{"id":16020,"date":"2024-06-14T16:33:02","date_gmt":"2024-06-14T09:33:02","guid":{"rendered":"https:\/\/fpt-is.com\/en\/?p=16020"},"modified":"2024-07-22T11:14:10","modified_gmt":"2024-07-22T04:14:10","slug":"fpt-is-and-ibm-vietnam-share-solutions-for-customer-data-security","status":"publish","type":"post","link":"https:\/\/fpt-is.com\/en\/fpt-is-and-ibm-vietnam-share-solutions-for-customer-data-security\/","title":{"rendered":"FPT IS and IBM Vietnam share solutions for customer data security"},"content":{"rendered":"<p style=\"text-align: left\"><strong>The increasingly competitive technology race in the digital transformation era has caused businesses to face growing risks from cyberattacks on user data, which are rising sharply in both scope and intensity. Responding to this problem, on June 13, FPT IS coordinated with IBM Vietnam to organize the workshop \u201cProactively Protecting Customer Data with IBM Solutions\u201d. The workshop aimed to share problem-solving approaches that align with current trends.<\/strong><\/p>\n<p style=\"text-align: left\"><img decoding=\"async\" class=\"aligncenter wp-image-16025 size-medium\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_0624211-1718704758-700x467.jpg\" alt=\"Mn 0624211 1718704758\" width=\"700\" height=\"467\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_0624211-1718704758-700x467.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_0624211-1718704758-406x271.jpg 406w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<p style=\"text-align: left\">At the workshop, speakers provided in-depth analysis of the current cybersecurity situation and how companies can apply technology to proactively and effectively protect customer information.\u00a0 This created an opportunity to improve enterprises\u2019 understanding of advanced security strategies and how to proactively respond to cybersecurity threats.<\/p>\n<p style=\"text-align: left\">Speaking at the event, Ms. Dang Vu Viet Anh, Business Director of the Enterprise Sector at FPT IS, stated that FPT IS has provided its customers with various solutions and products for data security. \u00a0&#8220;Hopefully, through the workshop, companies can draw lessons from shared experiences and work out solutions to protect themselves from cybersecurity threats\u201d, said Ms. Viet Anh.<\/p>\n<figure id=\"attachment_16028\" aria-describedby=\"caption-attachment-16028\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-16028 size-medium\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_057211-1718704817-700x467.jpg\" alt=\"Mn 057211 1718704817\" width=\"700\" height=\"467\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_057211-1718704817-700x467.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_057211-1718704817-406x271.jpg 406w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-16028\" class=\"wp-caption-text\">Ms. Dang Vu Viet Anh, Business Director of the Enterprise Sector at FPT IS, shared her thoughts at the workshop<\/figcaption><\/figure>\n<p style=\"text-align: left\">Automated identity and access management is an essential part of customer data protection and a key factor in the sustainable development of businesses.\u00a0 The presentation &#8220;Automated Identity and Access Management to Meet Regulatory Compliance&#8221; by Mr. Nguyen Khanh Luong, Advisory Security Technical Specialist at IBM Vietnam, highlighted companies\u2019 compliance with customer identity protection today. According to Mr. Luong, as enterprises are undergoing dramatic digital transformation, there will be more access from diverse sources to their organizational resources. This poses new challenges, especially in dealing with ransomware attacks.\u00a0 To build and strengthen a security system, businesses need to apply the principle of least privilege and verify users correctly.<\/p>\n<figure id=\"attachment_16024\" aria-describedby=\"caption-attachment-16024\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-16024 size-medium\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_0579211-1718704719-700x467.jpg\" alt=\"Mn 0579211 1718704719\" width=\"700\" height=\"467\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_0579211-1718704719-700x467.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_0579211-1718704719-406x271.jpg 406w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-16024\" class=\"wp-caption-text\">Mr. Nguyen Khanh Luong presented the topic &#8220;Automated Identity and Access Management to Meet Regulatory Compliance\u201d<\/figcaption><\/figure>\n<p style=\"text-align: left\">In the past year, the Vietnamese Government issued Decree No. 13\/2023\/ND-CP on personal data protection (\u201cDecree 13\u201d), effective from July 1, 2023.\u00a0 The Decree regulates the protection of personal data and the responsibilities of relevant agencies, organizations, and individuals in this regard.\u00a0 It is not only a comprehensive legal framework on privacy but also sets technical and policy requirements for businesses that process and control the data of Vietnamese citizens.\u00a0 Small and medium-size enterprises, in particular, face difficulty in developing technical plans and prioritizing financial budgets for information security.<\/p>\n<p style=\"text-align: left\">Understanding the concerns of businesses, Mr. Vo Hoang Linh, Advisory Data &amp; AI Technical Specialist at IBM Vietnam, shared his perspective on personal data protection at this workshop. He emphasized that personal data protection is not only a legal requirement but also an important factor in building customer trust and ensuring the sustainable development of businesses in the digital era. To adhere to the Decree, companies need to apply advanced solutions to standardize processes in their business activities from the very start.<\/p>\n<figure id=\"attachment_16026\" aria-describedby=\"caption-attachment-16026\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-16026 size-medium\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_058911-1718704769-700x467.jpg\" alt=\"Mn 058911 1718704769\" width=\"700\" height=\"467\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_058911-1718704769-700x467.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_058911-1718704769-406x271.jpg 406w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-16026\" class=\"wp-caption-text\">Mr. Vo Hoang Linh gave his perspective on personal data protection<\/figcaption><\/figure>\n<p style=\"text-align: left\">Ransomware prevention is extremely important as this type of malware can encrypt and take over businesses\u2019 data.