Posts Tagged ‘hong kong

  • Google has acquired land in Hong Kong, Taiwan and Singapore to build data centers in these three locations, it said Wednesday.
  • The data centers will be the “first Google proprietary data centers in Asia,” and will be fully owned and operated by the company, said Taj Meadows, the company’s policy communications manager for Asia Pacific.
  • More people are coming online every day in Asia than in any other part of the world, so locating data centers there is an important next stage of Google’s investment in the region, the company said Local data centers will help the company provide faster and more reliable access to Google’s services, it added.
  • here is a large surge in Internet use in Asia, particularly for consumer applications, said Jun Fwu Chin, research manager for virtualization and data center at IDC Malaysia.
  • A number of new data centers are coming up in the region as multinational Internet and hosting companies set up data centers to serve local customers, and also to meet governments regulations in some countries that require data to be handled locally, Chin said.
  • The company has acquired 2.45 hectares of land in Jurong West, Singapore, and another 15 hectares of land in Changhua County, Taiwan, to build the data centers. It has also acquired 2.7 hectares of land in Kowloon, Hong Kong, for a data center there.
  • Google expects to invest over US$100 million in each of the facilities in Taiwan and Hong Kong, including the cost of land, construction and technical equipment. It did not specify the size of the investment in Singapore.

read more


Re-Strategising for More Thorough Coverage, Lower Cost


  • When asked about their IT security strategy, respondents believe that the top two areas of improvement by far are comprehensiveness of coverage and cost of their IT security implementation. They want coverage to be extended beyond the core network perimeter to areas like mobile endpoints and processes, and they want security-related costs to be reduced. Of the seven markets surveyed, Indian respondents ranked comprehensiveness of coverage as their no.1 priority (63%), followed by cost effectiveness (41%).


  • There are several drivers for the strategy changes. Heading the list are technologies under rapid adoption in India, including cloud computing (36% of respondents named it as the most important driver) and virtualisation (16%). Other influences shaping IT security strategy are the emergence of more sophisticated threats and attacks (15%), user-led IT (14%) and mobility (11%).


Enterprises Responding Faster to Changing Trends


  • In line with fast evolving trends, many organisations are assessing their IT security strategy frequently. As many as 80% of the respondents from India have conducted a full reappraisal of their information security strategy in the last 12 months.


  • In fact, the survey unveiled that as many as 85% of respondents are concerned about their firms’ ability to secure corporate data in this new user-led IT environment, where individual users, rather than enterprises, define the preferred IT practices and technologies they wish to use. South Korean and Indian organisations are the most worried (both 94%) by this IT consumerisation. Japan is the least worried, but even there, almost two thirds of the respondents (63%) say they are concerned.


Inadequate Security for Personal Mobile Devices


  • Across the sample, 94% of respondents say that they have a mobile security strategy defined.  Hong Kong and Taiwan are the most advanced markets in this area, both at 98% followed by India at 96%.


  • However, results indicate that most companies are not confident of or do not have the means to secure personal mobile devices:  67% of respondents say they only allow the use of corporate mobile devices onto which security policies can be directly enforced. Twenty six percent of enterprises place responsibility for securing personal mobile endpoints directly with the users/owners of those devices − a dangerous practice.


Wireless Networks: The Greatest Vulnerability


  • When asked about which parts of their IT infrastructure are vulnerable from a security standpoint, wireless networks are named most frequently (quoted by 59% of the respondents).  In terms of severity of risk, wireless networks are also rated highest, ahead of endpoints (ranked 2nd) and databases (3rd). Wireless networks are seen as particularly vulnerable in Japan, with 86% of that country’s respondents ranking it as their top threat, ahead of South Korea (61%) and Hong Kong (55%).


Migration to Application Aware and XML Firewalls has Started


  • Today’s security threats are no longer port-based and can slip into enterprise networks through applications. With application awareness and control capabilities underpinning the emergence of ‘next-generation’ firewalls and the death of traditional firewalling solutions, 42% of the respondents are now using, or plan to use, a firewall with application control features.  Specialised Web application and XML firewalls are also being adopted in significant numbers, with 45% of the overall sample now using, or planning to use, this technology to secure Web-based applications.


  • Singapore shows the highest rate of ‘next generation’ firewall adoption with 52% of its sample using this technology. India and South Korea follow closely, tying at 48%.


  • China and Taiwan are the largest adopters of Web application /XML firewalls, with 61% and 48% of their samples, respectively. India is 3rd with 44%.


Network Security Consolidation Gathering Momentum


  • To date, almost three quarters (71%) of respondents have consolidated security elements to take advantage of tighter security, simplified management and lower cost, and 90% of them say that they will continue consolidating security over the next 12 months.


  • Twenty-six percent of the sampled organisations plan to embark on a network security consolidation exercise for the first time in the next 12 months.  Only 3% of the respondents plan to continue abstaining from any network security consolidation in the foreseeable future.


  • South Korea is the furthest ahead in the network security consolidation game, with 78% of respondents already having done some form of consolidation. China is 2nd with 77% and Taiwan is 3rd with 74%.


  • In Japan, 14% of the sample feels they have embraced network security consolidation to the furthest extent desirable. This is twice as high as the Asian average of 7%.


  • Hong Kong organisations are most likely to start out on network security consolidation for the first time (34%). Singapore is 2nd with 32%. In Japan, the figure is only 18%.


India is likely to witness the rollout of fourth generation (4G) mobile telephony in 2012 even as third generation (3G) service is still gaining ground among mobile subscribers.

  • Search engine company to spend over $200m building facilities in Hong Kong, Singapore and Taiwan. Google will invest over $200m to build data centres in Hong Kong, Singapore and Taiwan, the Search engine company’s first data centres in Asia.
  • According to Bloomberg, Google has already acquired land in the three South-east Asia countries. The company told Blomberg that the data centres in Hong Kong and Taiwan are expected to cost over $100m each. The move is a part of Google’s wider strategy to expand its presence in Asia. At present, Google leases data centres in Asia to offer services in the region.
  • The search engine company has a growing user base in several Asian countries including China and India, where the company’s services such as search, e-mail and online maps are popular. Google’s Android is also widely used in Asia, with most Asian smartphone makers using the mobile-phone operating system.
  • The operation of the Asian facilities are expected to begin one to two years after construction begins, said the company.
  • Meanwhile, The New York Times has reported that the next great expansion of the world’s digital infrastructure is under way in developing markets such as China, Brazil and Argentina.

read more

January 2019
« Dec    

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 6 other followers


%d bloggers like this: