About
Subscribe

Malaysia govt consolidates ICT

Lezette Engelbrecht
By Lezette Engelbrecht, ITWeb online features editor
Johannesburg, 11 Jun 2010

Malaysia govt consolidates ICT

The Malaysian government says it will continue to improve its productivity through a whole-of-government ICT infrastructure consolidation exercise estimated to cost RM650 million during the Tenth Malaysia Plan, says Bernama.

"The move will result in increased productivity, minimise redundancies and improve efficiencies brought about through centralised management and maintenance of shared resources.

"This will provide cost savings on an increasing basis as more agencies migrate to the shared network and centres," says the Economic Planning Unit in the prime minister's department in the 10th Malaysia Plan (2011 to 2015) report released yesterday.

Oz services agency upgrades security

CenITex, the Victorian government's shared ICT services agency, is looking to improve its organisational capability, processes and tools to facilitate information management, reports Network World.

The initiative, part of a wider efficient technology services programme, will see an upgrade of its capability to deliver ICT threat and vulnerability management to government agencies and departments, better secure its own operating environment, and facilitate continuous improvement initiatives.

The upgrade will occur in three areas: threat and vulnerability management technology capability, service management and maintenance, and systems implementation and integration services.

Check Point adds enterprise rights management

Check Point Software is expanding its security portfolio to include enterprise rights management with the purchase of Liquid Machines, states BusinessWeek.

The addition will help flesh out Check Point's data-security life cycle strategy that takes it beyond its perimeter security roots to focus more on securing over its lifespan based on its importance.

This includes loss prevention, encryption of data at rest and now protection of sensitive data from theft, alteration and other misuse.

Share