Streamline your Workflows with Microsoft Approvals

Streamline your Workflows with Microsoft Approvals

The pandemic has changed many things over the past year, remote work has now become a more widely accepted set up when it comes to managing your workforce’s schedules. However, even with cloud-based tools to help with collaboration, files and decisions can still be hard to track if it is scattered throughout different platforms like email, messenger apps, or even through video or audio calls.

This is not a problem for users of Microsoft Teams as Microsoft has recently added a new application called Approvals.

Approvals in Microsoft Teams allows users to create, manage, and share approvals directly from the Team app. Approval flows can be made directly from where users chat, channel conversations, or from the Approval app itself. They can be monitored easily from the Teams app and will notify approvers once the request has been made.

Your Approvals in one App

With Approvals, you can see and manage all approval requests in one app with all key details, status, requestors, and approvers. You can also track the progress of specific approvals to find out more on what’s happening or if there are delays.

Upload documents, images, links, and other files

Approval allows for requestors to upload files or pictures when creating approvals. This ensures that their task or request has supporting documents to prove completion and creates a faster approval cycle. This also makes it easier to find files when you need to find it.

Approvals built on the Power Platform

Approvals in Teams is built on top of Power Platform and is easily integrated to create an uninterrupted flow of work to reduce the wait time of tasks. With integration of Power Platform, you can do more than just simple approvals and rejections. Since it is a workflow app, you can immediately place tasks and objectives after an approval or rejection customized based on what you need, so that the flow of work continues until the end result you are after is achieved.

For example, you can create a flow to act on the request directly from Teams and define what happens after the request is approved (e.g. post a confirmation message in Teams) or rejected (e.g. create a task in Planner). When a specific form is submitted, this flow will automatically be triggered, which makes it easier for both the requestor and the approver to expedite the process.

To learn more about Microsoft Teams and Approvals, you can fill the form below and we will get in touch with you as soon as we can!

Improve Visibility and Detection Beyond Endpoints with Trend Micro XDR

Improve Visibility and Detection Beyond Endpoints with Trend Micro XDR

The threat landscape is always evolving, making it hard for traditional security measures to adapt to it. This has become even more prominent ever since the pandemic; threat actors have been taking advantage of the increased attack surfaces that remote work has provided. However, if you are only securing the endpoint side, you only see a part of the malicious activity and would not be able to properly find the source and cause of it.

Another thing that must be put into consideration is that not all companies have a dedicated security team to make sense of all the alerts that an organizations security solution may notify them of. If you have no one to analyze the alert or if your team can’t respond fast enough due to the number of alerts, you leave your network vulnerable to threat actors.

This is where a security solution like Trend Micro’s XDR can help.

Better visibility of threats to your network

Trend Micro XDR has a reference of indicators of compromise (IoC) that is capable of scanning not just endpoints, but also across emails and network servers, giving your IT team more security visibility of your infrastructure.

Investigating across your organization

Trend Micro XDR allows your IT team to find threats that may have bypassed your security before and also allows you to investigate threats that have already been blocked to find their origin.

Extending your security team

With Trend Micro Managed XDR, you are able to outsource experts from Trend Micro to help interpret the security reports and alerts to quickly remediate threats to your network. This is helpful in both situations in which you have a dedicated security team, as it helps free their time to do other tasks, and those who cannot afford to have a dedicated team.

Machine learning and signatures

Machine learning is used to ensure that files you download are safe through sandboxing to ensure no malicious actions are done once it is running. Signatures on the other hand help quickly distinguish known malicious files and immediately blocks them once detected.

Virtual patching

Once an exploit is found, you need to apply the necessary vendor patch to ensure your business-critical server is safe. However, as we know this is usually easier said than done as patching requires your operations to stop. With Trend Micro, you are able to virtually patch your machine to protect you from the exploit while you slowly patch your business-critical servers.

These are just some features of the XDR suite that Trend Micro Offers, if you are interested in learning more on Trend Micro XDR or other security solutions, you may fill out the form below and we will contact you as soon as we can!

