What's New



GTI x HPE x Commvault Webinar: Transform Backup and Data Management for the Digital Age

Critical data needs protection whether it is in the data center, the cloud, SaaS applications or at the edge, forcing CIOs to reevaluate their backup strategy and vendor selection. According to Gartner1, by 2022, 40% of organizations will completely replace or supplement their backup applications to cope with these new data protection challenges.

Come join our webinar to learn how you can modernize your backup & recovery solution with the critical capabilities to cope your digital business needs. We will walk you through the best practices of hassle free migration from legacy backup to Commvault, how to implement your Office 365 backup with comprehensive functions, and other best practices.

Key takeaways:

  • Recommendations of Gartner to modernize your data center infrastructure for backup and recovery & the critical capabilities required to address physical, virtual and public cloud use cases
  • Leading features & benefits of HPE cum Commvault backup and recovery solutions
  • Proven best practices to migrate from Veritas NetBackup to Commvault
  • Comprehensive Office 365 backup with unmatched backup, recovery, archiving, search and discovery functions & benefits
  • Disk-to-disk-to-public cloud backup architecture e.g. to Azure, Alibaba Cloud, etc.

Event Details
Date: 22nd September, 2020 (Tue)
Time: 11:00am - 12:00pm

Learn more ›



GTI x NetApp Webinar: How to Cope with the New Normal

By now, organizations face the reality that working from home has become the new normal to sustain their business activities and services. But they also realize that simple VPNs have many short comings that must be addressed. Government Departments & Bureaus and University users are seeking for cost-effective, fast-to-implement secure remote access solutions to ensure data security and meeting security guidelines.

Join this webinar and learn these key takeaways:

  • Understand the shortcomings of simple VPNs and effective means to cope with the challenges
  • How to keep confidential data ALWAYS inside your premises with the right VDI solution, and how to implement this for typical government applications
  • Introduce a versatile and hazzle-free solution to extend secure remote access to 3rd party users outside your organization without the burden of managing the client devices while meeting security guidelines
  • Learn how to employ NetApp advanced solutions and proven best practices to design and implement these solutions quickly and cost-effectively

Event Details
Date: 10th September, 2020 (Thu)
Time: 11:00am - 12:00pm

Learn more ›


Cybersecurity Webinar: FireEye Intelligence-led Security Validation

Companies invest a lot in cybersecurity solutions, hoping to stay ahead of morphing cyberattacks to protect their businesses. But security effectiveness study1 found that there was big discrepancy between expected capabilities and measured results. 53% of attacks were missed and only 9% of attacks were correlated by SIEMs. CISOs see the pressing needs to improve the effectiveness and performance of their security tools and controls. But how?

Please join our webinar on “Intelligence-led Security Validation” to learn how you can apply latest threat intelligence and adversary simulation technology to

  • determine how well you can withstand likely attacks targeting your industry
  • quantitively measure performance of your security tools & processes
  • pinpoint security gaps to guide your improvement, optimization and rationalization efforts

Key take-aways:

  • Gain insights from leading consultants why continuous security validation is critical to improve security effectiveness and reduce business risks
  • Learn how you can effectively test against latest MITRE ATT&CK threat actors and techniques that most concern your business
  • Understand the 5 critical steps to employ Security Validation to improve your security effectiveness

Event Details
Date: 19th August, 2020 (Wed)
Time: 11:00am - 12:00pm

Learn more ›


Cohesity Named a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery Solutions
- Positioned as a Leader in Just its Second Time in the Data Center Backup and Recovery Solutions Magic Quadrant

July 22, 2020 – Cohesity announced that it has been named a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery Solutions. The company is positioned as a Leader in just its second time in this Magic Quadrant. Gartner states that “Leaders execute well against their current vision and are well positioned for tomorrow.”

