall include the company, partnership, sole trader, person, body corporate or association taking services of this Website;
  • Customer” refers to the user who accesses the website and makes the payment for purchasing services or availing services;
  • We”, “us”, “our” and “Company” are references to EDX PTE LTD;   
  • Website” shall mean and include “https://edxevents.com/“, and any successor Website of the Company or any of its affiliates;
  • Customer Account” shall mean an electronic account opened for the customer for availing various services offered on the website;

Interpretation

  • All references to the singular include the plural and vice versa and the word “includes” should be construed as “without limitation”.
  • Words importing any gender shall include all the other genders.
  • Reference to any statute, ordinance, or other law includes all regulations and other instruments and all consolidations, amendments, re-enactments or replacements for the time being in force.
  • All headings, bold typing, and italics (if any) have been inserted for convenience of reference only and do not define, limit or affect the meaning or interpretation of the terms of this Agreement.

Introduction and Scope

  • Scope. These Terms govern your use of the Website and the Services. Except as otherwise specified, these Terms do not apply to Third-Party Products or Services, which are governed by their terms of service.
  • Eligibility: Certain Service of the Website is not available to minors under the age of 13 or to any users suspended or removed from the system by us for any reason.
  • Electronic Communication:When you use this Website or send e-mails and other electronic communications from your desktop or mobile device to us, you are communicating with us electronically. By sending, you agree to receive a reply from us electronically in the same format and you can keep copies of these communications for your records.

Services

At https://edxevents.com/, we offer a meticulously designed website where we are offering cooperate events company for senior decision-makers.

Modifications to the Service

We reserve the right, in our discretion, to change, modify, add to, or remove portions of the Terms (collectively, “Changes”), at any time. We may notify you of changes by sending an email to the address identified in your Account or by posting a revised version of the Terms incorporating the changes to its Website.

Account

For accessing the website and using certain Resources, you may be required to provide specific information and to create a user ID and password to establish an account.

You accept that the details you provide about establishing an account are correct and that you will keep your details up-to-date. You are responsible for the security of all of your user names, passwords, and registration information (such as unique account identifiers or historical billing information), and you are solely responsible for any use (authorized or not) of your accounts. You agree to notify us immediately about any unauthorized activity regarding any of your accounts or other breaches of security. We may at our discretion suspend or terminate any of your usernames and passwords at any time with or without notice.

User Content

Content Responsibility.

The website permits you to post comments, feedback, etc. but you are solely responsible for the content posted by you. You represent that you have required permission to use the content.

When posting content to the website, please do not post content that:

  • contains ill-mannered, profane, abusive, racist or hateful language or expressions, text, photographs or illustrations that are pornographic or in poor taste, inflammatory attacks of a personal, racial or religious nature;
  • is defamatory, threatening, disparaging, grossly inflammatory, false, misleading, fraudulent, inaccurate, unfair, contains gross exaggeration or unsubstantiated claims;
  • violates the privacy rights of any third party, is unreasonably harmful or offensive to any individual or community;
  • discriminates on the grounds of race, religion, national origin, gender, age, marital status, sexual orientation or disability, or refers to such matters in any manner prohibited by law;
  • violates or inappropriately encourages the violation of any municipal, state, federal, or international law, rule, regulation, or ordinance;
  • uses or attempts to use another’s account, password, service or system except as expressly permitted by the Terms of use uploads or transmits viruses or other harmful, disruptive, or destructive files;
  • sends repeated messages related to another user and/or makes derogatory or offensive comments about another individual or repeats prior posting of the same message under multiple emails or subjects.
  • Any submitted content will be refused by us. If repeated violations occur, we reserve the right to cancel user access to the website without advanced notice.

General Conditions

  • We do not guarantee the accuracy, completeness, validity, or timeliness of products listed by us.
  • We make material changes to these terms of service from time to time, we may notify you either by prominently posting a notice of such changes or via email communication.
  • The website is licensed to you on a limited, non-exclusive, non-transferrable, non-sublicensable basis, solely to be used in connection with the Service for your private, personal, non-commercial use, subject to all the terms and conditions of this Agreement as they apply to the Service.

