<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.brocent.com.sg/blogs/it-managed-service/feed" rel="self" type="application/rss+xml"/><title>Managed IT Services Singapore - Blog , IT Managed Service</title><description>Managed IT Services Singapore - Blog , IT Managed Service</description><link>https://www.brocent.com.sg/blogs/it-managed-service</link><lastBuildDate>Sat, 13 Sep 2025 23:57:35 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[How Brocent helps telecom customers deploy Aruba security devices globally]]></title><link>https://www.brocent.com.sg/blogs/post/How_Brocent_helps_telecom_customers_deploy_Aruba_security_devices_globally</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/IMG_2810.jpeg"/>We have extensive experience and expertise in deploying Aruba security devices, which are designed to provide edge-to-cloud security for any network environment.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Snph6tDKTtSLt9DPE5Cxxw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6_ZhodxNTUKLRkRMFPGDTQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_qiMKzVYBT8ucYOwYC-lIUg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Ry2qcrcBRzGtDfMG5FBNlw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ry2qcrcBRzGtDfMG5FBNlw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">How Brocent helps telecom customers deploy Aruba security devices globally</span></h2></div>
<div data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ"] .zpimage-container figure img { width: 700px !important ; height: 466px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ"] .zpimage-container figure img { width:700px ; height:466px ; } } @media (max-width: 767px) { [data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ"] .zpimage-container figure img { width:700px ; height:466px ; } } [data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/IMG_2810.jpeg" width="700" height="466" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm__P5aNkYORzGvEneAALlE3A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__P5aNkYORzGvEneAALlE3A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>Brocent is a leading provider of IT infrastructure and security solutions for telecom customers worldwide. We have extensive experience and expertise in deploying Aruba security devices, which are designed to provide edge-to-cloud security for any network environment.</p><p>In this post, we will share some of the key success factors that enable us to support our telecom customers in more than 30 countries and cities with Aruba security device deployment, including:</p><ul><li>Staging: We perform pre-configuration, testing, and validation of Aruba security devices at our staging facilities before shipping them to the customer sites. This ensures that the devices are ready to be installed and integrated with the existing network infrastructure, reducing the risk of errors and delays.</li><li>Logistic: We manage the end-to-end logistic process of delivering Aruba security devices to the customer sites, including customs clearance, transportation, and tracking. We also handle the reverse logistic of returning or disposing of the old devices, ensuring compliance with environmental and security standards.</li><li>Onsite installation: We deploy our certified and experienced engineers to perform onsite installation of Aruba security devices, following the best practices and guidelines from Aruba. We also provide onsite training and documentation for the customer staff, enabling them to operate and manage the devices effectively.</li><li>Technical configuration: We configure Aruba security devices according to the customer’s specific requirements and preferences, using the latest software and firmware updates from Aruba. We also leverage Aruba’s advanced features and capabilities, such as Zero Trust, SASE, and AI, to optimize the performance and security of the network.</li><li>Post-deployment 24x7 maintenance services: We offer post-deployment 24x7 maintenance services for Aruba security devices, including remote monitoring, troubleshooting, and support. We also provide periodic reports and recommendations for network improvement and optimization, ensuring that the customer’s network is always secure, reliable, and efficient.</li></ul><p>By providing these comprehensive and customized services, we help our telecom customers deploy Aruba security devices with ease and confidence, enhancing their network security and customer experience. If you are interested in learning more about our Aruba security device deployment services, please contact us today. We would love to hear from you and discuss how we can help you achieve your network security goals.</p></div></div>
</div><div data-element-id="elm_T-ylNR3ySBKBHu5HLSnwOg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_T-ylNR3ySBKBHu5HLSnwOg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 04 Feb 2024 01:02:26 +0000</pubDate></item><item><title><![CDATA[How Brocent Controls the Cost and Rewards a High Quality IT Managed Service to Customer]]></title><link>https://www.brocent.com.sg/blogs/post/How_Brocent_Controls_the_Cost_and_Rewards_a_High_Quality_IT_Managed_Service_to_Customer</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/2-1.jpg"/>Brocent is a leading IT managed service provider in Asia, with over 15 years of experience in delivering professional, reliable, and cost-effective IT solutions to various industries.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_4N_8fq0kRMuVWRLeVyJG_g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_qa9qSaXFTJ2kUJS--h06ZA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cZFN_AEtQ72HmHs9QqJJRw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9F0xAiv9TPSxgXLvQhzXdQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9F0xAiv9TPSxgXLvQhzXdQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">How Brocent Controls the Cost and Rewards a High Quality IT Managed Service to Customer</span></h2></div>
<div data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg"] .zpimage-container figure img { width: 648px !important ; height: 430px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg"] .zpimage-container figure img { width:648px ; height:430px ; } } @media (max-width: 767px) { [data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg"] .zpimage-container figure img { width:648px ; height:430px ; } } [data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/2-1.jpg" width="648" height="430" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm__38ze_5ZRWiR5YDYwnDk2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__38ze_5ZRWiR5YDYwnDk2g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>Brocent is a leading IT managed service provider in Asia, with over 15 years of experience in delivering professional, reliable, and cost-effective IT solutions to various industries. Brocent’s mission is to help its customers transform their IT infrastructure, discover IT value, and achieve business success. In this post, we will share some of the strategies that Brocent uses to control the cost and reward a high quality IT managed service to customer.</p></div></div>
</div><div data-element-id="elm_ubUIJCLbl2mQeF74KumSdA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ubUIJCLbl2mQeF74KumSdA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strategy 1: Define and monitor service level agreements (SLAs)</span></h2></div>
<div data-element-id="elm_s69pmXFbabvQ7sUKstCiHQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s69pmXFbabvQ7sUKstCiHQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Brocent understands the importance of setting clear and realistic expectations with its customers, and ensuring that they are met or exceeded. That is why Brocent defines and monitors service level agreements (SLAs) with its customers, which specify the scope, quality, and metrics of the service provided, as well as the penalties for non-compliance.to track and optimize its IT service management metrics, and to provide transparent and timely reports to its customers. Brocent also conducts regular reviews and audits of its SLAs, and adjusts them as needed to reflect changing customer needs and market conditions.</p></div></div>
</div><div data-element-id="elm_4raAZuW7Ub1384kIMh6Pgw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4raAZuW7Ub1384kIMh6Pgw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strategy 2: Use the right tools and automation</span></h2></div>
<div data-element-id="elm_CHtgkFHIVfxIU6qWUKZ3vQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CHtgkFHIVfxIU6qWUKZ3vQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Brocent leverages the power of tools and automation to streamline its processes, reduce errors, increase efficiency, and enhance customer satisfaction. Brocent uses tools such as Manage Engine MSP to manage its customer service,&nbsp; to learn best practices and tips for selling managed services, and various cloud platforms to provide flexible and scalable IT solutions. Brocent also uses automation to perform routine tasks, such as backups, updates, patches, and security checks, and to alert its staff of any issues or anomalies. By using the right tools and automation, Brocent can control its operational costs, improve its service quality, and deliver faster and better results to its customers.</p></div></div>
</div><div data-element-id="elm_IHO3AbNdguTSGbtnQHizXA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IHO3AbNdguTSGbtnQHizXA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strategy 3: Train and empower its staff</span></h2></div>
<div data-element-id="elm_BJsfU8sh0hOZXhOwnPriDg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BJsfU8sh0hOZXhOwnPriDg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Brocent recognizes that its staff are the backbone of its IT managed service, and that they play a vital role in delivering high quality service to its customers. Therefore, Brocent invests in training and empowering its staff with the skills, knowledge, and resources they need to perform their tasks effectively and efficiently. Brocent provides its staff with regular feedback, recognition, and rewards, and creates a culture of continuous learning and improvement. Brocent also empowers its staff to make decisions and take actions that are in the best interest of the customer, and to communicate openly and honestly with the customer. By training and empowering its staff, Brocent can boost their morale, motivation, and productivity, and reduce turnover and attrition.</span></span><br></p></div>
</div><div data-element-id="elm_PUXkEhmLLbWe-ZFixxpR4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PUXkEhmLLbWe-ZFixxpR4Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strategy 4: Collect and act on customer feedback</span></h2></div>
<div data-element-id="elm_aBou9NT-NhHoVen6dBg-9g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_aBou9NT-NhHoVen6dBg-9g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Brocent values customer feedback as a key source of information and insight to understand its customer’s needs, expectations, and satisfaction, and to identify any gaps or issues in its service. Brocent collects customer feedback through various channels, such as surveys, reviews, testimonials, referrals, and social media. Brocent also analyzes and acts on the feedback it receives, and uses it to improve its service quality, customer loyalty, and retention. Brocent strives to exceed its customer’s expectations, and to provide them with a positive and memorable experience.</p><div style="color:inherit;"><p>We hope this post helps you to understand how Brocent controls the cost and rewards a high quality IT managed service to customer.<a href="https://www.brocentasia.com/" id="3585231a-622d-c394-49c8-ee8e64441300-21-group">If you are interested in learning more about Brocent’s IT managed service offerings, please visit our website</a><span style="font-size:12.5px;">&nbsp;</span>or contact us. Thank you for reading. 😊.</p></div></div></div>
