See our SolarStorm response
  • Network Security
  • Cloud Security
  • Security Operations
  • More
  • Get support
  • Sign In
  • Get Started

Palo Alto Networks and HKT Launch Endpoint Threat Protection Service to Elevate Cybersecurity Posture of Hong Kong Enterprises

Palo Alto Networks HONG KONG Mar 28, 2019 at 03:00 PM

Hong Kong, 28 March 2019 -- Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, and HKT, Hong Kong’s premier telecommunications service provider, today jointly announced the launch of Endpoint Threat Protection Service by Threat Management Services. The new online defensive service utilizes the technology of Palo Alto Networks Traps™ for endpoint protection and response to protect organizations in Hong Kong against sophisticated cyberthreats. 

 

Enterprises in Hong Kong now have access to advanced endpoint protection technologies with 24/7 local security operations centre support.

 

Endpoint Threat Protection Service by Threat Management Services adopted Palo Alto Networks Traps to stop malware, exploits and ransomware by determining techniques and behaviours. This prevents the launch of malicious executable files; dynamic link libraries, or DLLs; and Office files with multiple methods of prevention, helping reduce the attack surface and increase the accuracy of malware prevention.

 

The service is supported by HKT’s locally based, certified professionals at the company’s next-generation security operations centre, which offers 24/7 proactive monitoring. The real-time, round-the-clock managed security services will enable enterprises to stay secure. It will also help those with ‘bring your own device’ policies to minimize security risks.

 

“The threat landscape is constantly evolving with sophistication that bypasses traditional, and usually outdated, endpoint protection. We are delighted to collaborate with HKT – the leading telecommunication service provider in Hong Kong – to help organizations detect, protect, and respond to sophisticated attacks, using high degrees of automation based on machine learning and AI techniques on data collected from the endpoints, network, and the cloud,” said Wickie Fung, general manager, Hong Kong and Macau, Palo Alto Networks.

 

Available today, Endpoint Threat Protection Service by Threat Management Services is provided in two levels: Basic and Plus. Both levels include deployment, 24/7 support by global certified security experts, and a monthly report. The Plus option enables subscribers to enjoy intelligence-driven forensic investigations, threat hunting and analytics.

 

For additional information about the new service offering, visit:

https://www.hkt-enterprise.com/en/products-solutions/cyber-security/on-premise-systems.

 

About Palo Alto Networks

We are the global cybersecurity leader, known for always challenging the security status quo. Our mission is to protect our way of life in the digital age by preventing successful cyberattacks. This has given us the privilege of safely enabling tens of thousands of organizations and their customers. Our pioneering Security Operating Platform emboldens their digital transformation with continuous innovation that seizes the latest breakthroughs in security, automation, and analytics. By delivering a true platform and empowering a growing ecosystem of change-makers like us, we provide highly effective and innovative cybersecurity across clouds, networks, and mobile devices. Find out more at www.paloaltonetworks.com.

 

Issued on behalf of Palo Alto Networks by Newell Public Relations. For more information, please contact:

 

Libby Chang
Palo Alto Networks
Tel: +65 6813 2957
Email: libbychang@paloaltonetworks.com

 

Ivan Theodoulou
Newell PR
Tel: +852 2572 2100
Email: ivant@newell.com


Related Resources

Article

What is a denial of service attack (DoS) ?

A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to its intended users.
September 2, 2020

Article

What Is SASE?

Secure access service edge, or SASE (pronounced “sassy”), is an emerging cybersecurity concept. It is the convergence of wide area networking.
September 2, 2020

Article

What is a Zero Trust Architecture

Zero Trust has become one of cybersecurity’s latest buzzwords. It’s imperative to understand what Zero Trust is, as well as what Zero Trust isn’t.
November 11, 2020

Article

What Is a Site-to-Site VPN?

A site-to-site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office network.
September 2, 2020

Article

What is an Endpoint?

An endpoint is a remote computing device that communicates back and forth with a network to which it is connected.
November 10, 2020

Article

What is an Intrusion Prevention System?

An IPS is a network security/threat prevention technology that examines network traffic flows to detect and prevent vulnerability exploits.
September 3, 2020

Be the first to know.

As a member you’ll get exclusive invites to events, Unit 42 threat alerts and cybersecurity tips delivered to your inbox.

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
Subscription Reward

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)
  • Facebook
  • Linkedin
  • Twitter
  • Youtube
Create an account or login

© 2021 Palo Alto Networks, Inc. All rights reserved.