\u00a0 The malware not only significantly impacts the IT infrastructure of enterprises but also causes heavy financial losses, forcing businesses to pay large sums to hackers. A ransomware attack can also destroy a business&#8217;s reputation, causing it to lose its customers\u2019 and partners\u2019 trust since their data is leaked or lost.\u00a0 Therefore, prevention against ransomware is a key element in a business&#8217;s information security strategy, protecting its digital assets and ensuring its business continuity.<\/p>\n<p style=\"text-align: left\">At the event, Mr. Nguyen Tuan Anh, Head of Security Consulting Team at FPT IS, recommended the need to constantly update software, manage and monitor personnel and machinery to prevent possible software errors. Additionally, enterprises should frequently evaluate and analyze their systems for vulnerability assessment. Companies are required to develop a plan to localize and isolate devices from the system as soon as signs of an attack are detected. There are currently various advanced cybersecurity monitoring systems which apply AI technology to automatically detect and prevent threats available on the market. With the motto &#8220;record, detect, investigate, and respond&#8221;, FPT IS has developed the FPT EagleEye solution to serve businesses\u2019 cybersecurity strategies.<\/p>\n<figure id=\"attachment_16030\" aria-describedby=\"caption-attachment-16030\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-16030 size-medium\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_060341-1718705159-700x467.jpg\" alt=\"Mn 060341 1718705159\" width=\"700\" height=\"467\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_060341-1718705159-700x467.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_060341-1718705159-406x271.jpg 406w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-16030\" class=\"wp-caption-text\">Mr. Nguyen Tuan Anh gave recommendations for defense and counterattack against ransomware<\/figcaption><\/figure>\n<p style=\"text-align: left\">A ransomware attack costs businesses recovery time, which will seriously affect their production and customer services. Recovering data and systems after an attack is extremely expensive, inclusive of ransom and system restoration expenses. To tackle this issue, Mr. Nguyen Van Hai introduced data storage and recovery solutions, including IBM Storage For Data Resilience with the ability to withstand and quickly recover from cyberattacks.\u00a0 Mr. Hai emphasized that the average time to detect and recover from an attack is about three weeks, which causes a significant amount of damage to companies and hinders their business operations. \u00a0IBM&#8217;s solution limits the data recovery process to just a few hours or even only 30 minutes, enabling enterprises\u2019 continuous operations without long interruption after an attack.<\/p>\n<figure id=\"attachment_16027\" aria-describedby=\"caption-attachment-16027\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-16027 size-medium\" src=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_061221-1718704794-700x467.jpg\" alt=\"Mn 061221 1718704794\" width=\"700\" height=\"467\" srcset=\"https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_061221-1718704794-700x467.jpg 700w, https:\/\/cdn.fpt-is.com\/en\/sites\/3\/MN_061221-1718704794-406x271.jpg 406w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-16027\" class=\"wp-caption-text\">Mr. Nguyen Van Hai presented IBM&#8217;s data storage and recovery solution<\/figcaption><\/figure>\n<p style=\"text-align: left\">Currently, investment in security systems is a must for companies undergoing digital transformation to keep customer data safe and maintain their trust in companies\u2019 brands.\u00a0 Experiences and security solutions shared by IBM Vietnam\u2019s and FPT IS\u2019s experts raised businesses\u2019 awareness about how to proactively protect their customer data. \u00a0Through the event, FPT IS hopes that enterprises can establish a strategy and orientation to develop an optimized and effective network security system to ensure maximum information security.<\/p>\n<p style=\"text-align: left\">\n","protected":false},"excerpt":{"rendered":"<p>The increasingly competitive technology race in the digital transformation era has caused businesses to face growing risks from cyberattacks on user data, which are rising sharply in both scope and intensity. Responding to this problem, on June 13, FPT IS coordinated with IBM Vietnam to organize the workshop \u201cProactively Protecting Customer Data with IBM Solutions\u201d. [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":16025,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[860],"tags":[],"nang_luc":[],"dich_vu":[647,858,712],"khu_vuc":[],"linh_vuc":[856,862],"platform":[],"san_pham":[564],"class_list":["post-16020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events","dich_vu-digital-intrastructure","dich_vu-private-sector-news","dich_vu-security","linh_vuc-enterprises","linh_vuc-partners","san_pham-eagleeye"],"acf":[],"_links":{"self":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/posts\/16020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/comments?post=16020"}],"version-history":[{"count":6,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/posts\/16020\/revisions"}],"predecessor-version":[{"id":17241,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/posts\/16020\/revisions\/17241"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media\/16025"}],"wp:attachment":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media?parent=16020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/categories?post=16020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/tags?post=16020"},{"taxonomy":"nang_luc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/nang_luc?post=16020"},{"taxonomy":"dich_vu","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/dich_vu?post=16020"},{"taxonomy":"khu_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/khu_vuc?post=16020"},{"taxonomy":"linh_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/linh_vuc?post=16020"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/platform?post=16020"},{"taxonomy":"san_pham","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/san_pham?post=16020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}