</div><div data-element-id="elm_cAga-kOqQRmr7SZkXWR0_w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_cAga-kOqQRmr7SZkXWR0_w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 29 Jan 2024 01:29:37 +0000</pubDate></item><item><title><![CDATA[How Global Labor Cost Increase Impacts IT Managed Services]]></title><link>https://www.brocent.com.sg/blogs/post/how_global_labor_cost_increase_impacts_it_managed_services</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/1.jpeg"/>IT managed services are the practice of outsourcing the responsibility for maintaining, and anticipating the need for, a range of processes and functions in order to improve operations and cut expenses.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_civ7QMYSQQSDmf56DeHVlA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_FQ5t94F4S5mohgG6Ek9qPA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_9pf5q-QWREqWFCij75rtiQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Y1iEEvEfQsKjCRV95t6TyA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Y1iEEvEfQsKjCRV95t6TyA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1>How Global Labor Cost Increase Impacts IT Managed Services</h1></div></h2></div>
<div data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ"] .zpimage-container figure img { width: 648px !important ; height: 364px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ"] .zpimage-container figure img { width:648px ; height:364px ; } } @media (max-width: 767px) { [data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ"] .zpimage-container figure img { width:648px ; height:364px ; } } [data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/1.jpeg" width="648" height="364" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_I-gykFQTT4KPW2QyEK2tjg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_I-gykFQTT4KPW2QyEK2tjg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>IT managed services are the practice of outsourcing the responsibility for maintaining, and anticipating the need for, a range of processes and functions in order to improve operations and cut expenses. IT managed services can include network management, security, cloud computing, data analytics, software development, and more.</p><p>The global labor market has undergone significant changes in the past few years, due to the combined effects of the COVID-19 pandemic, the Fourth Industrial Revolution, the green and energy transition, and the geopolitical volatility. These changes have resulted in diverging labor-market outcomes between low-, middle- and high-income countries, as well as among workers within the same country. One of the key trends that has emerged is the increase in labor costs, especially in the IT sector.</p><p>Labor costs are the total amount of money paid to employees, including wages, salaries, benefits, taxes, and other expenses. Labor costs affect the demand for labor, as well as the profitability and competitiveness of businesses. Higher labor costs can make workers better off, but they can also reduce companies’ profits, the number of jobs, and the hours each person works.</p><p>The increase in labor costs in the IT sector can be attributed to several factors, such as:</p><ul><li>The rising demand for IT skills and talent, driven by the digital transformation of various industries and sectors, as well as the emergence of new technologies such as generative AI, IoT, blockchain, and others.</li><li>The shortage of IT workers, especially in high-income countries, due to the mismatch between the supply and demand of IT skills, the aging of the workforce, the immigration restrictions, and the low participation of women and minorities in STEM fields.</li><li>The increasing bargaining power of IT workers, due to their high mobility, flexibility, and productivity, as well as their ability to work remotely and across borders.</li><li>The growing pressure from workers, consumers, and regulators for better working conditions, higher wages, and more social and environmental responsibility from IT companies.</li></ul><p>The increase in labor costs in the IT sector has significant implications for IT managed services, both for the providers and the clients. Some of the possible impacts are:</p><ul><li>IT managed service providers may face higher operational costs, lower profit margins, and reduced competitiveness in the global market. They may also struggle to attract and retain qualified IT workers, as well as to meet the quality and service standards of their clients.</li><li>IT managed service clients may benefit from lower capital expenditures, higher operational efficiency, and access to specialized IT skills and solutions. However, they may also face higher service fees, lower service quality, and increased dependency and vulnerability to their providers.</li><li>IT managed service providers and clients may need to adopt new strategies and practices to cope with the rising labor costs, such as:</li><ul><li>Investing in automation, digitalization, and innovation to reduce the reliance on human labor and increase the productivity and quality of IT services.</li><li>Leveraging cloud computing, data analytics, and AI to optimize the allocation and utilization of IT resources and capabilities.</li><li>Outsourcing more IT functions and processes to low- and lower-middle-income countries, where labor costs are relatively lower and IT talent is abundant and growing.</li><li>Developing new business models and partnerships to share the risks and rewards of IT managed services, such as outcome-based contracts, co-creation, and co-innovation.</li><li>Enhancing the skills and competencies of IT workers, both in-house and outsourced, to adapt to the changing IT landscape and the evolving needs of IT managed services.</li><li>Improving the working conditions, wages, and benefits of IT workers, both in-house and outsourced, to attract and retain them, as well as to meet the social and environmental expectations of workers, consumers, and regulators.</li></ul></ul><p>The global labor cost increase is a complex and dynamic phenomenon that affects the IT managed services in various ways. IT managed service providers and clients need to understand the causes and consequences of this trend, and to adopt appropriate strategies and practices to leverage the opportunities and overcome the challenges that it poses.</p></div></div></div>
</div><div data-element-id="elm_GIAdybvBSkGmwC6qOBbURQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_GIAdybvBSkGmwC6qOBbURQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 29 Jan 2024 01:20:13 +0000</pubDate></item><item><title><![CDATA[Why You Need to Understand "Secure by Design" Cybersecurity Practices]]></title><link>https://www.brocent.com.sg/blogs/post/why_you_need_to_understand_secure_by_design_cybersecurity_practices1</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/TTT_Blog-Post-Social-Media-Image-Why-You-Need-to-Understand-Secure-by-Design-Cybersecurity-Prac.png"/>Cybersecurity has become a critical foundation upon which many aspects of business rely.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_zIkrcqwmSkG5ouotkmgSvA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2QTxpUWdTsmEhIAZdN4kDQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PhGTXzT3Q1O5p0RHuZ2Chw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_PhGTXzT3Q1O5p0RHuZ2Chw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_x-uvDh9aRKSJWBm9KGKmcw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_x-uvDh9aRKSJWBm9KGKmcw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Why You Need to Understand &quot;Secure by Design&quot; Cybersecurity Practices</span></h2></div>
<div data-element-id="elm_H245wnW4L-uv5lXi6pg10A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_H245wnW4L-uv5lXi6pg10A"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_H245wnW4L-uv5lXi6pg10A"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_H245wnW4L-uv5lXi6pg10A"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_H245wnW4L-uv5lXi6pg10A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/TTT_Blog-Post-Social-Media-Image-Why-You-Need-to-Understand-Secure-by-Design-Cybersecurity-Prac.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_g3l81FkBTDqosCbcg7ddIw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_g3l81FkBTDqosCbcg7ddIw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you’re a large enterprise or small business, network security is a must. Cyberattacks can have long-term consequences. </span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">The frequency and sophistication of cyberattacks continue to increase. In 2022, IoT malware attacks saw a sobering </span><a href="https://www.techopedia.com/cybersecurity-statistics"><u><span style="font-size:11pt;">87% increase</span></u></a><span style="font-size:11pt;">. Attack volume is also ramping up due to the use of AI.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">It’s essential to shift from a reactive to a proactive cybersecurity approach. One such approach that has gained prominence is &quot;Secure by Design&quot; practices. </span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">International partners have taken steps to address commonly exploited vulnerabilities. A </span><a href="https://executivegov.com/2023/08/us-international-partners-release-advisory-on-addressing-common-exploited-vulnerabilities/"><u><span style="font-size:11pt;">recent advisory</span></u></a><span style="font-size:11pt;">&nbsp;highlights Secure by Design principles. This collaborative effort underscores the global nature of the cybersecurity threat landscape. As well as the need for coordinated action to protect critical infrastructure. </span></p><p style="text-align:justify;"><span style="font-size:11pt;">In this article, we'll explore what it takes to put in place Secure by Design principles. And explain why they are paramount in today's cybersecurity landscape.</span></p></div></div>
</div><div data-element-id="elm_2ya6o1g7xPlcn0Hr10in5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2ya6o1g7xPlcn0Hr10in5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">Today’s Modern Cyberthreats</span><br></p></div></h2></div>
