Acer Cyber Security安碁資訊Acer Cyber Security Inc. (ACSI) was founded in 2000. We provide professional
digital information management services for businesses. ACSI has been
performing services in a global scale for years. With integrated maintenance
capabilities of Data Center Hotel, Network, Disaster Recovery and Security
Services, ACSI also dedicated to develop all sorts of solutions in response to the
growing use of cloud services and big data. ACSI aims to various products into
the market, offer our customer the best suitable solution.WEBSITE:www.acercsi.com
EMAIL:marketing@acercsi.com
TEL:+886-2-8979-6286ACSI has been dedicated in the cyber security business for years, and become a
leader in the industry. Not only are we capable of constructing a complete SOC
platform and technology, but we also are the most experienced SOC service
provider with the most operating forces, clients, and covering the most extensive
range. ACSI is also granted with ISO 17025 laboratory certification. We are the
only company that develops a self-built SOC digital forensic center in the country.
With this facility, we are able to monitor and detect unusual security activities
through the SOC services, offer effective forensic services, and provide our client
a thorough cyber security solution.
Aside from government agencies, ACSI also provides services in various
industries, such as the financial securities’ sector, insurances, manufacturing,
logistic business also e-commerce companies, and so forth. ACSI services include
security management, security monitoring, security auditing and digital forensics
services.https://www.acw.org.tw/Events/Detail.aspx?id=11
Arcran互聯安睿ArcRan is a venture firm focusing on internet security and cybersecurity products.
We do not comprise the information security of products, and we test every
guideline with our experience. Our solution is to make sure that every node in
the IOT is protected, and the safety of your product is not disappointing.WEBSITE:www.arcran.com/index.html
EMAIL:service@arcran.com
TEL:+886-2-2351-9915● APP Auto assessment platform with SSDLC
● IOT solution:
Microprogrammed control unit for an electric vehicle, backend comanagement platform, livestock farming, smart grid, street light, Long-term
care, factory inspection, and RF signal detection for internet device and
internet packet analysis.
● The cybersecurity assessment service for IOT product scenarios
● Introducing the secure software development lifecycle for cybersecurity
products
● Thread-safe function library: certified cybersecurity assessment kit
● The research and development of cybersecurity assessment tool for IIOT 4,
ICS, SCADA
ArmorX鎧睿全球科技ArmorX's operating philosophy revolves around the core design concept of “customizable intelligent security” and is committed to developing products and services that are both highly secure and incredibly efficient. All of this comes together to create a holistic set of solutions that can address the behaviors of different platforms and software, while adhering to the myriad of information and criminal laws and regulations.
Our President and Chief Technology Office is Chih-Wen Cheng, who has a Ph.D. in Applied Mathematics from Carnegie Mellon University. He specializes in analysis and control, and broke ground within the university as the first doctoral dissertation that was published within the top international journal Archive for Rational Mechanics and Analysis, which was deemed by SIAM as the best paper of the year for that field. He has a lengthy record of participating IETF-DAVIC international standards setting conference, has more published more than 20 articles, and has obtained patents within the EU and Taiwan that are relevant to the field.WEBSITE:www.armorxgt.com/index_en.html
EMAIL:sales@armorxgt.com
TEL:+886-927-290-891ArmorX Mail Mail Collaboration
● An impenetrable and fully secure email system serving as a reliable base for all your communications
● Comprehensive protections that address major weaknesses, unwanted infiltration, hijacking, and viruses
ArmorX Spam Spam Mail Defense
● Preemptively detect and analyze unknown threat behaviors
● Intercept and quarantine spam mail utilizing dual authentication whitelists
ArmorX APT Malicious Mail Forensics
● Dogfight hackers in the cloud to secure vulnerable choke points and neutralize threat ?ows
● An impregnable Email IPS and APT Gateway
ArmorX DLP Mail Audit System
● DLP Trade secrets and personal information
● Employs personal data masking, drip leak stoppage, and cutting edge encryption technology
ArmorX Archive Mail Archive System
ELM based high efficiency index algorithm to effectively and easily conduct full-text search of large data
● OEA enterprise sized cloud archival email system allowing for quick searches
ArmorX NAS Extreme security High performance Extreme security High performance Environmental factor encryption
● Organization integration, ?exible and easy to use, anti-encryption ransomware
AuthenTrend歐生全No more Password! 81% of hacking-related breaches use either stolen or weak passwords, we believe biometric passwordless is the inevitable trend of authentications to reduce IT cost and enhance security, plus convenience.