Prevent data loss from remote endpoints and SaaS apps with Unitrends Cloud Backup

Prevent data loss from remote endpoints and SaaS apps with Unitrends Cloud Backup

Working from home is now the norm when it comes to business. However, this now makes data loss more common as devices are now outside your network perimeter. Traditional backup solutions require your devices to be connected to your network for it to backup your files, so for every day those endpoints are not in the network, the risk of losing data becomes higher.

This is where a Unitrends Cloud Backup can help. Through a quick and easy download of the backup agent, you can immediately start protecting your data outside your network from accidental deletion or unsuspected data corruption.

Addressing the issues of bandwidth

In the Philippines, connectivity reliability and speed are the major factor why most companies don’t see cloud as a viable option for business operations. This is a concern for cloud backup due to the heavy initial upload that is needed to create the first backup that needs to maintained (succeeding backups are just small updates to the initial backup which usually are small uploads).

Unitrends Cloud Backup navigates this problem by allowing users to gradually upload their important file to lessen the amount of initial size of the upload. From there, they can prioritize which are the important files that need to be backed up and slowly create the bigger file snapshot to be maintained. The bandwidth consumption can also be controlled by the admin so that bandwidth usage of the solution does not interrupt the business operations of the end user and can even be automated to start at a less intrusive time.

Importance of SaaS Backup

SaaS applications such as Office 365 have grown in popularity since the pandemic started. They helped many to collaborate with colleagues remotely and served as a platform to share their important data. However, many are not aware that data in the cloud are not exempt from the dangers of data loss. According to Unitrends research, over 75% of SaaS applications experience data loss every year. These data losses can be attributed to either intentional or unauthorized deletion and corruption of files.

Creating a separate backup of files with Unitrends Cloud Backup can help mitigate this risk while giving your company a flexible way to recover the data on demand, saving you from incurring loss of productivity time and potential financial loss.

If you are interested in learning more about Unitrends Cloud Backup, you can contact us by filling out the form below and we will contact you as soon as we can!

Increase Business Efficiency and Lower Operation Costs with HPE Synergy!

Increase Business Efficiency and Lower Operation Costs with HPE Synergy!

HPE Synergy, the most modern blade infrastructure, lets you to automate operations, instantly deploy and redeploy infrastructure, develop apps and services faster, and run any workload within a hybrid cloud environment.

Start your HPE Synergy transition by discovering eye-opening business value metrics from IDC. Below is a short video showing how you can make your transition as easy as possible:

Defer over 90% of IT costs until 2021

Our 2020 Payment Relief Program lets you navigate temporary cash flow challenges when acquiring IT.

223% ROI ​–​ 35% lower cost of operations

This IDC infographic presents a series of quantified IT and operational outcomes reported during interviews with HPE Synergy customers.

To learn more about HPE Synergy, please fill out the form below and we will get back to you as soon as we can!

Secure your Hybrid Workforce with Citrix Secure Internet Access

Secure your Hybrid Workforce with Citrix Secure Internet Access

The landscape of business in the Philippines has changed. Despite some offices slowly resuming to normalcy, many are now still more open to allowing a hybrid or even pure remote work schedule. This increase of remote work has helped increased mobility but could have security implications if not addressed properly.

Remote workers may be connecting to cloud-hosted or SaaS applications with commodity Internet. This scenario lacks consistent, fast and secure access to applications. There may even be some cases when employees often disconnect from their VPN clients when accessing web and SaaS applications which leaves them unprotected and vulnerable to threats.

Hence, security measures can be increased by backhauling the traffic to the data center to mitigate these threats. However, these can come at the cost of application performance as it bottlenecks traffic.

The challenge of remote access is balancing the user experience and security. Users want to be able to access applications through any device at any time. To create an environment to facilitate this while maintaining corporate security standards is required.

This is where Citrix Secure Internet Access (SIA) can help. It offers a comprehensive, cloud-delivered security architecture to protect your users, regardless of their location.

Network Security for Remote Access

Citrix SIA can secure all access to your Internet and SaaS apps. Web applications such as Google Drive, Salesforce, LinkedIn, Workday, YouTube, Facebook or even just Internet browser traffic are within the scope of SIA’s securing capabilities. It does this through the following:

Inspect all Internet traffic

Personal devices are great for user experience but do not have the safety mechanisms found in corporate devices. Threat actors take advantage of this through Internet browsing or SaaS traffic as they use compromised devices. By allowing a proxy to inspect all incoming traffic, it greatly reduces the risk of malicious attacks to your network through a multitude of security checks before it reaches your datacenter.