<div data-element-id="elm_jZUuAVLqkkzYKDNlnjZ38g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jZUuAVLqkkzYKDNlnjZ38g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Cybersecurity threats have evolved significantly over the years. Gone are the days when just installing an antivirus could protect your computer. Today, cybercriminals use highly sophisticated tactics. The potential impact of an attack goes far beyond the inconvenience of a virus.&nbsp;</span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Modern cyber threats encompass a wide range of attacks, including:</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">1.&nbsp;</span><b><span style="font-size:11pt;">Ransomware:</span></b><span style="font-size:11pt;">&nbsp;Malware that encrypts your data and demands a ransom for decryption. One of the costliest attacks for businesses.</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">2.&nbsp;</span><b><span style="font-size:11pt;">Phishing:</span></b><span style="font-size:11pt;">&nbsp;Deceptive emails or messages that trick you into revealing sensitive information. </span><a href="https://www.techopedia.com/phishing-statistics"><u><span style="font-size:11pt;">Eighty-three</span></u></a><span style="font-size:11pt;">&nbsp;percent of companies experience a phishing attack each year.</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">3.&nbsp;</span><b><span style="font-size:11pt;">Advanced Persistent Threats (APTs):</span></b><span style="font-size:11pt;">&nbsp;Long-term cyberattacks aimed at stealing sensitive data.</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">4.&nbsp;</span><b><span style="font-size:11pt;">Zero-Day Exploits:</span></b><span style="font-size:11pt;">&nbsp;Attacks that target vulnerabilities not yet known to software developers.</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">5.&nbsp;</span><b><span style="font-size:11pt;">IoT Vulnerabilities:</span></b><span style="font-size:11pt;">&nbsp;Hackers exploit vulnerabilities in Internet of Things (IoT) devices to compromise networks.</span></p><p style="text-align:justify;"><span style="font-size:11pt;">These evolving threats underscore the need for a proactive approach to cybersecurity. Instead of reacting to attacks after they occur, you want to prevent them from happening.</span></p></div></div>
</div><div data-element-id="elm_Z8fqQypqr3RaN-PO5ul2Vw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Z8fqQypqr3RaN-PO5ul2Vw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">What Is Secure by Design?</span></h2></div>
<div data-element-id="elm_N4LIVefmQl-a_AbvBlG3yQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_N4LIVefmQl-a_AbvBlG3yQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Secure by Design is a modern cybersecurity approach. It integrates security measures into the very foundation of a system, app, or device. It does this from the start. </span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">It's about considering security as a fundamental aspect of the development process. Rather than including it as a feature later.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">How can businesses of all types translate this into their cybersecurity strategies? There are two key ways:</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">1.&nbsp;</span><span style="font-size:11pt;">When purchasing hardware or software, ask about Secure by Design. Does the supplier use these practices? If not, you may want to consider a different vendor.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">2.&nbsp;</span><span style="font-size:11pt;">Incorporate Secure by Design principles into your own business. Such as when planning an infrastructure upgrade or customer service enhancement. Put cybersecurity at the center. Instead of adding it as an afterthought.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Key principles of Secure by Design include:</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">1.&nbsp;</span><b><span style="font-size:11pt;">Risk Assessment:</span></b><span style="font-size:11pt;">&nbsp;Identifying potential security risks and vulnerabilities early in the design phase.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">2.&nbsp;</span><b><span style="font-size:11pt;">Standard Framework:</span></b><span style="font-size:11pt;">&nbsp;Maintain consistency when applying security standards by following a framework. Such as </span><a href="https://www.cisecurity.org/controls"><u><span style="font-size:11pt;">CIS</span></u></a><span style="font-size:11pt;">&nbsp;Critical Security Controls, </span><a href="https://www.hhs.gov/hipaa/index.html"><u><span style="font-size:11pt;">HIPAA</span></u></a><span style="font-size:11pt;">, or </span><a href="https://gdpr.eu/"><u><span style="font-size:11pt;">G</span></u><u><span style="font-size:11pt;">DPR</span></u></a><span style="font-size:11pt;">.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">3.&nbsp;</span><b><span style="font-size:11pt;">Least Privilege:</span></b><span style="font-size:11pt;">&nbsp;Limiting access to resources to only those who need it for their roles.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">4.&nbsp;</span><b><span style="font-size:11pt;">Defense in Depth:</span></b><span style="font-size:11pt;">&nbsp;Implementing many layers of security to protect against various threats.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">5.&nbsp;</span><b><span style="font-size:11pt;">Regular Updates:</span></b><span style="font-size:11pt;">&nbsp;Ensuring that security measures are continuously updated to address new threats.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">6.&nbsp;</span><b><span style="font-size:11pt;">User Education:</span></b><span style="font-size:11pt;">&nbsp;Educating users about security best practices and potential risks.</span></p></div></div>
</div><div data-element-id="elm_695RfFEpJF7BZ_EJbTvSkg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_695RfFEpJF7BZ_EJbTvSkg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why Secure-by-Design Matters</span></h2></div>
<div data-element-id="elm_9tL5Q-_UPVqe13z76Vy1cw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9tL5Q-_UPVqe13z76Vy1cw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Understanding and implementing Secure by Design practices is crucial for several reasons:</span></p></div></div>
</div><div data-element-id="elm_uKbgtJ39qXtsDJG9XvweWA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_uKbgtJ39qXtsDJG9XvweWA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">Proactive Security</span><br></p></div></h3></div>
<div data-element-id="elm__iQPhnbY2L8ftWc5FlPM2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__iQPhnbY2L8ftWc5FlPM2g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:8pt;"><span style="font-size:11pt;">Traditional cybersecurity approaches are often reactive. This means they address security issues after they've occurred. Secure by Design builds security measures into the very foundation of a system. This minimizes vulnerabilities from the start.</span></p></div></div>
</div><div data-element-id="elm_JnVpTC-FBPpL0TEHACI12w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JnVpTC-FBPpL0TEHACI12w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Cost Savings</span></h3></div>
<div data-element-id="elm_iGq93TWMpUkx2nT40VfQsw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iGq93TWMpUkx2nT40VfQsw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:11pt;">Addressing security issues after a system is in production can be costly. The same is true for trying to address them near the end of a project. By integrating security from the&nbsp;</span><span style="font-size:11pt;color:inherit;">beginning, you can avoid these extra expenses.</span></p></div></div>
</div><div data-element-id="elm_Ql1tUXU9p0TN9wKdr6nneA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ql1tUXU9p0TN9wKdr6nneA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">Regulatory Compliance</span><br></p></div></h3></div>
<div data-element-id="elm_qTrYfoG-AG15pZMVWKe0dQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qTrYfoG-AG15pZMVWKe0dQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:11pt;color:inherit;">Many industries are subject to strict regulatory requirements for data protection and cybersecurity. Secure by Design practices can help you meet these compliance standards more effectively. It reduces the risk of unknowns that end up costing you in fines and penalties.</span></p></div>
</div><div data-element-id="elm_EhYhxU71KJJYFVdZ6V_W6w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_EhYhxU71KJJYFVdZ6V_W6w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Reputation Management</span></h3></div>
<div data-element-id="elm_0vV6uRNmRYclxC2lPryJAg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0vV6uRNmRYclxC2lPryJAg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:11pt;">A security breach can severely damage your organization's reputation. Implementing Secure by Design practices demonstrates your commitment to protecting user data. It can also enhance trust among customers and stakeholders.</span></p></div></div>
</div><div data-element-id="elm_1RN_xmTbv46JzfG-FkqHmQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1RN_xmTbv46JzfG-FkqHmQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Future-Proofing</span></h3></div>
<div data-element-id="elm_FJG_q3AqqLM5DAFz50PgRA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FJG_q3AqqLM5DAFz50PgRA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Cyber threats continue to evolve. Secure by Design practices help ensure that your systems and applications remain resilient. Especially against emerging threats.</span></p></div></div>
</div><div data-element-id="elm_QxG4ihXcYtpAa7IYh_aFiw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QxG4ihXcYtpAa7IYh_aFiw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Minimizing Attack Surfaces</span></h3></div>
<div data-element-id="elm_gXuSVegu2MwSsfG4FAx3OQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gXuSVegu2MwSsfG4FAx3OQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Secure by Design focuses on reducing the attack surface of your systems. Using it helps in identifying and mitigating potential vulnerabilities. You mitigate threats before a hacker exploits them.</span></p></div></div>
</div><div data-element-id="elm_DEkgLevCaOHO5-u7wEIcQw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DEkgLevCaOHO5-u7wEIcQw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Need to Modernize Your Cybersecurity Strategy?</span></h2></div>
<div data-element-id="elm_yhu1rya743cQgWCH9Nuh5w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yhu1rya743cQgWCH9Nuh5w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">A cybersecurity strategy put in place five years ago can easily be outdated today. Need some help modernizing your company’s cybersecurity?</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Give us a call today to schedule a chat.</span></p><p><b><span style="font-size:11pt;">Article used with permission from </span></b><a href="https://thetechnologypress.com/why-you-need-to-understand-secure-by-design-cybersecurity-practices/"><b><u>The Technology Press.</u></b></a><b><span style="font-size:11pt;">&nbsp;</span></b></p></div></div>
</div><div data-element-id="elm_UQjhnsqIQBmR70nOvSqSIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_UQjhnsqIQBmR70nOvSqSIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 22 Jan 2024 07:03:25 +0000</pubDate></item><item><title><![CDATA[Thoughts of Building Agile IT Managed Service Capabilities in Asia]]></title><link>https://www.brocent.com.sg/blogs/post/It_managed_service_capabilities_in_Asia</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/Post202301/IMG_4058.PNG"/>Adapting to the cloud digitalization and transformation, the large organization tends to centralize the IT management and governance of critical IT infrastructure and business applications to the IT office in the headquarter.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_hUuwFh1ZSriY9kMYchgycA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kDsvxbSfRD-6K0i15OyaaQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_XKv86icCQMCvqH2LlAIN5Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_SiuPpxgZTqSTTfBNBvOF-w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_SiuPpxgZTqSTTfBNBvOF-w"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Thoughts of Building Agile IT Managed Service Capabilities in Asia</span></h1></div>
