Home| Solutions

Cloud Services

Cloud Services as Professional Services

Making use of various types of cloud-based resources like SaaS, PaaS, IaaS, private, public or hybrid can provide you a good return from self-provisioning and elasticity. One of the key benefits is that you can provision services on an on-demand basis and shut them down when no longer necessary. This can thus easily match your business need.

Why Cloud Services?

  • Capital-expenditure Free

    Enjoy pay-as-you-go and subscription-based model, cut out the high cost of hardware

  • Greater Flexibility

    Ideal for business wit growing demands, easy to scale up or scale down the IT

  • Work from anywhere

    With internet connection, you can work anywhere and anytime

Cloud Backup

Your company data continues to grow crazily and disaster still happens. People nowadays tend to backup their data to Cloud because of its flexibility and cost effectiveness. Cloud backup / Online backup services are available in the market but much need to concern before moving on, like the bandwidth and security issue.
 
We have years of experience in this area and can provide you the smartest and easiest way to protect your data. Function One, as a Managed Service Provider, offers hosted backup repositories or backup as a service to our customers.

Cloud Desktop

Virtual desktop brings you a lot of operational benefits and this is known by years, but people fail to implement a virtual desktop infrastructure (VDI) finally due to its complexity and the cost. With our Function One Cloud Desktop Service, you can enjoy VDI benefits but without paying a upfront huge investment.
 
Our Hosted Desktop Service is a total cloud service with 7x24 remote support. You can enjoy desktop anywhere (on PC/laptop/handheld devices) with the latest Windows OS and security protection by just investing a monthly cost.

Cloud Security

Cloud Services cost you new security risks and you need to deploy new security postures for them. According to Gartner, over 95% of cloud security failures will be the customer’s fault themselves. We know what our Cloud Customers concern!
 
Example security postures include authentication, single sign-on, authorization, credential mapping, device profiling, encryption, tokenization, logging, alerting, malware detection/prevention and so on. Solution like CASBs (Cloud Access Security Brokers) can help to enforce security control and policy between cloud service consumers and cloud service providers.

Microsoft O365

Moving office operation from on-premise to Microsoft Cloud Office 365 is always a complicated migration process, especially when you need to migrate your email platform as well. Careful planning in advance is always required.
 
Function One offers professional advices or services to smoothen the migration – from requirement collection and on-site inspection, creating tenant, ADFS preparation, migration and backup, to finally the user training and handover.

XaaS

XaaS means “anything as a service” or “everything as a service”. When our customer starts to consider moving their infrastructure, applications or services to the Cloud Model, we know that it’s always a difficult moment for them to choose among Public Cloud, Private Cloud, and Hybrid Cloud?
 
We have strong experiences in helping customers in planning, consulting, migrating and maintaining the following Cloud Services: e.g. Infrastructure as a Service like Amazon AWS, Microsoft Azure, Google Compute Engine, IBM SoftLayer, some Regional Local-built IaaS Providers and Software as a Service like Microsoft Office 365.

Cyber Security

Never say yes to hackers

Cyber Security Threat grows everyday and different national, government or commercial bodies start to employ their own Security Experts in the market to fight against the hackers. Function One can be your trusted advisor to offer you a series of technologies, processes and practices to protect your important assets.

1-2-3 Adaptive Defensive Security Approach

  • Categorized Defensive Security

    · 2-Tier, Layer 7, Web App Firewall
    · Anti-Virus / Anti-Ransomware
    · Email Filtering / Anti-Spam
    · Encryption / Device Control
    · Anti-DDoS
    · Intrusion Prevention System
    · Mobile Device / App Management / Secure Wi-Fi

  • Behavior Based Protection

    · Behavior Based Protection
    · Sand-Boxing
    · Advanced Persistent Threat Protection

  • Incident Response

    · User Behavior Analysis      
    · Incident Detection & Response
    · SIEM (Security Information & Event Management)
    · SOC (Security Operation Centre)

Cloud Security

Cloud Services cost you new security risks and you need to deploy new security postures for them. According to Gartner, over 95% of cloud security failures will be the customer’s fault themselves. We know what our Cloud Customers concern!
 
Example security postures include authentication, single sign-on, authorization, credential mapping, device profiling, encryption, tokenization, logging, alerting, malware detection/prevention and so on. Solution like CASBs (Cloud Access Security Brokers) can help to enforce security control and policy between cloud service consumers and cloud service providers.