Allowing the proxy to do this also allows it to focus more on load balancing requests which results in a better user experience. This is crucial as the increased number of requests coming from outside the network will typically need to do both security checks and grant access requests, which results to a bottleneck that slows down performance.

Block malware attacks to the network

By leveraging Citrix SIA’s database of known threats, detecting malicious activities becomes faster and remediations to it are applied sooner. Website access can also be allowed or blocked by comparing requested URLs with a filtering database that is defined per organizational policy.

Malware is a big factor when considering a security solution, as knowing what kind of attack on your system is a big advantage when you are inspecting incoming traffic. This is something that can save your business time and expenses in the long run.

Isolate new and unknown threats through sandbox

When considering the nature of threats, there will come a time when your security check will encounter a threat not part of any known database. This is something to be expected as many new threats are being made everyday and updates don’t come fast enough to the database. Citrix SIA handles this through sandboxing suspicious traffic or files. By isolating the suspicious activity or file in a simulated environment, you allow your network to test in real time what could happen in the real environment through simulation. This can help determine the nature of the suspicious file or activity and greatly minimize the risk it would have to your network.

Provide secure direct Internet access for better user experience

With Citrix SIA acting as the proxy for the data center to ensure these security policies are enforced, users will be able to directly access the Internet and SaaS applications instead. This greatly improves the response time of applications and Internet browsing experience.

Companies no longer have to route their user’s Internet traffic back to their data center for security checks to prevent users from accessing potentially dangerous or unproductive web pages that can cause sub-optimal performance for applications due to the roundabout way traffic is routed. With a direct Internet access, users remain consistently protected no matter where they are.

Consolidate your network security products for simplified management

Businesses have increased the number of security products implemented into their infrastructure over the years to address different security measures. However, these solutions can increase the complexity of your IT infrastructure because of the lack of visibility and scalability.

Citrix SIA can help consolidate your network security and monitor activities by providing you a single dashboard to monitor all network security which can be monitored through the cloud. It also is easily deployable to users needing no need for IT assistance while maintaining a simple and intuitive user interface. With a cloud-delivered architecture, you can easily scale up even as new applications, users or locations are added.

Click here and discover how to roll out secure browsers and isolate Internet browsing in your digital workspace.

Citrix SIA is just one service in a bigger solution offering that Citrix just launched. We will be discussing the other services within the Citrix SASE offering in other articles to come, so please look forward to it!

Security Advisory: Multiple Microsoft Exchange exploits being used by Threat Actor Hafnium

Security Advisory: Multiple Microsoft Exchange exploits being used by Threat Actor Hafnium

Microsoft has recently just announced a security update with regards to a set of new exploits found being primarily used by a state-sponsored threat actor based in China which Microsoft has called Hafnium. The previously unknown exploits used by Hafnium targets on-premise exchange server software to gain initial access to the network by disguising themselves as someone with access privilege. They then create what is known as a web shell to gain control over the compromised server remotely, making it easy to steal data.

Affected Servers and the Remediation

The exploits used by Hafnium targets Microsoft Exchange Servers, so users of Microsoft Exchange Online are not affected. Below are the versions that can be targeted by the exploits:

  • Microsoft Exchange Server 2013 
  • Microsoft Exchange Server 2016 
  • Microsoft Exchange Server 2019

Microsoft highly recommends that businesses with the affected Exchange servers immediately update them with the latest security updates to ensure protection against the exploits. If you are unable to immediately do so for all servers, Microsoft has said that you need to first prioritize external facing servers as they are the most vulnerable to these attacks but ultimately you would need to update them all to stay safe. Listed below are the security patches released by Microsoft for each exploit:

Is it possible to check if I have been already affected by these exploits?

Microsoft has released a detailed guide on ways to check you network logs to see if you have been affected, you may refer to this link if you would like to read more on it.

Enhance your VPN security with Multifactor Authentication!

Enhance your VPN security with Multifactor Authentication!