<div data-element-id="elm_0t_zhVeZaXePwhpOMACtMQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0t_zhVeZaXePwhpOMACtMQ"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_0t_zhVeZaXePwhpOMACtMQ"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_0t_zhVeZaXePwhpOMACtMQ"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_0t_zhVeZaXePwhpOMACtMQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Post202301/IMG_4058.PNG" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_XjUZ5-D2S3GERuPM_oEstg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XjUZ5-D2S3GERuPM_oEstg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:13pt;">Adapting to the cloud digitalization and transformation, the large organization tends to centralize the IT management and governance of critical IT infrastructure and business applications to the IT office in the headquarter.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:13pt;"><br></span></p><p style="text-align:justify;"><span style="font-size:13pt;">However the Centralized IT organization still needs the last mile of IT support to take care of their regional business IT, that includes</span></p><ol start="1"><li style="text-align:justify;">Qualified smart hand support to support localized cloud and on-premise infrastructure in the branch</li><li style="text-align:justify;">Regional IT help desk support to manage all daily IT incidents and IT service request</li><li style="text-align:justify;">Project support for IT refresh and migration<span style="font-size:13pt;">&nbsp;</span></li><li style="text-align:justify;">Regular IT compliance audit</li></ol><div style="text-align:justify;"><br></div>
<p style="text-align:justify;"><span style="font-size:13pt;">For all of these, it appears high cost if maintaining an Regional in-house IT support team. In the pandemic and post-pandemic period of time, it becomes an urgent agenda for CIO thinking how to maintain the balance of&nbsp;IT service quality and a flat &amp;flexible IT expense.&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:13pt;"><br></span></p><p style="text-align:justify;"><span style="font-size:13pt;">Choosing Brocent, we work at the same IT management standard and process as the clients are doing , and Brocent teams work in the same time zone as where clients work in. White label Options are available for client to choose</span></p><ol start="1"><li style="text-align:justify;">Shared regional IT department</li><li style="text-align:justify;">Dedicated regional IT department<span style="font-size:13pt;">&nbsp;</span></li></ol><p style="text-align:justify;"><span style="font-size:13pt;">Receiving the knowledge And command from IT headquarters, we Brocent are working the annual IT plan together with clients acting as local IT team dealing with daily IT operations, and proactively participate IT security governance and on-going IT projects.&nbsp;</span></p><p style="text-align:justify;"><br></p><p style="text-align:justify;"><span style="font-size:13pt;">This is Not to reinvent the wheel but run the IT business on the wheels that Brocent has practiced with cumulated industrial experience to extend the support and to drive the IT operation in an cost efficient model, Pay-as-you-Go, a model of Agile IT Managed Support &amp;Service.</span></p></div></div>
</div><div data-element-id="elm_BOz3ASSrRvSKjjJ3Ecyh-Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_BOz3ASSrRvSKjjJ3Ecyh-Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquity%20IT%20Service&amp;body=Hi%2C%20%0AI'm%20very%20interesting%20in%20your%20IT%20service.%20%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%20%0ARegards%20%0A"><span class="zpbutton-content">Contact Consulant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 15 Feb 2023 03:48:38 +0000</pubDate></item><item><title><![CDATA[Why SME should consider of Remote IT Support Service?]]></title><link>https://www.brocent.com.sg/blogs/post/SME_Remote_ITSupport</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/7x24 Cloud Services/accelerate.jpg"/>According to the research, at least 30% of the entire working population were still working from home full-time in 2021, which means that companies need reliable remote IT services now more than ever before.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_pGDJ-fvUTiyVm_CR5KW97w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_DS5r9Wm2Tcq0lCjnghwYJQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mI5-nrlAQViV1WpPmD-eiw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_BBYR4J8gT86ZYzTDFxngVw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BBYR4J8gT86ZYzTDFxngVw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:24pt;">Why SME should consider of Remote IT Support Service?</span></b><b></b></p></div></h2></div>
<div data-element-id="elm_lBjNcv9ASx6qwcvLbqI-8A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lBjNcv9ASx6qwcvLbqI-8A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">It has been the common sense that IT users need to call local IT support guy, or bring your own computer in for general troubleshooting and repair. Indeed in the enterprise environment, this takes a lot of time getting things done, and also it kills technical support resource’s working efficiency. </span></p><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">Particularly for those Small and Medium Size Enterprise (SME), they may have the decentralized team members working remotely from different countries and cities for the creative job. It is unlikely to have the deskside support everywhere and serve every moment.</span></p><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">Managed Remote IT support is now a viable and affordable option for businesses of all sizes. Here’s why you should consider making the switch in 2023.</span></p></div></div>
</div><div data-element-id="elm_twaGh-GTHJG9EshcbrAzwQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_twaGh-GTHJG9EshcbrAzwQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:18pt;">Remote IT services enables Business Operational anytime</span></b></p></div></h2></div>
<div data-element-id="elm_ECHPcf0ZqJo-npMz7gApoQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ECHPcf0ZqJo-npMz7gApoQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(11, 25, 45);">It’s no secret that there was a huge shift for remote work during the 2020 global COVID pandemic. Suddenly, it seemed like everyone was either working from home or talking about working from home.</span></p><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(11, 25, 45);">According to the research, at least 30% of the entire working population were still working from home full-time in 2021, which means that companies need reliable remote IT services now more than ever before.</span></p><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(11, 25, 45);">Remote support software enables SME companies to provide their clients with the majority of services without bringing any additional hardware or other equipment on site. This not only saves time but also money, as you do not need to buy new devices for this purpose and hire additional people to maintain your network.</span></p></div></div>
</div><div data-element-id="elm_TJ6PyTuYMep7StpblRCwsg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TJ6PyTuYMep7StpblRCwsg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:18pt;">What is IT remote support?</span></b></p></div></h2></div>
<div data-element-id="elm_RuZVz8YwnPnZBlc47CiQ7g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RuZVz8YwnPnZBlc47CiQ7g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">Managed IT remote support is a service delivery method that allows BROCENT certified engineer to connect to a business’s computer or mobile devices, and work on it as if you were in the same room. This is done by using a Remote Support Platform that allows the technician to see your screen and control your computer.</span></p><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">You can solve your IT problems from the comfort of home with remote support. Your technician will either call, email, or chat to diagnose your technical problem and often solve the situation within minutes.</span></p><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">Remote IT services can also include helping you achieve your long-term IT goals. Whether that’s maintenance, security, or software updates, remote IT support can cover any and all of your technological needs.</span></p></div></div>
</div><div data-element-id="elm_znoZez3ThMCWSNK0-_HiIQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_znoZez3ThMCWSNK0-_HiIQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:28px;">Top 6 benefits – Using Managed IT Support by SME</span></b></p></div></h2></div>
<div data-element-id="elm_5FQcuZ73_pXVRhrxb5XMqw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5FQcuZ73_pXVRhrxb5XMqw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">Managed Remote IT service is a growing trend in the IT Managed Service &amp;Support industry. In fact, using Managed Remote IT Support has already saved many companies time and money. Remote IT services are becoming increasingly popular due to their many benefits. Here are five of the top reasons why you might consider switching over to remote IT support in 2023:</span></p></div></div>
</div><div data-element-id="elm_Qp5ILIxXJabqiJmjvWDEWw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Qp5ILIxXJabqiJmjvWDEWw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:16pt;">No more Single Point of Failure</span></b></p></div></h2></div>
<div data-element-id="elm_Cee4yeboXF9irSJGi9YIGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Cee4yeboXF9irSJGi9YIGg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">It does not rely on a single technical support personnel because they may be off due to medical leave, annual leave etc, but the remote support service is being rendered by a group of IT Support agents, they are well trained and full access to the SME support knowledge base, and they hand on daily support with full awareness and knowledge on what is being configured and how quickly the issue shall be identified and resolved then.</span></p></div></div>
</div><div data-element-id="elm_XC86CCbSRb-ARYX5BeSKjw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XC86CCbSRb-ARYX5BeSKjw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:16pt;">Be Responsive in IT Support</span></b></p></div></h2></div>
<div data-element-id="elm_6NgRoraW7NV6Q7Q-gKUiXg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6NgRoraW7NV6Q7Q-gKUiXg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">Unlikely onsite Ad-hoc support, it does not need to wait for the on-route time till engineer reaches onsite. Quicker response time is one of the top benefits that come with Managed Remote IT Support that BROCENT is rendering “15 Minutes First Response Time”. With such responsive IT Service, 24 hours, 7 days a week, your company can have all its questions answered without having to wait for days or weeks for someone on-site to answer attend to your problem. Remote IT services usually provide a quicker and easier alternative to onsite techs.</span></p></div></div>
</div><div data-element-id="elm_SFyQjEnFULORgKJLQBbixQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_SFyQjEnFULORgKJLQBbixQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:16pt;">Lower IT Expense</span></b></p></div></h2></div>
<div data-element-id="elm_A5xb3yVlavC2biirVAzWEA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_A5xb3yVlavC2biirVAzWEA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">When you use remote IT support, your company can also benefit from lower IT support costs. This is because most of the work is done by remote technicians who are experts in their field and don’t require expensive on-site visits. It also means you don’t have to employ a tech department at your company, which is great news for your company’s bottom line.</span></p></div></div>