Our Vision: sooner or later, most people will login devices, accounts, services and blockchain ledgers via mobile phone and/or biometric security keys to eliminate passwords; AuthenTrend is bringing fingerprint enabled security authenticators from personal to business, from centralization to decentralization, from IT to IoT to meet the Trend of Authentications.WEBSITE:www.authentrend.com
EMAIL:contact@authentrend.com
TEL:+886-2-2658-0825We offer ATKey to connect with host via USB, Bluetooth and NFC for personal
users and also business environment with back-end integration, leverage
fingerprint as identity for authentication plus access control; we are doing from
personal to business, from IT to IoT, from centralization to decentralization to
meet the Trend of Authentication!
Pick ATKey.Hello, ATKey.BLE or ATKey.Phone to fit your demands.
Billows竣盟科技Helping clients to integrate the actual IT operational process complying with regulations
in improving security status and stability as well as assisting clients to integrate related technologies seamlessly. Our clients include THSR, Taoyuan Airport, Academia Sinica, Deloitte, T Star Tel... Adding value in our services, we provide an allocation of information security monitoring, develop company owned products and distribute globally developed software and hardware products. We've signed a MOU with III for technical collaboration with regards to develop and field research of information security , AI and IOT.WEBSITE:www.billows.com.tw
EMAIL:desiree@billows.com.tw
TEL:+886-2-2562-3952Log Master Product features:
● Data Collection: [1] Simple set up [2] Data status and system performance
monitoring [3] Integration with other SIEM
● Data Storage: [1] Normalized /denormalized data [2] Non-repudiation [3]
Unlimited raw log storage
● Data Value: [1] Threat Intelligence [2] Keyword alert [3] Compliance report [4]
Real-time dashboard [5] AI behavioral analysis
Service Features:
● Data Compilation: Log, Packet analysis, Information usability (SNMP, Netflow),Weak point
● Accurate Analysis: SIEM, Threat Intelligence, Artificial Intelligence
● Forensic/Reaction: Alert thru APP, Automated Defense, Forensic, Incident
Report
BlockChain Security區塊科技BlockChain Security was established in 2018 . We combine information security and the latest technologies in all areas of the blockchain to provide digital evidence preservation, as well as various blockchain solutions fit for different industries. From the start, we incorporated Postchain, a mature framework from Sweden built on a blockchain infrastructure, which is also based on valuable insights from science, technology and legal experts and scholars. This framework, in addition, utilizes important blockchain attributes of being non-repudiable, tamper-proof and permanent.WEBSITE:www.chainsecurity.asia/EN/
EMAIL:service@chainsecurity.asia
TEL:+886-2-2515-2533? Integrating the latest practical applications of digital forensic security protection and blockchain technology
? Incorporating Nordic blockchain technology as well as other new technologies such as fintech, enabling financial institutions and corporate customers to master information security in a timely manner.
? Exclusive 'invention' and 'utility' model patented technology (Patents obtained: Web Page Data Anti-Counterfeiting Technology, Contract Signature Verification System; Patent pending: Email Anti-Fraud System)
Cellpoint基點Cellopoint is a leader in email security and risk management. We are specialized in email security, threat intelligence analytics, email archiving, grid search, and auditing and encryption for email data loss prevention (DLP). We deliver solutions to protect organizations from email-borne threats, including spam, ransomware, spear phishing scams and business email compromises (BEC) attacks. Cellopoint is composed of R&D engineers and specialists with a wealth of experience in this industry. Through developing innovative solutions for clients and collaborating with our partners, Cellopoint holds No. 1 market share for medium-sized and large enterprises in Taiwan and No.3 market share in China.WEBSITE:www.cellopoint.com
EMAIL:sales@cellopoint.com
TEL:+886-2-8969-2558Cellopoint blocks 99.99% of spam emails and protects thousands of customers from email threats. We engaged in in-depth research in email-related fields, including RFC standards and IETF drafting. We have combined both theoretical and practical expertise to independently develop core technologies and solutions, such as CelloOS?, auditing policy engine, email indexing and search, email lifecycle management, CelloCloud? solution for email security, threat intelligence analytics, and personal email behavior modeling for Business Email Compromise.
