Sorry, you need to enable JavaScript to visit this website.

  • Accelerating Digital Transformation

    In a highly-connected world, where connected devices like smartphones and sensors already outnumber the human population, enterprises will need to transform radically to meet the growing demands of consumers and businesses – and manage the data deluge. Cloud computing will play a key role in enabling this transformation.

    But for many organisations, cloud adoption is often seen as a technology change. And because of that, few have been able to unlock the cloud’s transformational benefits of cost reduction, increased agility, speed and innovation.

    For effective cloud adoption, fundamental changes need to be made to every aspect of your current IT model, extending beyond technology to include capabilities such as people and processes. We have developed the Cloud Operating Model (COM) framework to help accelerate enterprise adoption of an optimised hybrid cloud using IDC’s five-step cloud maturity scale.

    Built into the Singtel Managed Cloud portfolio, the COM includes a checklist of capabilities to help you understand your cloud maturity level, along with a roadmap to achieve success and enable innovation and agility to respond to market demands.

Transform your business
with Singtel Managed Cloud


Watch Now

Singtel Liquid Platform

 

As organisations look for a flexible mix of cloud services to address changing needs, the resulting proliferation of hybrid IT and multi-cloud solutions is presenting its own challenges.  These include the high cost of maintaining a multi-cloud environment, lack of visibility, and security and governance blind spots.  A disparate cloud environment may also hamper application life-cycle integration and result in brittle approaches to automation.

Singtel Liquid Platform is a self-service, hybrid cloud management portal which helps automate the operations of multi-clouds and simplifies management through a single dashboard.

This agnostic platform is fast and scalable, with no lock-in to platform-specific tools, skills and processes.  Liquid Platform provides businesses with a systematic approach to cost optimisation, policy management, DevOps automation, and Day 2 operations.  It also helps to enhance cloud operations, maintain security, control cost, and improve governance of any growing cloud environment.  This enables developers and operations teams to respond much more quickly to changing business needs..

read more
Insights

Today, with an evolving threat landscape, the web gateways have morphed into a key component of the cybersecurity defences. If a threat attempts to penetrate the security perimeter through a browser on the network, web gateways can be a key line of defence.

But conventional web gateways can’t match the sophistication of today’s cyber attacks and hackers. Over-reliance on them can put your data, users, customers, organisations and reputations at risk for a number of reasons:

Misclassification of websites

Detection-based approaches to cyber defences are never 100% accurate so some websites are misclassified or not classified at all. This means employees can still access malicious sites because they can’t be categorised by the web gateway filtering tool.

Infection from safe sites

Websites that have been classified as safe can still infect networks because they often serve content from aggregated sources.

Reduced productivity

Overly aggressive URL filtering or blocking uncategorised sites can prove frustrating for end users who require access to carry out their jobs.

Web Isolation: A New Line of Defence

Isolation is a new threat prevention approach that offers more options than traditional web gateways.

They supplement web security defences using isolation technologies to “air gap” the corporate network from the Internet and eliminate the risk of malware. Gartner estimates that by 2021, 50% of enterprises will leverage isolation to reduce the impact of attacks, up from less than 5% in 2016.

Recent developments integrate isolation technologies with existing web gateways without additional endpoint installation. Using a proxy to filter all web requests and directing them to the isolation platform, web sessions are processed remotely via a secure environment, and only a safe visual stream is sent to users’ browsers.

Isolation works through virtualisation technology to effectively block all malware attacks without the need to detect, understand or even recognise the attack pattern before acting on it.  In this respect, web isolation is an "air-gapped protection" that restricts offensive code from hopping across one isolation zone to another.

Unlike detection-based approaches used by web gateways, web isolation avoids the decision-making process of deciding which website is safe and which is not. The isolation prevents malicious content from reaching the end user. As a result, employees have more freedom to access websites without risking infection from an accidental click or uncategorised website, thanks to a network-based, agent-less isolation platform.