Geographic Restriction

  • We reserve the right, to limit the usage or supply of any service to any person, geographic region, or jurisdiction. We may use this right as per the necessity. We reserve the right to suspend any Service at any time. Any offer to provide any Service made on this Website is invalid where banned.

User Responsibilities

    • You shall use the Service and Website for a lawful purpose and comply with all the applicable laws while using the Website;
    • You shall not use or access the Website for collecting any market research for some competing business;
    • You shall not misrepresent or personate any person or entity for any false or illegal purpose;
    • You shall not use any virus, hacking tool for interfering in the operation of the Website or data and files of the Website;
    • You will not use any device, scraper, or any automated thing to access the Website for any means without taking permission.
    • You will inform us about anything that is inappropriate or  you can inform us if you find something illegal;
    • You will not interfere with or try to interrupt the proper operation of the Website through the use of any virus, device, information collection or transmission mechanism, software or routine, or access or try to gain access to any data, files, or passwords connected to the Website through hacking, password or data mining, or any other means;
    • You will not cover, obscure, block, or in any way interfere with any advertisements and/or safety features (e.g., report abuse button) on the Website;   
    • You will not take any action that levies or may levy (in our sole decision) an unreasonable or unreasonably big load on our technical arrangement; and
    • You will let us know about the unsuitable content of which you become aware.  If you discover something that infringes any law, please let us know, and we’ll review it.

    We reserve the right, in our sole and absolute discretion, to deny you access to the Website or any service, or any portion of the Website or service, without notice, and to remove any content.

No Responsibility

We are not responsible to you for:

      • any reliance that you may place on any material or commentary posted on our website. Please note that nothing contained in our website or the material published on it is intended to amount to advice on which you should rely; or
      • any losses you suffer because the information you put into our website is inaccurate or incomplete; or
      • any losses you suffer because you cannot use our website at any time; or
      • any errors in or omissions from our website; or
      • any losses you may suffer by relying on any commentary, postings, or reviews (of our services or that of our partners) on our website; or
      • any unauthorized access or loss of personal information that is beyond our control.

Third-Party Links

The Website may comprise links to external or third-party Websites (“External Sites”).  These links are provided exclusively as ease to you and not as an authorization by us of the content on such External Sites.  The content of such External Sites is created and used by others.  You can communicate with the site administrator for those External Sites.  We are not accountable for the content provided in the link of any External Sites and do not provide any representations about the content or correctness of the information on such External Sites.  You should take safety measures when you are downloading files from all these Websites to safeguards your computer from viruses and other critical programs.  If you agree to access linked External Sites, you do so at your own risk.

Personal Information & Privacy Policy

By accessing or using this Website, you approve us to use, store, or otherwise process your personal information as per our Privacy Policy.

Copyrigth and Trademark

The Website may contain material, such as software, text, graphics, images, designs, sound recordings, audiovisual works, and other the material provided by or on behalf of us (collectively referred to as the “Content”).  The Content may be possessed by us or third parties.   Unauthorized use of the Content may infringe copyright, trademark, and other laws.  You have no rights in or to the Content, and you will not take the Content except as allowed under this Agreement.  No other use is allowed without prior written consent from us.  You must recollect all copyright and other proprietary notices contained in the original Content on any copy you make of the Content.  You may not transfer, provide license or sub-license, sell, or modify the Content or reproduce, display, publicly perform, make a derivative version of, distribute, or otherwise use the Content in any way for any public or commercial purpose.  The use or posting of the Content on any other Website or in a networked computer environment for any purpose is expressly prohibited.

If you infringe any part of this Agreement, your permission to access and/or use the Content and the Website automatically terminates and you must immediately destroy any copies you have made of the Content.

Our trademarks, service marks, and logos used and displayed on the Website are registered and unregistered trademarks or service marks of us.  Other company, product, and service names located on the Website may be trademarks or service marks owned by others (the “Third-Party Trademarks,” and, collectively with us, the “Trademarks”).  Nothing on the Website should be construed as granting, by implication, estoppel, or otherwise, any license or right to use the Trademarks, without our prior written permission specific for each such use.    None of the Content may be retransmitted without our express, written consent for every instance.