</div><div data-element-id="elm_EAoo9nlARn2A9yZzLHWUNQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_EAoo9nlARn2A9yZzLHWUNQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:16pt;">Increased employee productivity</span></b></p></div></h2></div>
<div data-element-id="elm_sbeb5nQtESsRfWKAI3KdFg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_sbeb5nQtESsRfWKAI3KdFg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">IT problems are a major distraction for any employee. By using remote tech services, you can increase productivity by having a trained IT specialist solve your IT issues. Such certified remote engineers are not limited computer skills, but also extended to network, cloud technologies and security management. This allows your team to focus on their primary job roles while the tech experts take care of everything else for them!</span></p></div></div>
</div><div data-element-id="elm_yOsGfxlXW1BTBX6yHOOAjw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_yOsGfxlXW1BTBX6yHOOAjw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:16pt;">Full Stack – IT Support Experts</span></b></p></div></h2></div>
<div data-element-id="elm_hEaAil5V5-CxfhMrLPEsfw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hEaAil5V5-CxfhMrLPEsfw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">The IT technologies are evolving rapidly, and it is getting easier to use IT technologies in business. Solving the problem of my computer is always a minor part of IT support &amp;service scope, and it may extend to have IT expert in designing, setting up and maintaining the firewall, Wi-Fi network, Microsoft 365, Google Cloud Suite and IT Security management and so on. This happens often in finance industry, that sorts of IT security compliance must be in place to safeguard the data security and cyber security for the compliance purpose. </span></p><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">Usually, small businesses only have enough capital to employ a single tech expert. This employee may have limited experience or industry knowledge. Employing a remote IT team will allow you to access remote IT specialists with a wide range of experience and specialties.</span></p></div></div>
</div><div data-element-id="elm_c6HUkBSSZc910J_DdReBjw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_c6HUkBSSZc910J_DdReBjw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:16pt;">Preventive IT Support and System monitoring</span></b></p></div></h2></div>
<div data-element-id="elm_RuG8fRUTUoQea9zk9FbKIg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RuG8fRUTUoQea9zk9FbKIg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">Not only can remote IT services help you when you are in a technology bind, but they can also provide preventative care (IT System health check) to understand how the IT system is running by identifying the potential issues and providing the IT remediation plan. With regular maintenance services, scheduling the system down time, your company can stay up and running without any outages or other problems. BRCOENT IT services support team can also provide 24 hours, 7 days a week’s system monitoring to secure the best in your critical IT system’s operation.</span></p></div></div>
</div><div data-element-id="elm_f77rRtck6b5QVVix-wnThQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_f77rRtck6b5QVVix-wnThQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><b><span style="font-size:16pt;">Technology Refreshment</span></b></p></div></h2></div>
<div data-element-id="elm_CB9Mwc_-SN_x1wyhpm1dDA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CB9Mwc_-SN_x1wyhpm1dDA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:13.5pt;color:rgb(0, 0, 0);">IT technologies happen rapidly, and it is mission impossible for a Non-IT staff to follow and manage the latest developments within the tech world- but that’s when your remote IT services team comes in. They can inform you of new cloud technologies, security vulnerabilities news, new software, products, or app upgrades that could be beneficial to your business. With a team of experts on your side, you can feel confident that your company has cutting-edge technology so you can stay ahead of your competitors.</span></p></div></div>
</div><div data-element-id="elm_zHYThiTNQleYIblgkNDYKA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 05 Jan 2023 07:10:14 +0000</pubDate></item><item><title><![CDATA[Top Five Consideration - Choose Remote IT Support]]></title><link>https://www.brocent.com.sg/blogs/post/Top5-RemoteIT</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/images/50e2d54b4850b108f5d084609629367b1638d6e3514c704f752e7bd69248c45d_1280.jpg"/>Last year saw an incredible acceleration of trends like remote work, cloud computing, bring your own device (BYOD), and others. This article presents the top 5 consideration of choosing the IT Remote Support]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_sa4DKaSQS3CyY5ZbLeHroQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MlZGbJ3IQTeXHdaFnX1IKA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_qC3LlocMS_a-kdtLzvhWYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6QeNLxdSQYGd3H5ZKL-64g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6QeNLxdSQYGd3H5ZKL-64g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="font-size:24px;">Top Five Consideration - Choose Remote IT Support</h1></div></h2></div>
<div data-element-id="elm_S2WQbWAYTnevEUG-bGbWkA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_S2WQbWAYTnevEUG-bGbWkA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);"><span style="font-size:14px;">Last year saw </span><span style="font-weight:700;font-size:14px;">an incredible</span><span style="font-size:14px;"> acceleration of trends like remote work, cloud computing, bring your own device (BYOD), and others. </span><span style="font-weight:700;font-size:14px;">each&nbsp;</span><span style="font-weight:700;font-size:14px;">business</span><span style="font-size:14px;"> that has undergone digital transformation is seeing </span><span style="font-weight:700;font-size:14px;">a big</span><span style="font-size:14px;"> increase in productivity and efficiency. Through this </span><span style="font-weight:700;font-size:14px;">continuing</span><span style="font-size:14px;"> transformation, IT professionals </span><span style="font-weight:700;font-size:14px;">are</span><span style="font-size:14px;"> the heroes who have </span><span style="font-weight:700;font-size:14px;">created</span><span style="font-size:14px;"> it </span><span style="font-weight:700;font-size:14px;">doable</span><span style="font-size:14px;"> to leverage and implement new-age technology solutions that support these trends </span><span style="font-weight:700;font-size:14px;">whereas</span><span style="font-size:14px;"> meeting business goals. Remote access is one such technology that’s </span><span style="font-weight:700;font-size:14px;">proved </span><span style="font-size:14px;"> to not </span><span style="font-weight:700;font-size:14px;">solely</span><span style="font-size:14px;"> increase remote work productivity </span><span style="font-weight:700;font-size:14px;">however&nbsp;</span><span style="font-weight:700;font-size:14px;">additionally&nbsp;</span><span style="font-weight:700;font-size:14px;">build</span><span style="font-size:14px;"> it easier for IT </span><span style="font-weight:700;font-size:14px;">groups</span><span style="font-size:14px;"> to effectively manage devices <b>an</b></span><span style="font-size:14px;">d support their organization.&nbsp;</span></span><br></p></div>
</div><div data-element-id="elm_k6f42MUTIB19e6eaN-_Ndw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_k6f42MUTIB19e6eaN-_Ndw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Why is remote access a crucial tool for IT?</h2></div>
<div data-element-id="elm_2og33iImZu6HGqlxGPHq6A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2og33iImZu6HGqlxGPHq6A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:rgb(0, 0, 0);"><span style="font-size:14px;">Delivering </span><span style="font-weight:700;font-size:14px;">flourishing&nbsp;</span><span style="font-weight:700;font-size:14px;">client</span><span style="font-size:14px;"> or user experiences has </span><span style="font-weight:700;font-size:14px;">ne'er</span><span style="font-size:14px;"> been </span><span style="font-weight:700;font-size:14px;">additional</span><span style="font-size:14px;"> important than </span><span style="font-weight:700;font-size:14px;">it's</span><span style="font-size:14px;"> today, </span><span style="font-weight:700;font-size:14px;">particularly&nbsp;</span><span style="font-weight:700;font-size:14px;">once</span><span style="font-size:14px;"> it </span><span style="font-weight:700;font-size:14px;">involves</span><span style="font-size:14px;"> IT support. Providing timely responses and resolutions to users’ </span><span style="font-weight:700;font-size:14px;">facilitate</span><span style="font-size:14px;"> requests is paramount, and that’s </span><span style="font-weight:700;font-size:14px;">wherever</span><span style="font-size:14px;"> remote access or </span><span style="font-weight:700;font-size:14px;">device</span><span style="font-size:14px;"> comes in.&nbsp;</span></span><br></p><p><span style="color:rgb(0, 0, 0);"><span style="font-size:14px;"><br></span></span></p><div><p><span style="color:rgb(0, 0, 0);">As an IT professional, you've got many tasks and support requests to induce to. they might vary from making certain that the safety computer code is up to date, wanting into why employment failed, serving to&nbsp; users with their devices, then on. Remotely accessing and dominant the device, that may well be anyplace within the world, may be a warranted thanks to quickly investigate and troubleshoot. No additional having long chats and phone calls with users to seek out out what’s going on, on the opposite side. you'll be able to remote in and see for yourself, even as you'd in person.</span></p></div></div>
</div><div data-element-id="elm_PLXaZguleGSgb6h5MIQSbg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PLXaZguleGSgb6h5MIQSbg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Five concerns whereas selecting Remote IT Support</h2></div>
<div data-element-id="elm_7jeJY8Td6fd2qgibJ8C0Tw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7jeJY8Td6fd2qgibJ8C0Tw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Security Standard &amp;Compliance?</h2></div>
<div data-element-id="elm_m5EPQ2H48fuUNPICoEe5xA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_m5EPQ2H48fuUNPICoEe5xA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Cyber risk for businesses has inflated considerably as a results of recent trends. cognitive content or leniency once it involves security may endanger not simply yours however your customers’ businesses moreover. ensure your remote access solution ticks all the boxes for authorization, authentication, encryption, logging, and different security measures, as well as compliances. you ought to even be able to assign granular permissions and management privileges for the various user groups. Security isn't a one-time fix, it wants constant updating. choose the answer that not solely has the mandatory checks and balances inbuilt however also keeps up with the dynamic&nbsp; security landscape.</span></p></div></div>
</div><div data-element-id="elm_X1bi3AwaoCcrwkJbA5RMRw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_X1bi3AwaoCcrwkJbA5RMRw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Any changes of Work Flow?</h2></div>