Web isolation incurs a smaller network performance overhead than web gateways. There are no false negative alerts so security teams can save resources that will otherwise be wasted on unnecessary investigations. Isolation technology therefore eliminates the cumbersome process of endless user requests for access to legitimate but unclassified business sites.

With web isolation, an organisation can maintain an effective security defence against ransomware, phishing, and malware because of the “air gap” between end-users and web attack surface. There is little room to execute Zero-day exploits or Flash/Java vulnerabilities since all attacks are isolated in a remote secure environment.

Detection-based solutions and secure web gateways are far from being 100% effective in stopping breaches. But with web isolation, breaches can be isolated and contained in ways that don’t leave a mark on enterprises.

On top of web isolation, it is also paramount to keep your enterprise cloud secure, especially with increasing adoption of private and hybrid cloud, and SaaS. 

 

 

Insights

It’s no secret that when it comes to the cloud and security, most enterprises are sorely lagging, preferring to trust cloud service providers to secure their corporate data.

But as cloud apps become mainstream, accidental transfer of data, theft and infection is a daily reality. If you have a significant investment in the cloud, you need a cloud access security broker (CASB) to protect your cloud-based data.

CASBs are situated between your on-premise infrastructure (including the private cloud) and your cloud vendor’s security infrastructure and architecture. They link your internal architecture to the cloud and enforce security policies by providing safe passage for your corporate data to move to and from the cloud. This is especially so with Software as a Service (SaaS) applications where data is constantly on the move.

In essence, a CASB is a central clearing house; part broker, auditor, filter and filtration/exfiltration check. As long as your end users employ cloud resources in their daily operations, and your organisation’s security extends only to the perimeter of your network, a CASB will be critical in securing your corporate data.

Why You Need One

The inability of conventional security products to adapt to increasing cloud usage is a key driver behind the adoption of CASBs.

Large amounts of data are being transmitted and stored outside of the direct control of many organisations adopting the cloud. As more SaaS are deployed, the data stored has become more sensitive, raising urgent governance and data protection concerns.

Not surprisingly, IT teams are often in the dark about what cloud services are being used. The CASB offers cloud usage visibility, ensuring compliance by revealing how data is being moved to and from the cloud, by whom, and where it is being stored.

CASBs can enforce several types of security controls, including encryption, device profiling and credential mapping when single sign-on is not available.

But where CASBs are most useful are when they act as gatekeepers with shadow IT operations. This overcomes problems with operating units or departments that procure and manage their own cloud computing resources outside of mandated company policies.

If data flows in the network originate from non-authenticated devices, the CASB can use auto-discovery features to identify which cloud applications are being used as network transport.

This ability to help identify high-risk applications, high-risk users and key management is one of the strongest benefits of deploying a CASB. As a supplemental feature, information collected while monitoring cloud usage may be used for demonstrating compliance and for auditing, especially in highly regulated industries to identify unsanctioned use.

Before You Decide

A CASB platform is not designed to focus on network infrastructure or in-house applications so it is critical that organisations carefully manage integration with existing systems, such as next-generation firewalls, network access control and security information and event management products. Enterprises will not be keen to manage an entirely separate system that is dedicated to just third party or SaaS cloud apps.

In the SaaS space, CASB platforms support major cloud app providers such as Microsoft Office 365, Google Drive and Salesforce. 

Enterprises should be aware of the limitations of specific cloud platforms, as well as what specific services those platforms provide -- such as encryption, threat detection and analytics before deploying a CASB platform.

 

Lawson, C., MacDonald, N., Lowans, B., & Reed, B. (2016, October 24). Market Guide for Cloud Access Security Brokers. Retrieved February 14, 2018.

 

Insights

Security remains the number one inhibitor to the adoption of cloud services, and any examination of public cloud resources will find evidence that organizations are struggling to extend visibility and control in public cloud environments. As critical data is increasingly being moved into public cloud computing environments organizations are struggling to maintain basic cybersecurity best practices. The struggle to extend visibility and control in public cloud environments has been documented in a variety of studies in recent years.