MISCELLANEOUS

SEVERABILITY

If any provision of these Terms is found to be unenforceable or invalid, that provision will be limited or eliminated to the minimum extent necessary so that the Terms will otherwise remain in full force and effect and enforceable.

TERMINATION

Term. The Services provided to you can be canceled or terminated by us. We may terminate these Services at any time, with or without cause, upon written notice. We will have no liability to you or any third party because of such termination. Termination of these Terms will terminate all of your Services subscriptions.

Effect of Termination. Upon termination of these Terms for any reason, or cancellation or expiration of your Services: (a) We will cease providing the Services; (b) you will not be entitled to any refunds or usage fees, or any other fees, pro-rata or otherwise; (c) any fees you owe to us will immediately become due and payable in full, and (d) we may delete your archived data within 30 days. All sections of the Terms that expressly provide for survival, or by their nature should survive, will survive termination of the Terms, including, without limitation, indemnification, warranty disclaimers, and limitations of liability.

ENTIRE AGREEMENT

This Agreement constitutes the entire agreement between the parties hereto concerning the subject matter contained in this Agreement.

GOVERNING LAW AND JUDICIAL RECOURSE

The terms herein will be governed by and construed following the Law of Singapore without giving effect to any principles of conflicts of law. The Courts of Singapore shall have exclusive jurisdiction over any dispute arising from the use of the Website.

CONTACT INFORMATION

If you have any questions about these Terms, please contact us at hello@edxevents.com.

Privacy Policy

Last updated [Oct 16th, 2020]

Our Privacy Policy forms part of and must be read in conjunction with, website Terms and Conditions. We reserve the right to change this Privacy Policy at any time.

We respect the privacy of our users and every person who visits our sites https://edxevents.com/ and https://dxleadersseries.com/. Here, (“we”, “us”, or “our”) We are committed to protecting your personal information and your right to privacy in accordance with the General Data Protection Regulation (GDPR – European regulation) and the Personal Data Protection Act (PDPA – Singapore Regulation). If you have any questions or concerns about our policy or our practices with regards to your personal information, please contact us at hello@edxevents.com.

When you visit our websites https://edxevents.com/ and https://dxleadersseries.com/ (“websites”) and use our services, you trust us with your personal information. We take your privacy very seriously. In this privacy notice, we describe our privacy policy. We seek to explain to you in the clearest way possible what information we collect, how we use it, and what rights you have in relation to it. We hope you take some time to read through it carefully, as it is important. If there are any terms in this privacy policy that you do not agree with, please discontinue the use of our sites and our services.

This Privacy Policy has been developed and is maintained in accordance with all applicable federal and international laws and regulations and specifically with the GDPR (General Data Protection Regulation – European regulation) and the Personal Data Protection Act (PDPA – Singapore Regulation).

This privacy policy applies to all information collected through our websites, and/or any related services, sales, marketing, or events (we refer to them collectively in this privacy policy as the “websites”).

ABOUT US

Based in Singapore. EDX (Enterprise Digital Transformation) was founded by a group og B2B event professionals with more than 10 years of industry experience. They wanted to prove that vents are not just about learning and networking – that senior level events can also be creative, purposeful, and more fun than just listening to presentations.

EDX creates not only corporate events but also business intelligence and customized platforms ti convert leads and contacts into real deals. EDX believes that a perfect mix of event solutions that suit the client’s needs could impact not only its bottom line, but also the brand experience.

Please read this privacy policy carefully as it will help you make informed decisions about sharing your personal information with us.  

  1. WHAT INFORMATION DO WE COLLECT?

The personal information you disclose to us

We collect personal information that you voluntarily provide to us when expressing an interest in obtaining information about us or our products and services when participating in activities on the websites, or otherwise contacting us.

The personal information that we collect depends on the context of your interactions with us and the websites, the choices you make, and the products and features you use. The personal information we collect can include the following:

Personal Data 

We collect your first and last name, email address, company, job title, postal address, phone number (office number and mobile number), and other similar contact data.

Credentials. We collect passwords, password hints, and similar security information used for authentication and account access.