<div data-element-id="elm_7qocq3N8fcn87_X2e2gKXw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7qocq3N8fcn87_X2e2gKXw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Technology is supposed to form our jobs easier, less complicated. Having multiple, siloed tools that don't seamlessly integrate solely will increase the challenges for IT. select answers that cater to multiple use cases and assist you consolidate your toolset – maybe choose an overseas access solution that’s suited to remote work moreover as providing remote support. It ought to also integrate along with your existing PSA, RMM, and ticketing systems to supply maximum profit to technicians. Superfluous options and a fancy program can build the adoption difficult. the answer should be simple to deploy and use.</span></p></div></div>
</div><div data-element-id="elm_mDOFE-7vYdMxTfCRhE7Z3w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mDOFE-7vYdMxTfCRhE7Z3w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Is Support Performance Guaranteed?</h2></div>
<div data-element-id="elm_ONlYmFGtKLtlgTR8Cs9oPg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ONlYmFGtKLtlgTR8Cs9oPg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Performance, flexibility, and quantifiability are necessary factors to stay in mind whereas selecting the remote access solution. It ought to change you to quickly and effectively respond and adapt to things like having to line up a hybrid workplace, support a broader kind of devices, mergers, acquisitions, and others.</span></p><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);">&nbsp;</span></p></div></div>
</div><div data-element-id="elm_KBIX0is3kOZk2bk_5m84Nw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KBIX0is3kOZk2bk_5m84Nw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Is it Pay-as-You-Go?</h2></div>
<div data-element-id="elm_5Jfq3ipdY3Fs2o_0iaIdeA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5Jfq3ipdY3Fs2o_0iaIdeA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Remote Managed IT Support becomes the fundamental service model, especially for small and medium size of company, it is better to choose the IT Managed Service Provider who can offer Pay as you go billing model. As one of the best practice, it is for customer to purchase the Minimum bulk of service hours, that can be used to support day-to-day activities.&nbsp;</p><p>Additionally, if your IT running environment is not a standard SOE, then it would suggest customer to consider of Fixed charge per month in the first year. the consideration behind is that Non SOE environment will cause more incident rate, and surge IT expense.</p></div>
</div><div data-element-id="elm_8DIwmMRPyPZwWtXFXo5reQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8DIwmMRPyPZwWtXFXo5reQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Is the Company a Reliable IT Partner?</h2></div>
<div data-element-id="elm_yq1NJ7MHxzgSTRxJS9rDPg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yq1NJ7MHxzgSTRxJS9rDPg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);">It’s not merely concerning getting a solution, it’s about building a trustworthy partnership. realize a partner that may support you when the purchase, hear your feedback and provides timely responses to your requests. The remote access company ought to support you simply such as you support your customers.</span></p></div></div>
</div><div data-element-id="elm_PX6RcIynR0CRAmU6Tj6VUQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 04 Jan 2023 12:56:10 +0000</pubDate></item><item><title><![CDATA[Accelerating into the cloud-native era, the value and role of Intel's hardware and software]]></title><link>https://www.brocent.com.sg/blogs/post/Intel</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/NEWs/d122-21d6a13a16f0a41409cc64b6d0f02626.png"/>In 2010, OpenStack, an open source platform jointly developed by NASA and Rackspace, was born to help service providers and enterprises realize cloud ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_oFbOet3US5OCaoPpmrbcKw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Pw2dR-nuSjCgnjE-XT9Q5Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_YaObpJx1TDCwUfefOnhtzA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_mQo38YHEQO2sRW9vmZVwyg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mQo38YHEQO2sRW9vmZVwyg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Accelerating into the cloud-native era, the value and role of Intel's hardware and software</span></h2></div>
<div data-element-id="elm_W4mY0UB7Rp2NO28q-dy6lw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_W4mY0UB7Rp2NO28q-dy6lw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div style="color:inherit;text-align:left;"><span style="color:inherit;">In 2010, OpenStack, an open source platform jointly developed by NASA and Rackspace, was born to help service providers and enterprises realize cloud infrastructure services. It brought open source and open thinking to the cloud-native space and opened a new chapter in cloud-native development.</span></div><div style="text-align:left;"><br></div><div style="text-align:left;color:inherit;">In 2020, the OpenStack Foundation changed its name to the Open Infrastructure Foundation OIF, and OpenStack expanded from &quot;cloud&quot; to &quot;open infrastructure&quot;.</div><div style="text-align:left;color:inherit;">Immediately afterwards, OpenStack evolved from Nova for virtualization management and Swift for object storage to a comprehensive collection of open source projects including virtualization management, SDN, SDS service orchestration, and container management. In November 2021, the OIF Foundation announced LOKI, a new standard for open infrastructure - Linux, OpenStack, Kubernetes, and more. The OIF Foundation announced in November 2021 a new standard for open infrastructure, LOKI - open infrastructure management software for Linux, OpenStack, Kubernetes, etc.</div><div style="text-align:left;color:inherit;">In April of this year, OIF released the OpenStack Yoga release and announced that OpenStack will become a production-grade tool for enterprise IT in a stable state when the next Zed release, known as the Terminator, is released. This means that cloud native is gradually entering the post-OpenStack era. Since 2017, major cloud vendors have started to package and provide commercial services for containers one after another, offering commercial service products based on Kubernetes, container technology is gradually becoming mature and standardized and commercialized, becoming the new representative product of virtualization, and the cloud native developed around containers is gradually moving towards the stage of pervasiveness, and already The enterprises that apply containers are undergoing a new round of technical evolution of cloud-native.</div><div style="text-align:left;color:inherit;">Kubernetes in the post-OpenStack era: from &quot;hard to use&quot; to &quot;good to use&quot;</div><div style="text-align:left;color:inherit;">The acceleration of digital transformation has increased enterprise demand for cloud-native, container technology coverage has increased, and IDC predicts that the container software market has exploded in recent years and will continue to grow at a compound rate of more than 40% over the next five years.</div><div style="text-align:left;color:inherit;">In turn, enterprise demand for container management will rise linearly, container management has become the main battlefield for enterprise digital transformation. Gartner predicts that by 2025, 85% of large enterprises in mature economies will be more likely to use container management.</div><div style="text-align:left;color:inherit;">In most enterprise business scenarios today, organizations need to ensure that multiple containers can work together at the same time, and most of this work is done by orchestration engines. With the emergence and evolution of Kubernetes, many of the technical challenges of container orchestration have been overcome.</div><div style="text-align:left;color:inherit;">Perhaps because of the complexity of Kubernetes due to the number of problems it is trying to solve, many enterprises are also applying other container management solutions. However, market data proves that Kubernetes is still the choice of most enterprises, and a recent report by CNCF shows that Kubernetes has nearly 6 million enterprise users worldwide, making it the primary deployment model for applications on the cloud.</div><div style="text-align:left;color:inherit;">Despite the high coverage of Kubernetes, that doesn't mean that users who are already using it are satisfied, and it is often cited as &quot;hard to use but still needed&quot;. In the actual use of Kubernetes, we often encounter some &quot;hard to use&quot; problems, such as long container creation time, low throughput/RPS/burst concurrency, slow container scaling, slow cluster scaling, Sidecar resource overhead, low resource utilization, etc. For this reason, Intel has proposed an innovative The development work is mainly focused on Orchestration and Observability.</div><div style="text-align:left;"><br></div><div style="text-align:left;color:inherit;"><ul><li style="text-align:left;">Creation of containers based on snapshots + hot code blocks.</li><li style="text-align:left;">Sharded multi-scheduler.</li><li style="text-align:left;">Automatic scaling of resilient POD.</li><li style="text-align:left;">Fast telemetry-based prediction for real-time scaling decisions.</li><li style="text-align:left;">dynamic insertion / deletion of Sidecar containers in PODs.</li><li style="text-align:left;">Affinity scheduling/allocation of linked devices (NUMA, GPU+Smart NIC, etc.).</li><li style="text-align:left;">Real-time &quot;node resource changes&quot; feedback to Kubernetes scheduler.</li></ul></div></div></div>