●Secure Email Gateway
●Email APT Attack Protection
●Business Email Compromise Protection
●Email Data Loss Prevention
●Archiving and eDiscovery
●Social Engineering Awareness Training
Changing全景CHANGING Information Technology Inc., founded in 1998 , is an information security company under Wistron Group. Its main products and services include solutions of identity authentication, data encryption, digital signature, intelligent documents, Regulatory Compliance, etc. CHANGING serves various industries, such as governmental sectors, finance, technology, manufacturing, telecommunications, logistics, gaming, education, and healthcare. Changing continuously upgrading the technical power by maximizing its applications with the cutting-edge solutions which are related to bank 3.0 , Industry 4.0 , big data, mobilization, and biometric recognition fields.WEBSITE:www.changingtec.com/EN
EMAIL:yvonneko@changingtec.com
TEL:+886-3-563-0688 ext.310The Authentication products are designed and patented to generate dynamic password to secure users' assets. Additionally, CHANGING provides a robust foundation to protect enterprise assets with patented Data Accessing System, Mobile Communication Module, and Data Accessing Method to fulfil non-repudiation, and reliability.
Here are the solutions provided to our customers:
●ID Expert Identity Authentication System
● uSAFE Flash Drive Management Solution
CHT Security中華資安國際Founded in 2017 , CHT Security is a subsidiary company of Chunghwa Telecom, the largest ISP and one of the largest ICT providers in Taiwan. Based on years of experiences in cyber defense practices, CHT Security is the leading cybersecurity solution provider in Taiwan, specializing in cutting edge managed security services, NDR/EDR services, technical consulting and digital identity technology and has already won several international certifications and prestigious Honors & Awards worldwide.
Our services include network security, security assessment, digital forensics, SecuTex Network Protection, identification applications, hardware and software security solutions, etc.WEBSITE:www.chtsecurity.com
EMAIL:karenchen@chtsecurity.com
TEL:+886-2-2343-1628 ext.80481. HiNet Advanced Network Defense System:HiNet Next-Generation Firewall / Advanced Network Defense System is a security service built in CHT IDC for high-performance, high-stability and excellent protection. Utilizing Next-Generation Firewall (NGFW) technology from the world-renowned security vender Palo Alto Networks, we support corporate customers to block cyber-attacks from the Internet and to reduce the risk of being compromised.
2. SecuTex Network Protection:SecuTex Network Protection records all network packets for inspection on the full-time network activities before and during an incident. Real-time network traffic analysis and suspicious activity alerts can provide notification and blocking when intrusions occur. It also provides a single forensic platform that integrates forensic tools for higher efficiency.
3.Red Teaming:Red Teaming is to complement the easily overlooked boundary defense in penetration
testing and the deployment blind spots due to human error. Using the intelligence from public information, social networks, darknet and combining the knowledge, offensive and defensive skills and hacking tools from our security experts, we conduct intrusion simulation against agreed target organization by all means.
Cobrasonic庫柏Cobrasonic Software Inc. is the leading provider of data security solutions.
We possess the most professional research and development capabilities and
have developed the Database Activity Monitoring Solution, Privileged Access
Management and Anti-Hacking Solution.
Our products provide fully automatic monitoring, auditing and protection
without modifying corporate application systems and without affecting database
performance. We are the best choice preventing data outflow and maintaining
compliance with information security laws and regulations.WEBSITE:www.cobrasonic.com
EMAIL:Arthur.chuang@cobrasonic.com
TEL:+886-2- 8771-3878Cobrasonic Database Activity Monitoring System dbAegis is the most simple
and automated solution that provides guaranteed enterprise data security. The
system collects complete and comprehensive database activity logs aroundthe-clock. Cobrasonic dbAegis provides fine-grained database audit trails that
comprise the Five Ws (Who, did What, When, Where and on What) of each
database activity. Utilizing sophisticated analytical tools, dbAegis is a solution that
can help each enterprise accelerate its incident response time and investigative
ability.
Cobrasonic dbAegis performs extensive database monitoring, auditing, and
protection functions without modifying source system applications and
interfering with database performance. Any enterprise that is evaluating a
product that supports data leak prevention should choose dbAegis, a best in
class solution that meets all ISMS standards and regulations.