Information automatically collected

We automatically collect certain information when you visit, use, or navigate the websites. This information does not reveal your specific identity (like your name or contact information) but may include device and usage information, such as your IP address, browser, and device characteristics, operating system, language preferences, referring URLs, device name, country, location, information about how and when you use our websites and other technical information.  If you access our websites with your mobile device, we may automatically collect device information (such as your mobile device ID, model, and manufacturer), operating system, version information, and IP address. This information is primarily needed to maintain the security and operation of our websites, and for our internal analytics and reporting purposes.

Like many businesses, we also collect information through cookies and similar technologies. You can find out more about this in our Cookie Policy.

Information collected from other Sources

We may obtain information about you from other sources, such as public databases, joint marketing partners, social media platforms (such as Facebook, Instagram, Twitter), as well as from other third parties.

If you have chosen to subscribe to our newsletter, your first name, last name and email address will be shared with our newsletter provider. This is to keep you updated with information and offers for marketing purposes.

Payment information

Your credit/debit card information or payment information will be processed by the payment platforms available on the websites, which will treat and safeguard your data with total security and with the exclusive purpose of processing the purchase of the services. We reserve the right to contract any payment platform available in the market, which treats your data for the sole purpose of processing the purchase of services.

GOOGLE Analytics

We use Google Analytics provided by Google, Inc., USA (“Google”). These tool and technologies collect and analyze certain types of information, including IP addresses, device and software identifiers, referring and exit URLs, feature use metrics and statistics, usage and purchase history, media access control address (MAC Address), mobile unique device identifiers, and other similar information via the use of cookies. The information generated by Google Analytics (including your IP address) may be transmitted to and stored by Google on servers in the United States. We use the GOOGLE Analytics collection of data to enhance the websites and improve our service.

Please consult Google’s privacy policy here:

Social Media

On our websites you will find links and functions linked to different social networks, in which you can share your information.

It is advisable to consult the privacy policy and data protection of each social network used on our websites.

  1. HOW DO YOU GET MY CONSENT?

By using the services, accepting the checkboxes, communicating with us through the contact forms or our contact information, accepting the use of cookies by our websites and voluntarily providing us with personal information to communicate with you, you are providing your consent to our collection, storage and use of your information on the terms contained in this privacy policy. You consent to the use of cookies on our websites when you give your acceptance through the pop-up window shown on the home page when you enter the websites. You may withdraw your consent by sending us your request via the contact information or the contact page.

  1. HOW DO WE USE YOUR INFORMATION?

We use your personal information for these purposes in reliance on our legitimate business interests (“Business Purposes”), in order to enter into or perform a contract with you (“Contractual”), with your consent (“Consent”), and/or for compliance with our legal obligations (“Legal Reasons”). We indicate the specific processing grounds we rely on next to each purpose listed below.  

We use the information we collect or receive:  

  • To send administrative information to you for related to your account, our business purposes, and/or for legal reasons. We may use your personal information to send you the product, service, and new feature information and/or information about changes to our terms, conditions, and policies.
  • Deliver targeted advertising to you for our Business Purposes and/or with your Consent. We may use your information to develop and display content and advertising (and work with third parties who do so) tailored to your interests and/or location and to measure its effectiveness.
  • Request Feedback for our Business Purposes and/or with your Consent. We may use your information to request feedback and to contact you about your use of our websites.
  • To protect our websites for Business Purposes and/or Legal Reasons.  We may use your information as part of our efforts to keep our websites safe and secure (for example, for fraud monitoring and prevention).
  • To enable user-to-user communications with your consent. We may use your information in order to enable user-to-user communications with each user’s consent.
  • To enforce our terms, conditions, and policies for our business purposes and as legally required.
  • To respond to legal requests and prevent harm as legally required. If we receive a subpoena or other legal request, we may need to inspect the data we hold to determine how to respond.
  • For other Business Purposes. We may use your information for other Business Purposes, such as data analysis, identifying usage trends, determining the effectiveness of our promotional campaigns, and to evaluate and improve our websites, products, services, marketing, and your experience.
  1. WILL YOUR INFORMATION BE SHARED WITH ANYONE?