For example, research shows that many cloud-hosted databases are at increased risk because they accept inbound connection requests from the internet. In addition, organizations often improperly configure cloud storage services, exposing one or more to the public and creating increased risk of data loss. This problem, a common finding in risk assessments, is a significant driver behind some high-profile data breaches. Other key findings are:

  • Absent data encryption
  • Poor access controls
  • Unprotected management resources

Though technology in everyday use has been standard for more than a generation, in many ways the value of the data in use is obvious but not always considered on its own. Simply put, data as information drives the productivity of an organization, and the evidence for this becomes clearest when technology and corresponding data are absent.

In 2017, hardly a week passed without news of a new data breach and, more interestingly, the news was no longer just about the size of the breach, but of the quality of data accessed and whether that data was stolen or deleted. Consider the September 2017 announcement of the Equifax breach. At 143 million records, it is significantly smaller than the 500 million records lost by Yahoo in 2014. However, the quality of the data is so much richer than in previous hacks and will be significantly more impactful than previous breaches.

The volume of enterprise data creation and acquisition typically increases at a compound annual growth rate of 40-50% and this growth is exacerbated by the current proliferation of digital business transformation strategies. While the effective use of this data delivers improved operational efficiencies and organizational performance, IT teams must consider the impact of rising data volumes and new usage patterns upon their risk mitigation strategies and communicate this risk to their business stakeholders.

So, understanding this, organizations need to reconsider how to secure this data that is being created outside of the traditional secure environment; how to securely capture, manage and share this data; and how to securely collaborate around data with trusted partners. More specifically, there are clear reasons for demanding data security from both your internal and external custodians and providers of data:

  • Productivity: Day in and day out, employees are using their computers to create plans, manage operations, interact with partners and customers, and enhance the productivity of the organization. The risk associated with ransomware, a newer attack technique that encrypts data and holds the decryption keys for a ransom, makes the value of operational data for productivity obvious.
  • Competitive advantage:  Pharmaceutical companies are constantly seeking new insights into long-term challenges of creating drugs. The black market for digital products like software, music, and video siphons away large amounts of revenue from the owners - the data associated with these activities must remain confidential for extended periods.
  • Regulatory compliance: Data knows no boundaries, but regulators have stepped in to address data security and privacy in a variety of ways.  The EU General Data Protection Regulation (GDPR), which will take effect in May 2018, requires organizations to gain an understanding of the location, ownership, and security of data collected on EU citizens. This new data privacy regulation is important for some Asia Pacific enterprises as the GDPR regulations apply to how such data is collected and kept, no matter where the servers that hold the data are located. The determining factor is the company’s intention to target EU citizens. Failure to follow the GDPR can lead to heavy fines. For this reason alone, the impact of these regulations and fines may be felt more quickly than other new laws around personal data.

With almost all Asia Pacific enterprises now using cloud IT and business services in some form, customers of regional cloud service providers (Cloud SPs) face increased responsibilities, as even Cloud SPs not based in the EU may be caught by the GDPR.

What steps can be taken to improve the security of your data?

Data has never been perceived as having a value as high as it does today, and it looks as if this value is only going to grow over time. Recent headlines such as those from Forbes and The Economist linking data to oil completely miss one crucial difference — data is not in short supply nor is it likely to become so soon. However, the analogy around the value of data must not be ignored.

So, understanding this, organizations need to reconsider how to secure this data that is being created outside of the traditional secure environment; how to securely capture, manage and share this data; and how to securely collaborate around data with trusted partners.

Clearly the security solutions we have in place today are not sufficient to protect the data stored within multi-cloud systems, hence the plethora of high-profile data breaches in the news. Information security professionals need to make a thorough assessment of their environments and conduct a threat modeling exercise that can address data security challenges, with a firm understanding of the data assets that are being protected and the risks that technology and governance policies are attempting to reduce.