CYBAVO博歐科技CYBAVO we are a group cyber security experts making crypto-currency wallet secure and usable for daily business operations.
CYBAVO's mission is to provide blockchain, business-ready applications to our institutional customers. Our solutions help our customers to manage their digital assets and to protect them with the most robust security technologies.
CYBAVO VAULT, our ?agship product, is a secure cryptocurrency vault and wallet manager for corporate accounts. Just like own-ing a corporate bank at your office.
CYBAVO line of products is complemented by a Cryptocurrency Exchange Solution, a Mobile Wallet App SDK and a Full Node Ledger Service.
Our institutional customers are cryptocurrency exchanges, custodians, fund managers, token issuers, DApp developers or payment gateways.
Our growing team is formed by expert developers and researchers with solid experience in the security and cryptocurrency fields. CYBAVO has offices in Singapore and Taipei.WEBSITE:www.cybavo.com
EMAIL:info@cybavo.com
TEL:+886-2-2758-9081● CYBAVO VAULT
CYBAVO VAULT is a cryptocurrency storage and wallet management system designed to fulfill business accounts requirements, providing at the same time a top notch protection level to secure your digital assets. Our digital wallet manager and vault provides business owners and digital asset managers the ideal tool to manage multi-currency wallets, and to perform streamlined blockchain transactions in a secure way.
● CYBAVO WALLET SDK
CYBAVO Wallet App SDK allows your company to easily develop your own mobile cryptocurrency wallet to offer to your customers, secured with CYBAVO private key protection technology
● CYBAVO EXCHANGE SOLUTION
Digital Asset Exchanges and other crypto companies require the best security to protect their customers’ cryptocurrency wallets without compromising in control ?exibility and scalability. CYBAVO VAULT SOFA is a One-stop exchange solution for cryptocurrency exchanges and other companies working with digital assets. As a mass wallet management platform it is designed to integrate their end users’ wallets with the secure digital asset storage provided by CYBAVO VAULT.
Cyber Defense eXercise國家高速網路與計算中心National Center for High-performance Computing (NCHC) , founded in 1991 , is Taiwan's only national-level supercomputing center. The NCHC possesses a large computing and networking platform facilities for use by domestic academia and the general public. The NCHC plays a leading role in Taiwan's cloud technology services by integrating high performance computing (HPC) , storage, and networking to provide cloud services in storage, big data analysis, and scientific and engineering simulation.
The goal of the NCHC is to become an internationally renowned HPC center that promotes scientific discovery and technological innovation. Since its inception, the NCHC has been dedicated to strengthening Taiwan's HPC and networking infrastructure. The NCHC has planned and implemented pilot research programs in HPC, cloud computing, as well as big data processing methods and applications. The NCHC provides professional technologies and platform services to academia, government, and industry, and helps to cultivate domestic talent in HPC-related fields.
In order to effectively support Taiwan's technology research, the NCHC constructed technology R&D platforms to support domestic and foreign R&D teams in developing HPC and big data applications, which cover engineering and science, environmental and disaster prevention, biomedicine, and digital cultural content creation. The NCHC hopes to achieve the goal of becoming an HPC center of international caliber and a base for HPC applications and R&D collaborations within the Pacific Rim region.WEBSITE:cdx.nchc.org.tw
EMAIL:cdx_support@narlabs.org.tw
TEL:+886-6-505-0940 ext. 667Multilayer Cybersecurity Defense Service and System Development
1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests.
2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic ?ow.
CyCraft奧義智慧科技CyCraft secures government agencies, Fortune Global 500 firms, top banks and financial institutions, critical infrastructure, airlines, telecommunications, hi-tech firms, and powers security operation centers with our proprietary and multi-award-winning AI-driven MDR/EDR/NDR/XDR, Threat Intelligence, Health Check/CA, IR, and Secure From Home services.WEBSITE:www.cycraft.com
EMAIL:beryl.liu@cycarrier.com
TEL:+886-2-7739-0077 ext. 112● Xensor : Next-generation EPP+EDR Endpoint Security System
● CyCarrier : AI-Driven Security Operations Center
● CyberTotal: Global Threat Intelligence Platform
Datiphy玄力科技Founded in 2015 in San Jose, CA, the Datiphy solution assigns a risk score to every piece
of sensitive data within an organization. The key technology is its Adaptive Data Behavioral Model? (also called DatiDNA?) which provides risk assessments by analyzing database transactions in real-time. Our highly scalable solution consists of Host and Network Agents that deliver in-depth activity monitoring of databases. The enterprise level platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.WEBSITE:www.datiphy.com
EMAIL:sales@datiphy.com
TEL:+1-408-380-4846Datiphy's patented technology helps enterprises secure their most sensitive data against internal and external threats. The complete solution is built to defend against sophisticated attacks. All deployments are fast, light-weight, and customizable due to the Smart Agent that are able to support all data repositories on-premise and in the hybrid cloud infrastructure.