We only share and disclose your information in the following situations:

  • Compliance with Laws. We may disclose your information where we are legally required to do so in order to comply with applicable law, governmental requests, a judicial proceeding, court order, or legal processes, such as in response to a court order or a subpoena (including in response to public authorities to meet national security or law enforcement requirements).
  • Vital Interests and Legal Rights. We may disclose your information where we believe it is necessary to investigate, prevent, or take action regarding potential violations of our policies, suspected fraud, situations involving potential threats to the safety of any person and illegal activities, or as evidence in litigation in which we are involved.
  • Vendors, Consultants, and Other Third-Party Service Providers. We may share your data with third-party vendors, service providers, contractors, or agents who perform services for us or on our behalf and require access to such information to do that work.
  • Business Transfers. We may share or transfer your information in connection with, or during negotiations of, any merger, sale of company assets, financing, or acquisition of all or a portion of our business to another company.
  • Third-Party Advertisers. We may use third-party advertising companies to serve ads when you visit the websites. These companies may use information about your visits to our websites and other websites that are contained in web cookies and other tracking technologies in order to provide advertisements about goods and services of interest to you.
  • We may share your information with our affiliates, in which case we will require those affiliates to honor this privacy policy. Affiliates include our parent company and any subsidiaries, joint venture partners, or other companies that we control or that are under common control with us.
  • Business Partners. We may share your information with our business partners to offer you certain products, services, or promotions.
  • With your Consent. We may disclose your personal information for any other purpose with your consent.
  • Other Users. When you share personal information (for example, by posting comments, contributions, or other content to the websites) or otherwise interact with public areas of the websites, such personal information may be viewed by all users and may be publicly distributed outside the websites in perpetuity.
  1. DO WE USE COOKIES AND OTHER TRACKING TECHNOLOGIES?

We may use cookies and similar tracking technologies (like web beacons and pixels) to access or store information. Specific information about how we use such technologies and how you can refuse certain cookies is set out in our Cookie Policy.

  1. IS YOUR INFORMATION TRANSFERRED INTERNATIONALLY?

Our servers are located in the Singapore. We will not transfer your personal information to an overseas recipient.

  1. WHAT IS OUR STANCE ON THIRD-PARTY WEBSITES?

The websites may contain advertisements from third parties that are not affiliated with us and which may link to other websites, online services, or mobile applications. We cannot guarantee the safety and privacy of data you provide to any third parties. Any data collected by third parties is not covered by this privacy policy. We are not responsible for the content or privacy and security practices and policies of any third parties, including other websites, services, or applications that may be linked to or from the websites. You should review the policies of such third parties and contact them directly to respond to your questions.

  1. HOW LONG DO WE KEEP YOUR INFORMATION?

We will only keep your personal information for as long as it is necessary for the purposes set out in this privacy policy unless a longer retention period is required or permitted by law (such as tax, accounting, or other legal requirements). No purpose in this policy will require us to keep your personal information for longer than 90 days past the termination of your account.

When we have no ongoing legitimate business need to process your personal information, we will either delete or anonymize it, or, if this is not possible (for example, because your personal information has been stored in backup archives), then we will securely store your personal information and isolate it from any further processing until deletion is possible.

  1. HOW DO WE KEEP YOUR INFORMATION SAFE?

We work to protect the security of your information during transmission by using Secure Sockets Layer (SSL) software, which encrypts information you input. If transactions are processed on the websites, transaction information is transmitted to and from the websites in encrypted form using industry-standard SSL connections to help protect such information from interception. We restrict authorized access to your personal information to those persons who have a legitimate purpose to know that information to provide products or services to you and those persons you have authorized to have access to such information.

We follow generally accepted industry standards to protect the personal information you provide to us. No method of transmission over the Internet, or method of electronic storage, is 100% secure. Therefore, while we strive to use commercially acceptable means to protect your personal information, we cannot guarantee its absolute security.

We will not sell, distribute, or lease your personal information to third parties unless we have your permission or are required by law to do so.