To that end, IDC recommends the following steps be taken to assess the security of all corporate data whether managed by the enterprise IT team or by external managed service providers:

Short-term:

  • Encrypt all organization network communications that traverse untrusted, public environments. This is often an option on public cloud services and has not been originally selected.
  • Ensure that backup solutions are backing up data at an acceptable interval such that any information made inaccessible — for example, because of ransomware — can be restored.
  • Ensure that data classification and protection is integrated into the risk assessment process.
  • Conduct a data discovery exercise to crawl the data stores throughout the IT environment, seeking all records and files that contain sensitive information.
  • Determine the location and affiliation of sensitive data with users and applications. Identify acceptable use cases based on this information.

Medium-term:

  • Deploy sensors at key locations where the IT environment zones change from trusted to untrusted to monitor data being transmitted outside of IT control boundaries. Sensors should be deployed at email and internet gateways, at a minimum.
  • Monitor the egress points looking for "leaking" data. Based on this data, reevaluate the use cases to identify legitimate use that should be incorporated into the acceptable set of use cases.
  • Identify one-time or custom use cases where data being transmitted over untrusted networks can be detected and encrypted so that the legitimate action can continue with stronger security.
  • Build out a robust key management infrastructure with broad platform support to provide encryption at the application level, for data in the cloud, and other mobile data that will legitimately exist outside of the traditional IT environment.
  • Introduce decoy data for "chaff" into the environment that can act to obfuscate legitimate data and act as a forewarning, if tracked appropriately, for a data loss event.
  • Work to integrate specific policy-based encryption capabilities to data wherever it resides and wherever it travels. These controls will "follow the data" wherever it goes.

We need to find a simplified yet efficient way to securely manage data. This data will be both on- and off-premise, mobile and static, in the cloud and on a mobile or IoT device. We also need to be aware that data security is not a silo; the value of data is only realized after it is — to use the oil analogy — refined using analytics to better understand the patterns that deliver value to the business. As a result, it is not simply about statically securing data, but also about being able to secure it in a more fluid manner, one that still permits usability both at rest and in flight.

 

Insights

Cloud computing has made significant inroads into many organisations in the past few years. What can be expected in 2018? Businesses will continue to use cloud technology to better align with business goals and to progress in their journey towards digital transformation. Look out for these eight cloud trends: What can be expected in 2018?

 

1. Organisations prefer multi-cloud approach

2. Security concerns drive organisations to cloud architectures

3. SaaS and PaaS will be the fastest growing cloud services

4. Greater adoption of public cloud application services drives middleware SaaS subscription services

5. China, India lead in cloud adoption in Asia-Pacific

6. Artificial intelligence to put new spin on cloud

7. Demand for containers to reach a high in 2018

8. Edge computing momentum due to demand for greater agility and faster processing

 

1. No Stopping Multi-Cloud Organisations will increasingly prefer a multi-cloud approach where they work with cloud providers for various applications. IDC predicts that by 2020 more than 90% of enterprise IT organisations will use multi-cloud architectures1. Multi-cloud adoption is driven by digital transformation as users’ expectations of IT are raised. According to IDC, most businesses now think 'cloud first' when it comes to IT strategy, as the benefits of cloud are clear and have been broadly demonstrated in most industries2.

 

2. Security Challenges Remain a Concern As cybersecurity attacks become more sophisticated and remain a key concern, it will drive some organisations to turn to cloud service providers who are able to offer more robust data security protection than what organisations can manage.

More than 40% of organisations are ready to invest in additional security guarantees before they embark on their cloud adoption3. Cloud service providers will also be working to provide even more sophisticated and timely responses to cybersecurity attacks.

 

3. SaaS, PaaS see highest growth The highest growth for cloud services in the mature Asia-Pacific market comes from software as a service (SaaS) with a 28.5% increase in 2017. This is followed by platform as a service (PaaS) which will experience a growth of 26.7%, according to Gartner4 . The research firm categorises Australia, New Zealand, Singapore and South Korea as countries in the mature Asia-Pacific market. 

 

4. Demand for middleware SaaS subscription services Middleware SaaS subscription services will grow from US$2 billion in 2015 to US$4 billion in 2018 at a 20% CAGR in the Asia-Pacific, according to Forrester5.

