Filter and Sort Reset
Spoofing Attack
CyberSecurity

What is Spoofing Attack and How Does It Work

video-image
Cloud and Infrastructure

Customer Testimonial – Universiti Malaysia Pahang x Sangfor HCI

Windows MSDT Remote Code Execution Vulnerability  (CVE-2022-30190)
CyberSecurity

CVE-2022-30190 Follina | RCE Vulnerability

Gartner-Hype-Cycle-ICT-China
Press Release

Sangfor Recognized as a Sample Vendor in the Gartner Hype Cycle for ICT in China, 2022

CVE-2022-32230 Windows SMB Denial of Service Vulnerability
CyberSecurity

CVE-2022-32230: Windows SMB Denial of Service Vulnerability

CVE-2021-43503 Laravel Remote Code Execution Vulnerability
CyberSecurity

CVE-2021-43503: Laravel Remote Code Execution Vulnerability

Why Enterprise Hybrid Cloud Is the Way to Go
Cloud and Infrastructure

Enterprise Hybrid Cloud: the Choice for the Future

How to Level Up Your Incident Response Plan
CyberSecurity

How to Level Up Your Incident Response Plan

What is a Phishing definition
CyberSecurity

What is Phishing? - Definition, Types, and Examples

video-image
Cloud and Infrastructure

J&T Express Indonesia x Sangfor: Success Story

Sangfor Named as a Sample Vendor in 2022 Gartner® Hype Cycle™ Reports for Compute and Infrastructure
News

Sangfor Recognized as a Sample Vendor in the Gartner Hype Cycle for Compute, 2022 and Infrastructure Strategy, 2022

Making the Smart Jump from Cloud First to Cloud Smart
Cloud and Infrastructure

The Shift from Cloud-First to Cloud-Smart: Adaptive Cloud Computing