Gartner defines data center backup and recovery solutions as those “designed to capture a point-in-time copy (backup) of an enterprise workload and write the data out to a secondary storage device for the purpose of recovering this data in the future.” This announcement comes after Cohesity was recently recognized as a Customers’ Choice for large enterprises — organizations with $1 billion to $10 billion in annual revenue — in the Gartner Peer Insights ‘Voice of the Customer’ Report for Data Center Backup and Recovery Solutions (March 2020).

“We believe Gartner recognized Cohesity as a Leader because of our unique approach to modern data management that empowers organizations to easily back up and manage their data — in the data center, cloud, and edge — all from one easy-to-use platform,” said Lynn Lucas, chief marketing officer, Cohesity. “We continue to see rapid adoption of our data protection solutions globally. Our focus remains on expanding the breadth and depth of the Cohesity software-defined data management capabilities, helping our customers defend and recover against ransomware, meet stringent SLAs, and derive more value from their data.”

For details, please visit here.


GTI is a technology partner of Cohesity in Hong Kong and China to help customers modernize and revamp their data management platforms to cope with new computing needs in the digital age.  Feel free to contact us for technical details of the Cohesity solutions and our GTI services that may help you in your digital transformation endeavors.

For more details, please contact us at 2881 4800 or email to inquiry@gti.com.hk

Learn more ›


Inspiring Use Cases of AI and Deep Learning co-hosted by NetApp, Nvidia and GTI

Diagnosing diseases. Revolutionizing financial services. Building smart cities. Advances of neural network architectures and deep learning frameworks have accelerated AI researches and applications to deliver revolutionary business results across different industries.

This 1-hour webinar will present some promising AI use cases and the corresponding neural networks employed. E.g.

  • Use of machine learning algorithms for practical data classification problems;
  • Convolutional neural networks (CNN) for image analysis & detection, medical image segmentation, etc.;
  • Recurrent neural networks (RNN) such as LSTM and transformers for natural language processing;

We will discuss resources available from Nvidia and NetApp to help you propel in your AI, data science and deep learning teaching, researches and business applications.

Who should attend:

Researchers, executives, academic leaders, entrepreneurs who are planning to employ AI solutions to conduct Data Science and AI researches, training and business projects and transform their industries.

Key take-aways:

  • Learn about inspirational use cases of multiple neural network architectures
  • The benefits and ROI of owning your AI Infrastructure
  • How NetApp & Nvidia reference AI solutions can accelerate your researches and neural network model design & training
  • Trainings and consulting resources to fast track your AI projects
Event Details
Date: 23th July, 2020 (Thu)
Time: 11:00am

Learn more ›


FireEye Cybersecurity Technical Webinar-Defending Email Against Today’s Advanced Threats

During current COVID-19 pandemic, almost all companies witness a significant surge of email-borne attacks. In fact, studies found 91% of cybercrimes start with email1. And FBI has identified Business Email Compromise (BEC) fraud as the No. 1 financial threat to businesses in the US2. Cyber predators employ sophisticated attack techniques to target executives, financial data, and intellectual property for monetary gain or other hostile motives. Traditional signature-based or reputation-based email gateways cannot thwart these advanced threats. A new approach to defense is needed to safeguard your company’s email system – either in cloud or on-premises.

This 1-hour technical webinar will review the evolving email threat trends, e.g. how impersonation attacks and malware-less phishing have evolved, the kill chains and phishing techniques employed by threat groups. And we will introduce the advanced FireEye email protection solutions and discuss how you can revamp your email defense strategy to safeguard your company.

Key take-aways:

  • Understand the social engineering and multi-stage attack tactics & techniques of latest email-borne attacks, and useful mitigations and detection approaches suggested by MITRE ATT&CK and CIS
  • Understand effective techniques to uncover and stop impersonation attacks – CEO Fraud, whaling, BEC scams
  • Learn how advanced URL defense can effectively block malware-less phishing attacks
  • Learn how FireEye Email Protection Solutions with its advanced technologies can safeguard your Office365 or on-premises MS Exchange systems to meet your audit and compliance requirements

Event Details
Date: 9th July, 2020 (Thur)
Time: 11:00am

Learn more ›