</div><div data-element-id="elm_A1aEVlW-4SZoRVxO25rGIQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_A1aEVlW-4SZoRVxO25rGIQ"] .zpimage-container figure img { width: 528px !important ; height: 367px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_A1aEVlW-4SZoRVxO25rGIQ"] .zpimage-container figure img { width:528px ; height:367px ; } } @media (max-width: 767px) { [data-element-id="elm_A1aEVlW-4SZoRVxO25rGIQ"] .zpimage-container figure img { width:528px ; height:367px ; } } [data-element-id="elm_A1aEVlW-4SZoRVxO25rGIQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/0b88812e-230e-4c19-abc9-37564a0f2cae.png" width="528" height="367" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Zp_GFiimq4_5UwGyyJQ5Rg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Zp_GFiimq4_5UwGyyJQ5Rg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>All of these technologies are compliant with the Kubernetes API specification and compatible with existing APIs, ensuring that users can install and use them without modifying existing Kubernetes code. In order to facilitate users to test and evaluate these technologies, Intel also directly provides container images for users to install and deploy through standard Kubernetes application deployment methods such as Operator.</div><br><div>After solving the container &quot;difficult to use&quot; problem, we must then consider how to &quot;use the good&quot; problem. The prerequisite for &quot;good use&quot; is to choose the right architecture. In the post-OpenStack era, enterprises use cloud-native architecture is the pursuit of agility, elasticity, high performance and efficiency. To achieve these goals, relying solely on software-level optimizations is not enough; in the case of Serverless, for example, many of the problems that arise in deployment, such as function cold starts, need to be addressed through hardware-level optimizations.</div><div>As data gradually spreads to edge scenarios, more and more enterprises expect to achieve cloud-edge-end integrated and collaborative infrastructure through cloud-native architecture, and Intel has been making efforts for this purpose, focusing on different needs at different stages of enterprise development and targeting architecture optimization solutions.</div><div>Secondly, the widespread demand for AI in the enterprise also poses a challenge to &quot;using it well&quot;. Nowadays, almost every application function is inseparable from AI, but AI models face multiple difficulties and challenges in moving from development to production deployment. Generally speaking, AI models need to go through a lot of debugging and testing, and usually take 2-3 days to deploy online; moreover, AI online service computing resources are usually fixed and slow to respond to sudden demand for resources, and face the problem of difficult business expansion.</div><div>As a cloud-native core technology, Kubernetes can manage containerized applications on multiple hosts in the cloud platform, and can complete the unified deployment, planning, updating, and maintenance of AI resources, effectively improving the management rate of AI resources. In addition, in the practice of building Kubernetes-based AI development platform, CPU servers can effectively utilize vacant resources and idle time, and allocate them to other applications through Kubernetes' elastic resource scheduling. As a general-purpose computing power provider, CPUs have important advantages in terms of procurement cost and usage difficulty, and can be used not only for AI operations, but also for other application loads.</div><br><div>At the beginning of Kubernetes release, the management and allocation of CPU and memory were relatively simple, and with the release of new versions, some new features were added gradually (such as CPU Manager, Topology Manager, etc.), but the default CPU Manager and Topology Manager of Kubernetes still However, the default CPU Manager and Topology Manager of Kubernetes are still unable to understand the complex internal architecture of server-level hardware and the capabilities of the CPU itself, which may lead to CPU resource allocation decisions and computational performance not being optimized. For Intel® Xeon® Scalable processors, with their complex and powerful architecture, if you want to deploy Kubernetes clusters on them to efficiently support cloud business, you need to expose their topology and CPU power to Kubernetes clusters, and that's when CRI-RM was born.</div><div><br></div><div>Thanks to the tireless efforts of Intel's R&amp;D team, Intel® CRI-RM now enables CPUs to be more powerful in AI scenarios. The goal is to adapt the features of the Intel platform to the Kubernetes cluster environment.</div></div></div>
</div><div data-element-id="elm_wNhNqlsAno3wSsriSvV5fA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_wNhNqlsAno3wSsriSvV5fA"] .zpimage-container figure img { width: 924px !important ; height: 421px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_wNhNqlsAno3wSsriSvV5fA"] .zpimage-container figure img { width:924px ; height:421px ; } } @media (max-width: 767px) { [data-element-id="elm_wNhNqlsAno3wSsriSvV5fA"] .zpimage-container figure img { width:924px ; height:421px ; } } [data-element-id="elm_wNhNqlsAno3wSsriSvV5fA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/d122-21d6a13a16f0a41409cc64b6d0f02626.png" width="924" height="421" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 16 Sep 2022 06:17:19 +0000</pubDate></item><item><title><![CDATA[BROCENT Standard Procedure and Policy]]></title><link>https://www.brocent.com.sg/blogs/post/standard_SOP</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/Photoset/pexels-christina-morillo-1181675.jpg"/>BROCENT HRM manages the training program and certification for all nominated technicians. Only certified technicians are authorized to attend remote a ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_IJ-OHmAISs6Z7REjROWT0A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VIM471mnSyaD3pqkzspSuA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ksjcMkPZTgihWB5rAnHiiw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_BXHnLy7pQhK3kQQxzDD5AA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BXHnLy7pQhK3kQQxzDD5AA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Service Delivery Stays in SOP</h2></div>
<div data-element-id="elm_HFj1dRjJxPD4UjyU7cUbOw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HFj1dRjJxPD4UjyU7cUbOw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><p style="text-align:justify;">BROCENT HRM manages the training program and certification for all nominated technicians. Only certified technicians are authorized to attend remote and/or onsite support activities. Such program covers for all technical team member including but not limited GSD Service Desk Team, TSC Second Line Support Team, FSS Onsite Support Team and so on.</p></div>
</div><div data-element-id="elm_c2GhTYn2ToOZmgqgkYn9iQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_c2GhTYn2ToOZmgqgkYn9iQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"></span></p><table border="1" cellspacing="0" cellpadding="0" width="537"><tbody><tr><td><p>#</p></td><td><p><span>English Name of SOP, Guide and/or Policy </span></p></td><td><p><span>Version</span></p></td><td><p><span>Status</span></p></td></tr><tr><td><p>1</p></td><td><p>Definition of Incident &amp;Task Priority</p></td><td><p>R0.3</p></td><td><p>Published</p></td></tr><tr><td><p>2</p></td><td><p>Worklog Management Policy</p></td><td><p>R0.2</p></td><td><p>Published</p></td></tr><tr><td><p>3</p></td><td><p>Management Policy for Service Escalation and Complaint Process</p></td><td><p>R0.3</p></td><td><p>Published</p></td></tr><tr><td><p>4</p></td><td><p>Complaint Process Template</p></td><td><p>R0.1</p></td><td><p>Published</p></td></tr><tr><td><p>5</p></td><td><p>Service Desk System User Guide</p></td><td><p>R1.4</p></td><td><p>Published</p></td></tr><tr><td><p>6</p></td><td><p>Warehouse and Parts Management Policy</p></td><td><p>R0.4</p></td><td><p>Published</p></td></tr><tr><td><p>7</p></td><td><p>TPL – Parts General Ledger</p></td><td><p>R0.1</p></td><td><p>Published</p></td></tr><tr><td><p>8</p></td><td><p>TPL – Parts Stock Out</p></td><td><p>R0.5</p></td><td><p>Published</p></td></tr><tr><td><p>9</p></td><td><p>TPL – Parts Stock In</p></td><td><p>R0.5</p></td><td><p>Published</p></td></tr><tr><td><p>10</p></td><td><p>TPL – Parts Requisition Form</p></td><td><p>R0.2</p></td><td><p>Published</p></td></tr><tr><td><p>11</p></td><td><p>TPL – Faulty Part Process Form</p></td><td><p>R0.2</p></td><td><p>Published</p></td></tr><tr><td><p>12</p></td><td><p>FTE Technician Timesheet Management Policy</p></td><td><p>R0.2</p></td><td><p>Published</p></td></tr><tr><td><p>13</p></td><td><p>Dispatch Technician Availability Management Policy</p></td><td><p>R0.3</p></td><td><p>Published</p></td></tr><tr><td><p>14</p></td><td><p>Service Quality and Record Management Policy</p></td><td><p>R0.7</p></td><td><p>Published</p></td></tr><tr><td><p>16</p></td><td><p>TOP 10 Customer Service Hyper-care Practice</p></td><td><p>R0.3</p></td><td><p>Published</p></td></tr><tr><td><p>17</p></td><td><p>Technical Service and Work Handover Policy</p></td><td><p>R0.1</p></td><td><p>Published</p></td></tr><tr><td><p>18</p></td><td><p>Service Delivery Performance Management KPI</p></td><td><p>R0.1</p></td><td><p>Published</p></td></tr><tr><td><p>19</p></td><td><p>Standard IT Service Tools Management Policy</p></td><td><p>R0.3</p></td><td><p>Published</p></td></tr><tr><td><p>20</p></td><td><p>IT Onsite Service Report Management Policy</p></td><td><p>R3.1</p></td><td><p>Published</p></td></tr><tr><td><p>21</p></td><td><p>Customer Onboard Welcome Letter Guide</p></td><td><p>R2.0</p></td><td><p>Published</p></td></tr><tr><td><p>22</p></td><td><p>Customer and new Project Onboard and Service Enabler Policy</p></td><td><p>R2.0</p></td><td><p>Published</p></td></tr><tr><td><p>23</p></td><td><p>IT Service Scope of Work and Service Guide</p></td><td><p>R0.5.1</p></td><td><p>Published</p></td></tr><tr><td><p>24</p></td><td><p>Token Service Billing Rule</p></td><td><p>R1.4.1</p></td><td><p>Published</p></td></tr><tr><td><p>25</p></td><td><p>Standard IT Service Report</p></td><td><p>R2.4</p></td><td><p>Published</p></td></tr><tr><td><p>26</p></td><td><p>Hotline Support Management Policy</p></td><td><p>R0.11</p></td><td><p>Published</p></td></tr><tr><td><p>27</p></td><td><p>Preventive IT Managed Service Policy</p></td><td><p>R0.1</p></td><td><p>Published</p></td></tr><tr><td><p>28</p></td><td><p>Field Technician Behavior Management Policy</p></td><td><p>R0.5.1</p></td><td><p>Published</p></td></tr><tr><td><p>29</p></td><td><p>Technician Training and Certification Management Guide</p></td><td><p>R0.3</p></td><td><p>Published</p></td></tr><tr><td><p>30</p></td><td><p>FTE Assignment Change Management Policy</p></td><td><p>R0.2</p></td><td><p>Published</p></td></tr><tr><td><p>31</p></td><td><p>BROCENT Employee Management Charter</p></td><td><p>R10.1</p></td><td><p>Published</p></td></tr><tr><td><p>32</p></td><td><p>Privilege User Account and Password Management Policy </p></td><td><p>R1.0</p></td><td><p>Published</p></td></tr></tbody></table></div>
</div><div data-element-id="elm_IxR6QHDwSgaA1c53IKElPw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 19 Oct 2020 12:07:16 +0000</pubDate></item><item><title><![CDATA[Transition Service & Management]]></title><link>https://www.brocent.com.sg/blogs/post/transition-service</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/Transition/Transformation.png"/>Transition Plan (TP) is the 3 months period of time span, in that BROCENT Transition officer leads to manage all transition related tasks (refer to the table below). It plays critical roles in delivering the successful delivery outcome for the whole project. All deliverables in the TP stage will be]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XYAHtQbiSUiCYhDV6bTNQw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_lZfj2-TmQ4yb-h2spUymww" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_bBpa8T3BQlKZcJlfqfv4FQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_bBpa8T3BQlKZcJlfqfv4FQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_d7XBW7SjRcC_7dc9E3oY8g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_d7XBW7SjRcC_7dc9E3oY8g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Transition Plan Makes Service Delivery Better</h2></div>
<div data-element-id="elm_3wgtfXOqR8-4JfR3IoRMfQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3wgtfXOqR8-4JfR3IoRMfQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"></span></p><p style="text-align:justify;">Transition Plan (TP) is the 3 months period of time span, in that BROCENT Transition officer leads to manage all transition related tasks (refer to the table below). It plays critical roles in delivering the successful delivery outcome for the whole project. All deliverables in the TP stage will be onboarded/imported into related IT automation tools and/or a copy to customer IT department. This section 8 defines clearly the RACI and subsequent tasks.</p></div>
</div><div data-element-id="elm_DFFfFSl-o0m3CDy58QB4JQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DFFfFSl-o0m3CDy58QB4JQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><p>When BROCENT is awarded by Customer, the onboard process is triggered with preset tasks, that is managed with the transition timeline and tasks by BROCENT transition service officer.</p></div>