This is driven by businesses adopting more public cloud application services, and so need to integrate cloud and on-premises applications, and to store and share ever-growing volumes of electronic content.

 

5. China, India are cloud powerhouses in Asia-Pacific China and India will emerge as cloud powerhouses in the Asia-Pacific, generating revenue of over US$1.59 billion and $851 million respectively with a CAGR of 27% and 24% through 2020, according to 451 Research6. The two countries together account for about 30% of the Asia-Pacific market.

With an estimated 200 cloud vendors in India and China, the fast growth of cloud is partly driven by government-led cloud initiatives and incentives. Governments in both countries are heavy cloud users as they aim to create a technology-driven modern society and inspire innovation.

 

6. Artificial intelligence to reinvent cloud Artificial Intelligence (AI) and machine learning will reinvent cloud computing. By 2018, 75% of developer teams will include cognitive/Artificial Intelligence (AI) functionality in one or more applications, and virtually all of those AI services will be sourced from the cloud7, says IDC. IBM, Google, Microsoft, and Amazon Web Services have started to utilise AI and machine learning to deliver cloud services.

IBM has an AI-powered cloud-based platform to facilitate decision-making, and Microsoft's Azure now offers at least 20 cognitive cloud services.

 

7. Growing demand for containers The demand for containers is expected to reach a high in 2018 as they evolve to offer more efficiency, enhanced security and scalability. IDC predicts that by 2021, enterprise apps will shift toward hyper-agile architectures, with 80% of application development on cloud platforms using microservices and functions, and over 95% of new microservices deployed in containers8.

 

8. Cloud on the Edge Edge computing is growing in popularity as certain applications require real-time processing that the agility of the cloud may not be able to provide and where latency is an issue. Enterprises need to start considering an edge strategy, and should begin using edge design patterns in their infrastructure architectures — particularly for those with significant Internet of Things (IoT) elements, according to Gartner9. A good starting point could be to use colocation and edge-specific networking capabilities.

The cloud can be implemented with edge computing, where the cloud is used to create the service-oriented model and edge computing offers a delivery style that allows for executions of disconnected aspects of cloud service.

 

1 IDC FutureScape: Worldwide Coud 2018 Predictions

2 IDC FutureScape: Worlwide Cloud 201 Predictions

3 Netwrix Cloud Secuty Survey 2015

4 https://www.gartner.com/newsroom/id/3591417

5 Forrester: Asia Pacific Tech Market Outlook For 2017 to 2018

6 https://451reearch.com/report-long?icid=3901

7 https://ww.idc.com/promo/thirdplatform/fourpillars/cloud

8 https://www.idc.com/getdoc.jsp?containerId=prUS43185317

9 https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2018

 

NOTE: This article is based on expert opinions and observations that are paraphrased and extracted from credible market research data. IDC FutureScape: Worldwide Cloud 2018 Predictions IDC FutureScape: Worldwide Cloud 2018 Predictions Netwrix Cloud Security Survey 2015.

Insights

Since IDC started tracking the cloud market in Asia Pacific in 2008, the number of cloud-based solutions has exploded – as has the range of deployment options. In theory, a CIO could now build the entire operating environment for their business from cloud services and platforms. But few are lucky enough to have the option of a clean slate when building their cloud strategy. For most, it involves the careful assessment of workloads and then matching them to the most appropriate solution.

IDC has found in our 2017 CloudView Survey that all Asia Pacific enterprises will have either a Cloud First or Cloud Also strategy in place by the end of the year. This means that CIOs, IT managers and LOB managers will be using cloud more than ever.

Most regional enterprises have now started production use of cloud for re-hosting of existing applications and for application development and test work. In both cases, it is the economic efficiency of cloud that influences the choice of the cloud solution. But for the other categories, CIOs are only beginning to understand how and when they should use a cloud solution.