Datiphy Security Solutions take into account access anomalies, vulnerabilities, and threats to give you an overall risk overview of your organization. Security analysts and auditors (both internal and external) can utilize our alerts to prioritize a plan of attack and to create mitigating controls. Our patented technology is non-intrusive and we can formulate a behavioral pattern well before any hackers can exercise their means to exfiltrate your sensitive data. Detection is necessary but prevention in paramount in ensuring that you know who is accessing your sensitive data. Enhance your log aggregation tool with the help of Datiphy’s security solution. Deploy Datiphy solutions and immediately see where your biggest threats are located!
DECISION GROUP定興Professional in network digital forensic/network Forensics/Lawful Interception software development.
Solution and product series: wired/wireless/of?ine/integrated/Windows: E-Detective/NIT/FIT/DRMS/CMS/LI series network packet interceptor/decoder/analysizer, also positioned as a professional technology developer and specification builder in this technical field.WEBSITE:www.edecision4u.com
EMAIL:sabelle@decision.com.tw
TEL:+886-2-2766-5753● E-Detective
● Wireless + HTTPS + offline + wired network packet side record restore: NIT
● HTTPS/SSL encryption network packet side record: E-Detedtive HTTPS
● VOIP network packet side record restore: VoIP-Detective
● Lawful Interception seris: iMediator, iMonitor, EDDM
DeKnow德諾科技The core team is composed of consultants, auditor and technical experts with multidisciplinary experience in Telecom, Finance, E-commerce and Government. Consulting services are delivered to more than 200 customers in Asia.WEBSITE:www.deknow.tw
EMAIL:service@deknow.tw
TEL:+886-2-2327-8327● Payment Card Industry Data Security Standard: PCI DSS & PCI 3DS Consulting/
Assessment Service.
● General Data Protection Regulation: GDPR Compliance Checking/ Consulting
services.
● Personal Information Security Compliance Checking/ Consulting service.
● EuroPriSe Privacy Protection Certification Services.
● Technical Services: Vulnerability Scans, Internal & External Penetration Test,
Code Review.
● BS10012 Personal Information Management System Consulting/Certification
Services.
● ISO27001 Information Security Management System Consulting/Certification
Services.
DEVCOREDEVCOREDEVCORE consists of a group of cybersecurity experts who genuinely understand hackers. We enjoy challenging different mindsets and constantly evolving techniques. Our passion for techniques forms a strong support for the organizations.WEBSITE:devco.re
EMAIL:contact@devco.re
TEL:+886-2-2718-0156Red Team Assessment:
Red team assessment is a process of using advanced tactics, techniques, and procedures to emulate a real-world threat to train and measure the effectiveness of process and technology used to defend an environment in a limited time period. Typically conducted by a third-party organization. We own the hacker's mindset and use world-class attack techniques to accurately identify the blind spots of corporates security defense. More often, corporates can also take stock of the accuracy and coverage of the security monitoring mechanism to prioritize the budgets and experience a real-world attack, without real-world incidents to enforce internal consensus and awareness.
Digicentre果核數位he mission of Digicentre is to take our more than 20 years of operational experience and use it to deliver premium IaaS and SaaS to digital content industry clients, allowing them to focus their resources more directly on their businesses’ core values.
Digicentre's three major data centers are built on direct peering networks with major telecom providers. Our 24/7 services handle more than 450,000 concurrent users and more than 240 million monthly members. Our operations and services continue to expand.
Digicentre started as the IT department of a major Taiwanese gaming company: Gamania. Seeing the unique gifts and experience that could be offered to clients, the team began to branch out their IDC, security and integration services from there. Today, Digicentre's ownership is shared by publicly listed shareholders, Gamania and MDS.WEBSITE:www.digicentre.com
EMAIL:services@digicentre.com
TEL:+886-2-2658-2220●IDC - Digicentre uses secure, high-performance, and cost effective infrastructure. With professional expert advice digicentre provide tailor-made solutions for customers’ operating demands.