Today, traditional username and password is no longer enough to ensure the security of your network. As users are likely to reuse passwords, credentials are vulnerable to leakage, which become additional potential entry points for threat actors.

This is because cyberattacks now indirectly target networks through your users and their devices. In the Philippines where virtual private network (VPN) is widely used to remotely access the corporate network, this becomes a prime target. With only traditional username and password as security in place, it is difficult to verify if the access request is from a legitimate user, and thereby, easily granting unrestricted access to your network.

So what can companies do to mitigate these threats? This is where multi-factor authentication (MFA) solutions like RSA SecurID come in.

Confidently authenticate users with RSA SecurID

To achieve a higher level of security for your network, you need an adaptive way to verify user identity before authenticating. By having an MFA solution in place, it minimizes the risks of allowing compromised user accounts into your network, especially with the huge repercussions as VPNs usually provide users a full access. This is done through authentication steps like approving via push notifications, biometrics, and one-time passwords. Access requests are also screened by SecurID’s risk analysis before access is granted.

When using a VPN, companies are unable to get the control and visibility that they need to ensure security of their network if user convenience is in consideration and vice versa. RSA SecurID eliminates this dilemma through the following:

Creating a single platform to access and authenticate when accessing the VPN, which eliminates the need of multiple MFA solutions on an on-app basis while maintaining compatibility for your legacy or modern (whether its on-prem, private, or public) applications.

Providing a high level of identity assurance that gives your security a strong mechanism for confirming users are who they say they are

Giving users a choice over how they authenticate (either through push notifications, biometric or one-time password)

Granting users a way to authenticate quickly and intuitively with real-time responses at no expense of productivity

On top of these, It is easy to deploy and manage. Users only need to download the SecurID app through their preferred app store (IoS, Android, or Windows) while administrators are able to manage all account through a single window.

If your company is looking for ways to improve your access gateway security whether it be for legacy applications, on-premise or cloud apps, SecurID has the capabilities to ensure identity assurance.

To learn more about RSA SecurID and multi-factor authentication solutions, fill out the contact form below and we will get back to you as soon as we can!

Improve your Zero trust Strategy with Pulse Zero Trust Access!

Improve your Zero trust Strategy with Pulse Zero Trust Access!

Digital transformation is changing the business norms. Access and connectivity are becoming more flexible as devices, users, applications, and infrastructure adapt to a new era of hyper-connectivity. This has prompted enterprises to consider how to secure access for their users and applications while managing cybersecurity risks in a network with little to no boundaries. This is where Zero Trust solutions like Pulse Zero Trust Access (PZTA) comes into play.

The PZTA platform enables diverse users from any location to access public, private, and multi-cloud applications as well as data center resources securely while staying user friendly. Be it a hybrid cloud or pure cloud strategy, PZTA can help organizations enhance their security, productivity, and compliance while also improving administrative and user experience.

Below are a few key areas in which PZTA can help improve:

On-premises, SaaS and Hybrid Cloud Applications

PZTA allows you to have Zero Trust Secure access remotely or on-site to your corporate applications whether they are located in your network perimeter or in the cloud (private or public). Users and devices are authenticated continuously while maintaining secure entry points for your network and user device through the use of encryption channels.

Keeping user and application traffic
within the corporate network

Organizations can be confident when users from any location access any application using any device. All user traffic is directed to PZTA which acts as a middleman where user requests are fulfilled by PZTA accessing data from the corporate network on their behalf. Since data are not accessed directly by users, this lowers the area of attack of compromised accounts and devices.

Difficulty of managing
resources in the cloud

The PZTA cloud-based service emulates the same access and management experience as an on-prem solution. This means that you can enable the same level of visibility, compliance, enforcement, and analytics as you would in an on-prem solution.

Visibility, Enforcement and Compliance Reporting

PZTA provides a single pane-of-glass visibility of all users connecting to your network, regardless of the location of the user, application, or resource.

Visibility gaps

From the PZTA dashboard, administrators can get holistic visibility of users, devices, infrastructure, and applications as all access is authenticated and authorized by it. These are also logged in the dashboard for reporting and auditing purposes.

Ensuring user endpoint compliance

PZTA first goes through a set of policies during authentication to see if devices trying to access the corporate network are compliant. Users can then follow pre-defined remediation given set by the administrators so that they may access the network.