</div><div data-element-id="elm_lBEkg9xfDYgfcQvn5VJxtQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lBEkg9xfDYgfcQvn5VJxtQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><table border="1" cellspacing="0" cellpadding="0" align="left" width="615"><tbody><tr><td><p><b>#</b></p></td><td><p><b>Task Detail</b></p></td><td><p><b>GSD</b></p></td><td><p><b>AM</b></p></td><td><p><b>TSO</b></p></td><td><p><b>HRM</b></p></td><td><p><b>SDM</b></p></td><td><p><b>TSC</b></p></td><td><p><b>FSS</b></p></td><td><p><b>Duration</b></p></td></tr><tr><td><p><b><span>1</span></b></p></td><td><p><span>Project Transition Plan</span></p></td><td><p><span>I</span></p></td><td><p><span>AC</span></p></td><td><p><span>R</span></p></td><td><p><span>I</span></p></td><td><p><span>I</span></p></td><td><p><span>I</span></p></td><td><p><span>I</span></p></td><td><p><span>8 hours</span></p></td></tr><tr><td><p><b>2</b></p></td><td><p>Check List and Handover Plan</p></td><td><p>I</p></td><td><p>AC</p></td><td><p>R</p></td><td><p>I</p></td><td><p>I</p></td><td><p>I</p></td><td><p>I</p></td><td><p>8 Hours</p></td></tr><tr><td><p><b><span>3</span></b></p></td><td><p><span>Project Runbook</span></p></td><td><p><span>I</span></p></td><td><p><span>AC</span></p></td><td><p><span>R</span></p></td><td><p><span>I</span></p></td><td><p><span>I</span></p></td><td><p><span>I</span></p></td><td><p><span>I</span></p></td><td><p><span>3 days</span></p></td></tr><tr><td><p><b>4</b></p></td><td><p>Technician nomination and registration plan (50)</p></td><td><p>I</p></td><td><p>C</p></td><td><p>C</p></td><td><p>R</p></td><td><p>I</p></td><td><p>I</p></td><td><p>I</p></td><td><p>5 days</p></td></tr><tr><td><p><b><span>5</span></b></p></td><td><p><span>Project Team Formalization and Kickoff with Customer</span></p></td><td><p><span>CI</span></p></td><td><p><span>AR</span></p></td><td><p><span>CI</span></p></td><td><p><span>CI</span></p></td><td><p><span>I</span></p></td><td><p><span>CI</span></p></td><td><p><span>I</span></p></td><td><p><span>2 Hours</span></p></td></tr><tr><td><p><b>6</b></p></td><td><p>Service Account Registration and Activation</p></td><td><p>CI</p></td><td><p>AC</p></td><td><p>R</p></td><td><p>CI</p></td><td><p>I</p></td><td><p>CI</p></td><td><p>I</p></td><td><p>3 days</p></td></tr><tr><td><p><b><span>7</span></b></p></td><td><p><span>Technician (stores) Training Program and Certification Process</span></p></td><td><p><span>C</span></p></td><td><p><span>AC</span></p></td><td><p><span>C</span></p></td><td><p><span>R</span></p></td><td><p><span>I</span></p></td><td><p><span>I</span></p></td><td><p><span>I</span></p></td><td><p><span>3 days</span></p></td></tr><tr><td><p><b>8</b></p></td><td><p>Welcome Letter for Managed Service to all premises</p></td><td><p>CI</p></td><td><p>AR</p></td><td><p>CI</p></td><td><p>CI</p></td><td><p>I</p></td><td><p>CI</p></td><td><p>I</p></td><td><p>2 days</p></td></tr><tr><td><p><b><span>9</span></b></p></td><td><p><span>Retail Sites Familiarization</span></p></td><td><p><span>C</span></p></td><td><p><span>AC</span></p></td><td><p><span>R</span></p></td><td><p><span>CI</span></p></td><td><p><span>I</span></p></td><td><p><span>CI</span></p></td><td><p><span>CI</span></p></td><td><p><span>3 hours per site</span></p></td></tr><tr><td><p><b>10</b></p></td><td><p>IT Automation Tool Deployment (software &amp;hardware)</p></td><td><p>CI</p></td><td><p>AC</p></td><td><p>R</p></td><td><p>CI</p></td><td><p>I</p></td><td><p>CI</p></td><td><p>CI</p></td><td><p>1 hour per site</p></td></tr><tr><td><p><b><span>11</span></b></p></td><td><p><span>Resource Compliance i.e., NDA, Background check, Consent Letter, Credit check</span></p></td><td><p><span>I</span></p></td><td><p><span>AC</span></p></td><td><p><span>C</span></p></td><td><p><span>R</span></p></td><td><p><span>I</span></p></td><td><p><span>I</span></p></td><td><p><span>CI</span></p></td><td><p><span>5 days</span></p></td></tr></tbody></table></div>
</div><div data-element-id="elm_x6TTrxFZL4_WGiX3FJt2Hg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_x6TTrxFZL4_WGiX3FJt2Hg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><p>With the governance of service delivery model, BROCENT command center support (CCS) is in place that is comprised of GSD, TSC, TSO, SDM, HRM and AM. All nominated CCS members are with senior project and technical experience and good at bi-lingual communication.&nbsp;<span style="text-align:justify;color:inherit;">BROCENT TSO manages the check list and handover plan to make collection of all existing IT Operation Manual/Guide. This part presents the presumption of tasks in TT stage covering both office and store premise.</span></p></div>
</div><div data-element-id="elm_AvEANIy10pvHRhN-64UuiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_AvEANIy10pvHRhN-64UuiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><table border="1" cellspacing="0" cellpadding="0" align="left" width="567" style="margin-left:6.75pt;margin-right:6.75pt;"><tbody><tr><td><p><b>#</b></p></td><td><p><b>Task Detail</b></p></td><td><p><b>Action by</b></p></td><td><p><b>Subsequent Task</b></p></td></tr><tr><td><p><b><span>1</span></b></p></td><td><p><span>IT Asset Information</span></p></td><td><p><span>TSO</span></p></td><td><p><span>Version control and onboard to ATERA</span></p></td></tr><tr><td><p><b>2</b></p></td><td><p>LACOSTE IT and Security Policy and SOP documents</p></td><td><p>TSO</p></td><td><p>Version control and onboard to training portal</p></td></tr><tr><td><p><b><span>3</span></b></p></td><td><p><span>Professional Tools from LACOSTE</span></p></td><td><p><span>TSO</span></p></td><td><p><span>Import into BROCENT software library and complete the classification</span></p></td></tr><tr><td><p><b>4</b></p></td><td><p>Application support related knowledge base</p></td><td><p>TSO</p></td><td><p>Version control and onboard to Help Center</p></td></tr><tr><td><p><b><span>5</span></b></p></td><td><p><span>All sites &amp;campus contact list</span></p></td><td><p><span>TSO</span></p></td><td><p><span>Version control and onboard to Help Desk System</span></p></td></tr><tr><td><p><b>6</b></p></td><td><p>VIP user list</p></td><td><p>TSO</p></td><td><p>Version control and onboard to Help Desk System</p></td></tr><tr><td><p><b><span>7</span></b></p></td><td><p><span>Full site list with detail address</span></p></td><td><p><span>TSO</span></p></td><td><p><span>Version control and onboard to Help Desk System</span></p></td></tr><tr><td><p><b>8</b></p></td><td><p>Standard tools list</p></td><td><p>TSO</p></td><td><p>Version control and onboard to Help Desk System</p></td></tr><tr><td><p><b><span>9</span></b></p></td><td><p><span>SOW related configuration and credential</span></p></td><td><p><span>TSO</span></p></td><td><p><span>Version control and onboard to ITGLUE&nbsp; &amp;ATERA for configuration and password management</span></p></td></tr><tr><td><p><b>10</b></p></td><td><p>Parts Inventory, Device Warranty and Authorized Courier Contact List</p></td><td><p>TSO</p></td><td><p>Import into BROCENT Warehouse management system and Customer centric system</p></td></tr><tr><td><p><b><span>11</span></b></p></td><td><p><span>Infrastructure Diagram and all premised rack layout</span></p></td><td><p><span>TSO</span></p></td><td><p><span>Version control and import to ITGLUE portal with proper access control</span></p></td></tr><tr><td><p><b>12</b></p></td><td><p>All 3<sup>rd</sup> parties contact list</p></td><td><p>TSO</p></td><td><p>Version control and save to BROCENT Documentation system with proper access control</p></td></tr></tbody></table></div>
</div><div data-element-id="elm_77yIFHx20irvnlppob81nQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_77yIFHx20irvnlppob81nQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Training Program and Certification</span></h2></div>
<div data-element-id="elm_hMOJyL8I50bgLjrUWUYXGQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hMOJyL8I50bgLjrUWUYXGQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><p style="text-align:justify;">BROCENT HRM manages the training program and certification for all nominated technicians. Only certified technicians are authorized to attend remote and/or onsite support activities. Such program covers for all technical team member including but not limited GSD Service Desk Team, TSC Second Line Support Team, FSS Onsite Support Team and so on.</p></div>
</div><div data-element-id="elm_E4L9vdu3aVyGicChfC231g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_E4L9vdu3aVyGicChfC231g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><table border="1" cellspacing="0" cellpadding="0" align="left" style="margin-left:6.75pt;margin-right:6.75pt;"><tbody><tr><td><p><b>#</b></p></td><td><p><b>Training &amp;Certificate Course</b></p></td><td><p><b>Required</b></p></td><td><p><b>Owner</b></p></td><td><p><b>Sponsor</b></p></td></tr><tr><td><p><b><span>1</span></b></p></td><td><p><span>Customer IT Policy</span></p></td><td><p><span>Mandatory</span></p></td><td><p><span>HRM</span></p></td><td><p><span>AM</span></p></td></tr><tr><td><p><b>2</b></p></td><td><p>Customer IT Security Guideline</p></td><td><p>Mandatory</p></td><td><p>HRM</p></td><td><p>AM</p></td></tr><tr><td><p><b><span>3</span></b></p></td><td><p><span>Onsite Support Technician Behavior Policy</span></p></td><td><p><span>Mandatory</span></p></td><td><p><span>HRM</span></p></td><td><p><span>AM</span></p></td></tr><tr><td><p><b>4</b></p></td><td><p>Privilege Account and Password Management Policy</p></td><td><p>Mandatory</p></td><td><p>HRM</p></td><td><p>AM</p></td></tr><tr><td><p><b><span>5</span></b></p></td><td><p><span>PC OS/POS OS Installation Guide</span></p></td><td><p><span>Mandatory</span></p></td><td><p><span>HRM</span></p></td><td><p><span>AM</span></p></td></tr><tr><td><p><b>6</b></p></td><td><p>Parts and Warranty Management Policy</p></td><td><p>Mandatory</p></td><td><p>HRM</p></td><td><p>AM</p></td></tr><tr><td><p><b><span>7</span></b></p></td><td><p><span>Service Report Management SOP</span></p></td><td><p><span>Mandatory</span></p></td><td><p><span>HRM</span></p></td><td><p><span>AM</span></p></td></tr><tr><td><p><b>8</b></p></td><td><p>Application Support Q &amp;A or any Guide</p></td><td><p>Mandatory</p></td><td><p>HRM</p></td><td><p>AM</p></td></tr><tr><td><p><b><span>9</span></b></p></td><td><p><span>Infrastructure Monitoring &amp;Alert Management SOP</span></p></td><td><p><span>Mandatory</span></p></td><td><p><span>HRM</span></p></td><td><p><span>AM</span></p></td></tr><tr><td><p><b>10</b></p></td><td><p>BROCENT Onsite Service Tools Policy</p></td><td><p>Mandatory</p></td><td><p>HRM</p></td><td><p>AM</p></td></tr><tr><td><p><b><span>11</span></b></p></td><td><p><span>BROCENT Email Utilization Policy</span></p></td><td><p><span>Mandatory</span></p></td><td><p><span>HRM</span></p></td><td><p><span>AM</span></p></td></tr></tbody></table></div>
</div><div data-element-id="elm_v2nsPnohTIWf0ILHUb4uyQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_v2nsPnohTIWf0ILHUb4uyQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"> [data-element-id="elm_v2nsPnohTIWf0ILHUb4uyQ"] .zpbutton.zpbutton-type-primary{ background-color:#3498DB !important; } </style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/contact#Contact Brocent Consultant" target="_blank" title="Contact Brocent Consultant"><span class="zpbutton-content">Contact Account Manager</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 19 Oct 2020 12:00:18 +0000</pubDate></item></channel></rss>