Macroview redraws local cybersecurity landscape with new center

Macroview Telecom sets a new security benchmark with the recent launch of Hong Kong's first Cybersecurity Research and Operations Centre (CROC).

“The over HK$10 million CROC expands the scope of conventional Security Operations Centers (SOCs) by featuring cybersecurity research and use case development capabilities,” said Eric Lo, chief executive officer, Macroview.

He added: “Its modern workplace design allows professionals to easily collaborate with global experts, respond quickly using actionable insights from big data analytics, and build threat intelligence ecosystem for creating best practices.”

The CROC’s location at Cyberport Hong Kong (also known as the FinTech Hub of Hong Kong) gives the over 1,000 digital technology companies at the premise to select Macroview's security facility for secure collaboration with financial institutions.

It also gives Macroview a convenient access to Cyberport Hong Kong's growing IT research and development facilities and talent pool.

Furthermore, the company’s second Adaptive Security Operations Center, the facility will see Macroview's certified security professionals address rising regional threat levels using solutions and expert support from worldwide security technology vendors, including CyberArk, Palo Alto Networks and Splunk while supporting cybersecurity research.

CROC uses a risk-adaptive approach based on Gartner’s Continuous Adaptive Risk & Trust Assessment (CARTA) to establish use cases for security monitoring. A structured process identifies, prioritizes, implements and maintains these use cases. Clients can also easily monitor their threat exposure levels using risks scores that Macroview will continuously assess.

“Risk scoring allows our customers to easily interpret the Risk and Trust level of their Digital Service Infrastructure. If the risk becomes too high, they will be able to take the right preventive measures while having a deep understanding of the root causes,” said Lo.

Strategic Partnerships

Strong strategic partnerships underscore CROC’s benefits. These allow security professionals to take a best-of-breed approach and combine the unique strengths of each partner.

Currently, the facility deploys leading technologies from three strategic partners --

CyberArk, Palo Alto Networks and Splunk:

CyberArk Privileged Access Security Solution provides a critical layer of IT security to protect data, infrastructure and assets across the enterprise, in the cloud and throughout the DevOps pipeline.

“Attackers consistently seek to compromise privileged credentials in order to access high value assets and data. The CyberArk solution allows CROC to detect and alert on suspicious, privileged access-related activity, and accelerate incident response to mitigate potential damage from an attack," said Jason Choong, partner director, APJ at CyberArk.

Palo Alto Network AutoFocus contextual threat intelligence service helps CROC security professionals identify unique, targeted attacks and respond to cyberattacks faster.

“With AutoFocus, Macroview’s CROC offers higher visibility into the most critical

threats and provides deeper insights on malware families, adversary, campaign, malicious behavior and exploits,” said Bryan Yeung, director, channels, Greater China Region, Palo Alto Networks.

Splunk Enterprise Security (ES) enables security professionals to have an enterprise-wide view of the security health in real time.

“With Splunk ES, Macroview can detect and respond to internal and external threats faster while simplifying threat management and minimizing overall risks,” said Simon Tai, Area Vice President, North Asia, Splunk.

Macroview will continue to augment the capabilities with solutions from new strategic partnerships in the coming months.




Suggested Articles

The “MakeITHong Kong 3-2-1 Go! Bang!” event at Science Park will showcase solutions developed by Hong Kong's innovation and technology ecosystem

Over a third of Hong Kong marketers say that they are tasked with leading customer experience initiatives across their organization

Experts believe current public key encryption could be vulnerable to being broken by quantum computing