Measuring users’ risk factors

User activities are measured and given a “risk score” based on users’ behavioral patterns. Stricter authentication or restrictions can be dynamically applied to verify the user’s identity once there is behavior outside the norm detected. This continuous anomaly and malicious activity detection is used to ensure the network’s security.

These are just a few ways in which Pulse Zero Trust Access can help companies improve their visibility and security. If you would like to learn more about Pulse Secure solutions, you may fill out the form below and we will contact you as soon as we can!

Protect Confidential Data outside the office with Microsoft AIP!

Protect Confidential Data outside the office with Microsoft AIP!

Data is the cornerstone of a business; this is why security is a major factor in any IT environment. However, security does not safeguard your data once it leaves the network perimeter, whether it was shared within or outside the network. Many companies are aware of this and are now looking into ways to solve it. This is where Rights Management solutions such as Azure Information Protection comes in.

What is AIP?

AIP is a cloud-based solution that gives organizations the ability to classify and protect its sensitive data such as documents and emails by using labels. Labeling can be done automatically by either administrators who define rules and policies, manually by users, or even a combination where users are given recommendations.

Labeling can be used to classify which files in your organization are confidential. Depending on the level of sensitivity, several restrictions can be placed on data that leave the network control. These are some examples on how the restrictions can be applied::

Limiting access to users of your organization or those who are granted permission.

Users cannot forward an email or copy information from it that contains news about an internal reorganization.

Locking the forwarding option, adding recipients on replies and copy paste functions on emails.

Setting a time limit for accessing files (such as for price lists)

Besides protecting your data, AIP’s labeling can also help a company’s visibility over its data. This is done through the data classification page which shows how data is being used by the users and how users are applying labels. Below are some of the information you can get through the page:

The number of items that are classified as sensitive and what they are classified as

A summary of actions users did with the sensitive data

The location of sensitive data

With AIP, organizations using Office products can rest assure that they will have a maintained level of visibility on their data and that these will stay confidential. Now, collaboration can be empowered from inside and outside your organization by protecting sensitive information such as emails and documents with encryption, restricted access and rights, and integrated security in Office apps.

If you are interested in learning more about AIP or Office 365, fill out our contact form below and we’ll get back to you as soon as we can!

Protect users from browser based-attacks with Citrix Secure Workspace Access

Protect users from browser based-attacks with Citrix Secure Workspace Access

The way we work has changed. The imposed strict social distancing rules due to the global pandemic, combined with the growing representation of the digital-savvy millennials in the workforce were catalysts in moving organizations forward in their digital transformation journey to increase employee mobility.

However, this shift in workplace culture has increased the security risks brought about by the proliferation of BYO devices of employees that access resources via VPN. When not secured properly, these devices serve as additional entry points for cybercriminals to the organization’s network.

Key challenges in traditional security controls

Mishandling of data and misuse of network access have become a growing concern, increasing the demand for more control and visibility over the users’ granular access to permissions to data.

Threats that may come from malicious websites, such as spoofing web conferencing sites, should be isolated from the corporate network to protect corporate data.

Employees may knowingly (or unknowingly) access restricted websites such as pornographic or social media web pages. The organization must block those attempts to protect its assets.


To address these challenges is a big step forward for organizations to improve their digital transformation journey. Although this is easier said than done, Citrix may have the answer to help you address these challenges.

Citrix Secure Workspace Access

The Citrix Secure Workspace Access service provides a unified experience by integrating single sign-on, remote access, and content inspection into a single solution for an end-to-end Secure Workspace Access. It does this by providing your administrators the ability to:

Configure a workspace to securely add, manage and deliver access to apps from any device

Configure web filtering to allow/block websites that can be accessed by the end-user

Isolate web browsing to protect the corporate network from browser-based attacks with no user device configuration needed

With these, administrators can rapidly roll out secure browsers, providing instant time-to-value. By isolating internet browsing, IT administrators can offer end users safe internet access without compromising enterprise security.

This is only the tip of what Citrix Secure Workspace Access can provide to your organization, if you would like to learn more, you may fill out the form below and we will get back to you as soon as we can!