  1. DO WE COLLECT INFORMATION FROM MINORS?

We are in compliance with the requirements of the “GDPR” (General Data Protection Regulation – European regulation) and the Personal Data Protection Act (PDPA – Singapore Regulation) regarding the protection of the personal data of minors. We do not knowingly solicit data from or market to children under 16 years of age.  By using the websites, you represent that you are at least 16 or that you are the parent or guardian of such a minor and consent to such minor dependent’s use of the websites. If we learn that personal information from users less than 16 years of age has been collected, we will deactivate the account and take reasonable measures to promptly delete such data from our records.  If you become aware of any data, we have collected from children under age 16, please contact us at hello@edxevents.com.

  1. WHAT ARE YOUR PRIVACY RIGHTS?

Personal Information

You may at any time review or change the information in your account or terminate your account by:

  • Logging into your account settings and updating your account
  • Contacting us using the contact information provided below

Upon your request to terminate your account, we will deactivate or delete your account and information from our active databases. However, some information may be retained in our files to prevent fraud, troubleshoot problems, assist with any investigations, enforce our Terms of Use, and/or comply with legal requirements.

Cookies and similar technologies: Most Web browsers are set to accept cookies by default. If you prefer, you can usually choose to set your browser to remove cookies and to reject cookies. If you choose to remove cookies or reject cookies, this could affect certain features or services of our websites.

  1. GDPR ENTITLEMENT

Users who provide information through our websites, as data subjects and data owners, have the right to access, rectify, download or delete their information, as well as to restrict and object to certain processing of their information. While some of these rights apply generally, others apply only in certain limited circumstances. We describe these rights below:

  • Access and portability: to access and know what information is stored in our servers, you can send us your request through our contact information.
  • Rectify, Restrict, Limit, Delete: You can also rectify, restrict, limit or delete much of your information.
  • Right to be informed: Users of our websites will be informed, upon request, about what data we collect, how it is used, how long it is retained and whether it is shared with third parties.
  • Object: When we process your information based on our legitimate interests as explained above, or in the public interest, you may object to this processing in certain circumstances. In such cases, we will stop processing your information unless we have compelling legitimate reasons to continue processing it or where it is necessary for legal reasons.
  • Revoke consent: Where you have previously given your consent, such as to allow us to process and store your personal information, you have the right to revoke your consent to the processing and storage of your information at any time. For example, you may withdraw your consent by updating your settings. In certain cases, we may continue to process your information after you have withdrawn your consent if we have a legal basis for doing so or if your withdrawal of consent was limited to certain processing activities.
  • Complaint: If you wish to file a complaint about our use of your information (and without prejudice to any other rights you may have), you have the right to do so with your local supervisory authority. Users can exercise all these rights by contacting us through the contact information or the contact page.
  • Rights related to automated decision-making, including profiling: website users may request that we provide a copy of the automated processing activities we conduct if they believe that data is being unlawfully processed.

Additionally, if you are a European resident, we note that we are processing your information in order to fulfil contracts we might have with you or otherwise to pursue our legitimate business interests listed above. Additionally, please note that your information will be transferred outside of Europe.

EU residents can exercise these rights by raising a request directly at hello@edxevents.com.

  1. DO WE MAKE UPDATES TO THIS POLICY?

We may update this privacy policy from time to time. The updated version will be indicated by an updated “Revised” date and the updated version will be effective as soon as it is accessible. If we make material changes to this privacy policy, we may notify you either by prominently posting a notice of such changes or by directly sending you a notification. We encourage you to review this privacy policy frequently to be informed of how we are protecting your information.

  1. DATA PROTECTION OFFICER

We have appointed a Data Protection Officer (“DPO”) who is responsible for overseeing questions in relation to this privacy notice. If you have any questions about this privacy notice, including any requests to exercise your legal rights, please contact the Data Protection Officer, at our e-mail hello@edxevents.com.

  1. HOW CAN YOU CONTACT US ABOUT THIS POLICY?

If you have questions or comments about this policy, email us at hello@edxevents.com.

Request an Appointment

"We're in the midst of creating something awesome for you!"

____________________________________
By clicking above button I agree to your site's Terms of Use and Privacy Policy and consent to receiving SMS messages and emails.