● Cloud - Highly integrated local and virtual services designed for large-scale computing.
●Security - With decades of security experience, digicentre protects clients in 95 countries. This includes 60,000 computers and over 6 million attacks every day. Digicentre protects customers from attacks and security risks.
●App Security - Protect developers from revenue loss, hackers tampering with in-game purchase systems, source code theft, fraud, or application credentials being compromised.
DoQubiz奕智鏈結科技DoQubiz, DQ, is a cybersecurity company that provides innovative solutions for document security management over the cyberspace. Through our patented technologies leveraing latesting deep technologies, DQ offers real-time military grade top secret level document controls that are affordable, easy to use and easy to deploy.
DQ is your shield against any cyber attack pandemic.WEBSITE:doqubiz.com
EMAIL:keng@doqubiz.com
TEL:+886-2-2696-1505●A smart contract storage system with fractal module and private blockchain forms an ultra-secured file storage management system.Secure data transfer solution
●No data will be transferred, only encrypted fragment pieces is passing. It is not only applying to file transfer, but also multimedia.Dynamic access authority management
●Both printed and digital publishing file can be real-time control the access authority with fractal engine and the e-paper reading module.
Egis神盾As a leading provider of fingerprint biometrics, Egis Technology Inc. (Egis) specializes in providing a total turnkey solution of optical and capacitive fingerprint sensors. Also, Egis' under-display fingerprint solution is designed with unique optical mechanisms under an OLED display panel which provides state-of-the-art fingerprint authentication and verification performance. Aiming to be an ultimate fingerprint security brand with largest user base in the world, Egis is committed to provide solutions with more innovation, more foresight and simpler intuitive user experience to create superior value for customers. As a board member of FIDO Alliance (sole representative for Taiwan) , Egis' leading edge fingerprint technology is the ideal choice for implementation in mobile devices.WEBSITE:www.egistec.com
EMAIL:karen.chang@egistec.com
TEL:+886-2-2658-9768Egis Technology possesses over 300 patents of e-identification and wearables in US, Europe, China, Japan, Taiwan, etc. The feature of Egis fingerprint sensors are small, reliable, and with high performance. Technology includes optical and capacitivie fingerprints, fast enrollment and authentication processes with rapid yet accurate comparison and matching algorithms. Besides our core technology, Egis is also one of the Board Member of FIDO Alliance, an international organization which defines standards for online user identity with over 600 certification products and 200 global members.
●Optical Fingerprint Sensor
●Capacitive Fingerprint Sensor
●AI Chip Design and Development
Enova伊諾瓦科技Founded in 2000 , Enova Technology is a leading ASIC design engineering company focused on bringing innovative encryption security solutions to market. Expert in engineering FIPS 140-2 certified single chip crypto module. Offer FIPS 140-2 certified ASIC based solutions, including firmware and software application.WEBSITE:www.enovatech.com
EMAIL: info@enovatech.com
TEL:+886-3-577-2767● X-Wall? MX+ In-line 6Gbps Crypto Offload Engine:
The X-Wall? MX+, the 10th generation of patented X-Wall Technology, is engineered specifically to encrypt/decrypt entire SATA disk drive including boot sector, temp files and operating system with SATA Gen 3 speed at 6Gbps. The Enova X-Wall? MX+ provides the robust security protection which achieves FIPS 140-2 Level 3 certification. It also armed with the various protocols (RSA 2048 , HMAC, CMAC, AES ECB/XTS/CBC, SHA256, Hash_DRBG and TRNG) . Compliant with TCG Opal 2.0 and IEEE 1667 , the Enova X-Wall? MX+ can fully protect the confidential information.
e-SOFT曜祥網技Established in 1999 , e-SOFT Corporation has been focusing on the software development of enterprise network information management platform. Over the past 20 years, e-SOFT has been deeply involved in the financial industry, the semiconductor industry, government and health care industry and enterprise users markets.
From 2012 , the e-SOFT internal network and cloud application related product series have achieved the procurement standards of government computer software contract procurement tender and become certified products on the government procurement system.