Typical cloud use cases now fall into six categories:

1. Re-hosting or refactoring of existing applications;

2. Application development and testing environments;

3. Edge computing platforms for IoT use;

4. Protection of data assets;

5. Provision of security services; and 6. Compliance monitoring.

With DX strategy development, also high on the CIO to-do list and the new workloads demanding new levels of flexibility and cost efficiency, it's unsurprising that specialized cloud services are now being included in new application architectures. These specialized cloud services and solutions are being frequently offered as managed services, focused on delivering a specific business and technology outcome. While business demand for rapid new application delivery is always a driver for use of managed services, increasingly it is the dearth of specialized skills that will bring a CIO to choose a managed service from a provider. Their chosen provider will be that which focuses on the main issue and retains highly skilled staff to deliver it.

While many initially were averse to the use of cloud because of its often-undeserved reputation for poor reliability and security, cloud-based solutions that are designed for protection of enterprise digital assets are now commonly used. For example, if you need to ensure that corporate or customer personal information is protected to the highest standard, then likely the best way to achieve this is to contract with a specialist.

The same can be said of security; security specialists have become highly sought-after and often priced out of an enterprise IT budget, so a managed security solution – delivered from the cloud – is becoming a very viable choice for many enterprises. Selecting this provider must of course be done with diligence; not all can provide the service levels you may require.

In any audit of an application portfolio aimed at assessment of applications for cloud deployment, it is usual to start by categorization of the applications for both business value and priority before placing them in your timeline for cloud deployment.

However, as Asia Pacific enterprises become more savvy about the capabilities of cloud solutions, the applications which they deploy using cloud services and technology are becoming more complex. With complexity comes new requirements for mission-critical levels of availability and performance, as well as the need for bullet-proof security and optimized costs.

These challenges bring a need for new enterprise IT architectures that meet the demands for optimized costs as well as maintaining and even improving the levels of trust in the IT infrastructure. To do this, the preferred IT architectures are hybrid environments that span on-premises and hosted clouds, with different elements of the workload being deployed in the cloud environment that best meets all the requirements for IT governance, cost, performance and security. When the trust criterion moves to the forefront of decision criteria, CIOs may realise that – if they have the requisite skills and processes in place - an on-premises private solution for core elements of the workload is a necessity. If they haven’t invested in skills or process, then the most cost- and time-effective option is to source that environment from a trusted cloud SP.

Cost-effective operation of a hybrid cloud environment implies high levels of automation and manageability, and high levels of manageability in turn mandates an optimized IT architecture. To achieve this, the ability to use a consistent application deployment platform across public, hosted private and on-premises private clouds is a huge advantage. IDC's research indicates that many enterprises are struggling to move from fragmented, DIY, and ad hoc cloud provisioning strategies toward implementing more consistent governance, configuration, SLAs, and cost control over the increasing number of workloads that are being deployed across public and private cloud resources. DevOps teams are particularly important cloud users that need to remain agile but also need to avoid being burdened with complex cloud infrastructure configuration and management tasks.

IDC expects that as DevOps scales up during 2017 and 2018, over 65% of enterprises will invest in policy-driven self-service automation to power on-demand access and utilization of cloud resources. In addition, IDC predicts that more than 85% of enterprise IT organizations will commit to multicloud architectures by 2018, further driving up the rate and pace of change across infrastructure, middleware, and applications workloads.

The ability for developers to self-provision cloud resources on demand will be an increasingly important DevOps enabler. However, as the scale of DevOps usage expands, most organizations will recognize that there continues to be a vital need for cloud architects and operations specialists who can design and implement consistent self-service multicloud management strategies that facilitate development agility while protecting the information assets and business goals of the company.

In Asia Pacific, for most enterprises, this means engaging an IT services specialist. Optimally, that dpecialist will be tightly partnered with the provider of the cloud services. Some key buying considerations to bear in mind are: Look for services vendors with a deep understanding of your business needs, not just technology needs. Cloud is not just a useful new technology delivery model that can cut costs. To meet your business case objectives — and IDC evidence points to around a quarter of organizations are currently failing to meet their business case objective for cloud-based enterprise applications — your implementation partner will need to understand your industry and your specific business needs.