Network Security

Type of Cyber Attack over the Network emerges over the years and so are the security controls. In the 90s, we stop malware by name (i.e. Signatures); In 2000s, we start to have Abstractions and Generalizations like Heuristics, HIPS, Dynamic, Behavioral Analysis. And we can foresee the future with Next-Gen Machine Learning, Neural Networks, Big Data Analytics, Synchronized technology.

Ransomware Prevention

Ransomware is a type of that locks, encrypts, or otherwise prevents data and systems from being accessed by their owners, and requires victims to pay a ransom to the criminal responsible for the attack in order to regain access. The fear of losing priceless data can push users to pay the ransom—and while they may opt to pay, having their files unlocked or decrypted is never a guarantee.
 
Security control, proper backup, security awareness training are some of the best practices of protection.

Security Assessment

The key to success for Cyber Security is not only implementing the defensive mechanism like security products against the attackers (i.e. Blue Team in definition), but also need to test the effectiveness of your security program. And this will be done by a group of experienced security consultant and ethnic hacker. (i.e. Red Team in definition)
 
Function One, alongside with this group of specialist, accomplishes this by emulating the behaviours and techniques of likely attackers in the most realistic way possible, e.g. Penetration Test, Email or Social Media phishing, Firewall Assessment / Health Check, etc.

Vulnerability Scanning

Vulnerabilities and their exploitation are still the root cause of most breaches. For example, Ransomware is primarily distributed via exploiting software vulnerabilities because no user interaction is required and having better chance of success of infection.
 
To gain comprehensive insight on cyber risk, it’s crucial to assess security threats, minimize them, and maintain compliance.

Retail Solution

Maximize your Revenue

What sets us apart in the Information Technology business is not only mastery of the latest and the most productive IT solution, but also our vertical industrial knowledge understanding your real business needs. Our Retail Solutions help to maximize operational excellence and drive sales and measure performance daily.

  • Infrastructure

  • Sales & Marketing

  • Maintain your Business

Unified Endpoint Management (UEM)

Retail Business expects to be able to work anywhere, at any time, and from any device. In addition, they expect a similar experience for accessing work apps and data across all their devices – desktop, laptop, tablet and smartphone. Meeting these expectations is becoming more and more complex for IT teams that continue to use multiple disconnected tools to manage mobile and desktop devices.
 
A unified endpoint management (UEM) solution provides a holistic and user-centric approach to managing all endpoints. UEM combines traditional client management of desktop and PC systems with a modern enterprise mobility management (EMM) framework to manage any endpoint – from desktop and mobile to IoT.

People Counting

In the competitive and dynamic retail industry, access to detailed and real-time insights about customer behavior is definitely a core competitive advantage.  Sensor-based and video-based people counting offers retailers a way to capture and analyze customer data from their locations.
 
Alongside with other useful big data like demographics analysis and heat map/dwell time,  retailers can maximum their return of investment more accurately and plan ahead before other competitors, given the increasing operational cost like rent and headcounts.

Unified Commerce

A robust backend system can help personalizing customer engagement and increasing employee productivity by creating an exceptional, insightful shopping experience that unifies digital, in-store, and back office operations.
 
Unified Commerce like e-Commerce or m-Commerce can give customers a seamless shopping experience, increasing your revenue, customer satisfaction, and brand loyalty by delivering a consistent shopping experience across channels.
 

Social Media Integration with Guest Wi-Fi

With the influence of Mobile and IoT in the business world, by Wireless Connectivity alone cannot fulfill the most of the network access security and best enterprise mobility use.  The business use cases for Social Media Applications, (e.g. Facebook, WeChat, etc.) on the other hand,  grow dramatically in every industry.
 
Integration of both can benefit the retailers to capture the customer big data for business analysis and driving further marketing promotions and activities. 

Point of Sale (POS) System

POS is always treated as the most important business system in the front-end retail store. In the next 2 to 5 years, retail CIOs must implement a digital-business-ready point of sales in the context of a digital business strategy that focuses on enhancing customers’ lifestyles.
 
Some of the features that you should consider now are: Mobile Checkout - to deliver a checkout functionality on mobile devices; Boost Omni-Channel Sales – to connect your inventory in real time with your online sales channels, managing all master data and all transactions, either from online or brick-and-mortar stores.