At present, it is the best solution for enterprise and organization in IoT security, information security defense, internal security policy management and review.WEBSITE:www.e-soft.com.tw
EMAIL:support@e-soft.com.tw
TEL:+ 886-2-2712-2195● Dr. IP: IP Resource Management System
● AD Advanced Management System
● Security Intelligence Portal Management System(NAC++)
● IoT inventory integration system
● Risk assessment management system of Information security for enterprise intranet
● Joint defense system of Information security for enterprise intranet and extranet
FineArt精品科技FineArt Technology is a global information security company, which has been operating in the market for 30 years. We provide a comprehensive endpoint security solution X-FORT includes DLP, DRM, and ITAM.
As a declaration of our commitment to quality, FineArt has implemented the CMMI concept throughout the company. We must to be able to demonstrate that the necessary measures are taken in terms of data security and privacy, therefore we were granted ISO 27001 in 2009. Over 400,000 users and 800 organizations are protected by FineArt X-FORT, and we help worldwide Government and Enterprises, such as NTT Data, China Airline, and Seiko, to protect what matters most to them. FineArt plan and deliver the quality products and services that customer required, which keeps us at the forefront of the industry.WEBSITE:www. neart-tech.com
EMAIL:sales@ neart-tech.com
TEL:+886-3-577-2211ext. 111● X-FORT Enterprise Electronic Data Surveillance System:
1.X-FORT helps to proactively secure your client computers
2.Agent based data protection for Windows Platform
3. Central policy management
4. Monitor user behavior on devices, networks, and other company-owned IT resources
5. Monitor data as it moves throughout the network, such as IM, SMB shares, FTP and email
6. Monitor and control connected device, such as MTP devices, external hard-drives and USB disks
7.IT asset management including software asset and License management
8.Real-time user activities tracking and complete user audit trails
Genie Networks威睿Genie Networks is a leading provider of intelligent networking and security solutions that ensure network-wide visibility into data traffic trends and instant protection against cyber threats.
Our solutions enable customers to optimize performance, security and cost of their network operations to stay ahead in the ever-changing digital landscape.WEBSITE:www.genie-networks.com
EMAIL:vikter.pan@genie-networks.com
TEL:+886-2-2657-1088 ext. 8262●GenieATM
An advanced network traffic mining system to provide decision support on network service operation, network security reinforcement on locating problems instantly, powerful traffic analysis with ?exibility, and various traffic statistics reports.
●GenieAnalytics
A highly ?exible and scalable big data platform for network traffic and security analytics that provides immediate network operational insights for carriers, ISPs, and enterprises with large networks through powerful big data analytic ability and rich data visualizations.
●GenieAnalytics Deep Trace
Service site attribute and delivery network tracking with multi-dimensional analytics and intuitive visualization to provide critical service site information that drives network operation intelligence.
●GenieATM MSP Server
An one-stop MSSP solution that enables ISPs and Telcos to generate extra revenue streams by delivering cloud-based managed services to their enterprise customers.
Global Wisdom智弘軟體Global Wisdom Software Technology Co., Ltd. is a software company that provides security management software for government agencies and corporate clients in the banking, telecommunication, and manufacturing industries. Our ?agship product ANCHOR (Ark of Network, Cyber Hamper for Operations Reliability) is the first and only privileged access management software developed by a local Taiwanese company. Our mission is to develop trusted security software to provide the best security management solutions for our clients.WEBSITE:www.globalwisdom.com.tw/home-en.html
EMAIL:mkt@globalwisdom.com.tw
TEL:+886-917-815-909ANCHOR (Ark of Network, Cyber Hamper for Operations Reliability)
Based on the ISO spirit and best practices, ANCHOR is a centralized management platform that provides functions (certification, application, review, activation, notification, connection, monitoring, deactivation, reporting, and audit) that meet the management process and audit requirements throughout the privileged account lifecycle. ANCHOR provides significant cost savings in system build and manpower. It also simplifies management, allowing IT staff to improve work efficiency. ANCHOR’s system maintains the necessary audit records and complies with internal security controls and regulations.