Cloud doesn't just install itself automatically and smoothly, so look for vendors with strong change management capabilities in both business and technology terms. Typically, cloud implementation now is part of a program that may involve — among other things — process redesign, organizational change, and possibly also cultural change. Much of the value derived from cloud-based applications now lies in the adoption of best practices and best-in-class process models and so on that come "out of the box"), and which the organization uses to replace or improve its existing processes and work practices.

Cloud doesn't necessarily update itself automatically and smoothly, so look for vendors with cloud managed services offerings. Cloud is often "sold" as a technology deliver model that delivers automatic updates and upgrades that the organization can automatically accept, simply and easily. But that is not necessarily the reality — absorbing the often substantial technology change that the application provider sends over the internet into its customer's business can be a challenge for some organizations. Clearly, therefore, cloud doesn't just mange itself. Why? Partly because using cloud-based applications (particularly public cloud ERP) means accepting continual change being injected into the organization, with both technology and business consequences. Dealing with this continual change requires both time and expertise, and some clients may want to us an emerging category of "managed public cloud" services that cloud ISVs are starting to offer as a follow-on to their implementation services.

Insights

Singapore, 31 May, 2017 – Singtel has partnered DocuSign, an industry leader in digital transaction management, to launch a cloud solution that allows for faster document authorisation and more effective tracking, with the use of electronic signatures in secure ways.
 
The introduction of the solution for the first time in Singapore is timely, given the increasing use of contracts and signatures which are created and transmitted electronically. The passing of the Electronics Transaction Act 2010 in Singapore also supports the adoption of e-documents and e-signatures.
 
Organisations undergoing a digital transformation need to upgrade their workflows and approval processes and keep digital records of them. Mr Sandip Gupta, Vice President, Cloud Business, Group Enterprise at Singtel, said, “The launch of DocuSign underscores Singtel’s commitment to develop secure, cost-effective and reliable cloud solutions for our customers. Given the increasing use of electronic transactions, the solution provides organisations with the peace of mind to approve documents digitally and keep a secure electronic trail of them wherever they are. This in turn allows them to operate competitively in the digital economy.”
 
DocuSign adds to Singtel’s expanding suite of Software-as-a-Service solutions on its Singtel myBusiness (https://mybusiness.singtel.com/) portal, which provides cloud applications to more than 50,000 businesses. The solution offers organisations the convenience of approving documents even within minutes. It allows electronic documents and signatures to be electronically tracked from signatory to signatory, and protected against tampering. The solution also attaches to each document an electronic Certification of Completion seal that is admissible in court as it captures the audit trail of the signatories’ Internet Protocol addresses, time stamps and sequence of ownership.
 
To implement the solution, Singtel, the exclusive telco reseller of DocuSign in Singapore, provides a single, dedicated local point of support to help organisations integrate the solution into their operations without disruption, as no software migration or new hardware is required. Small and medium-sized enterprises which adopt the solution are eligible to receive tax deductions under the Government’s Productivity and Innovation Credit scheme.
 
Mr Brad Newtown, Vice President of DocuSign for Asia Pacific, welcomed the announcement of the new partnership with Singtel. “We share Singtel’s commitment to helping businesses digitise critical business processes. This is an unrivalled opportunity to introduce the DocuSign platform to many of Singapore’s growing businesses. This partnership with Singtel provides us with a platform for growth in this market and throughout the ASEAN region.”
 
The United World College of South East Asia (UWCSEA), an international school in Singapore, has started using DocuSign to improve its staff hiring and student admission processes.
Mr Ben Morgan, UWCSEA’s IT Director, said, “UWCSEA is constantly exploring ways to deliver better value to families, and attracting the very best teachers from around the world. Shifting from paper-based to digital documents will reduce the time taken to complete some tasks by weeks, reduce the costs and environmental impact, as well as significantly reduce administrative workloads.”
 
Industry analyst, Statista estimated that the global digital transaction management market is expected to grow from US$13.93 billion in 2017 to US$30.66 billion in 2020.