HGiga桓基科技Founded in 1993, HGiga Inc. provides a full range of products and services that address the information security (IS) needs of corporations and government organizations worldwide. HGiga helps customers to achieve a competitive advantage through ?exible and adaptive security solutions based on fast and easy integration of existing IT assets. Based in HsinChu Taiwan, HGiga is expanding its market worldwide. HGiga currently has branch offices in China and distributors throughout Southeast Asia. HGiga positions itself as the Total Solution Provider that provides customers protection and value-added service with its decades of experience and expertise.WEBSITE:www.hgiga.com
EMAIL:pmm@hgiga.com
TEL:+886-3-574-4141C&Cm@il 2020 is a comprehensive enterprise email messaging system. It lets you access email systems securely via a web connection from virtually anywhere. It is a web-based database backend email system, featuring webmail client, mail server, PIM, Groupware, access from mobile devices, access to remote printers, and security protections. With newly added message Encryption & Signature feature, C&Cm@il brings complete email security to enterprise messaging systems.
●OTP Password Verification
●LINE@ Integrate Motional Office
HIERO7禾新數位HIERO7 is and Internet solutions provider established to meet the needs of enterprises. Our technical team, consisting of top network engineers, is dedicated to buliding up more stable, efficient and secure Internet services that are easier to manage and use.WEBSITE:www.hiero7.com
EMAIL:brian.lin@hiero7.com
TEL:+886-2-8751-8671Web application acceleration and security, Anti-DDoS technique.
●H7 CDN
1.Boost content delivery focusing in Asia-Pecific
2.Easy to use, fast to run
3.Tangible acceleration, reliable service
●H7 Connect - DDoS
1. Capable of bearing Tbps attacking ?ow
2.AI detection, pro-active protection
3.Delicate metigation, professional team
I.X Trio大宏數I.X innovates the mobile security of combining the best physical security with innovative software and cloud services to provide enterprise secure and reliable authentication platform.WEBSITE:trio.ix-security.com
EMAIL:william.huang@ix009.com
TEL:+886-2-2627-7225I.X invented the world's first wireless key authentication and data encryption communication platform. With global patented 3-key binding mechanism, it provides the physical key based 2FA authentication with electronic signature. i I.X help enterprise to enhance login security and sensitive data protection, also provides tools for IT to audit record.
●I.X Wireless eBadge (the world's first wireless encryption employee card)
●I.X 2FA+ (2FA authentication mechanism combined with hardware key)
●I.X Secure Browsing (built-in secure browser, prevent data from leaking)
iDGate Corporation蓋特iDGate founded and devoted into IT Security in 2013 . We have developed a 2FA Push Notification and multiple Authentication Solution replace traditional hardware token and
SMS OTP. We also developed Face Recognition of biometrics authentication, everyone can experience the fast and secure identity verification, anywhere and anytime.WEBSITE:id-gate.com/eng/
EMAIL:info@id-gate.com
TEL:+886-2-2741-3066Our products are specifically designed to satisfy the highest security standard of the banking industry. With easy-integrated, cost effective, product-patented and a wealth of experiences in security and financial services.
●iDenShield:iDGate solution using Push Notification to replace the traditional unsafe method to authenticate users, which don’t require the use of One-Time-Password (OTP) via SMS, nor need the separate security device or token.
●iDenLogin:Support multiple-channel authentication service
iForensics Digital鑒真數位iForensics Digital Inc. always focuses on Digital Forensics. Our forensics laboratory has passed the ISO/IEC 17025 : 2005 laboratory accreditation through the evaluation from Taiwan Accreditation Foundation (TAF) . Not only do we develop and provide professional forensics tools and training, but we also offer support and consulting services to cases like infringement of intellectual property, rights, computer hacking, business data breaches, or any illegal matters in related to lawsuit. Besides, eDetector, the unknown malware detection software, developed by our team has won the 24th Taiwan Small And Medium Enterprises Innovation Award, Ministry of Economic Affairs in November 2017 . Provided assistance in the digital forensics and cybersecurity investigation area to our customers.WEBSITE:www.iforensics.com.tw/EN/
EMAIL:astrid@iforensics.com.tw
TEL:+886-2-2517-2532 ext. 1301.eDetector
eDectector is a practical and powerful remote malware-scanning and detecting
tool. It detects the behavior of processes and assists users to find out and mark
the malwares, even the unknown ones. With eDetector, users can easily trace
the malware without affecting too much performance of the target.
Furthermore, eDetector reduces time and saves the effort for users on malware
scanning, it also helps to build a real-time alarm system, which allows users
know who, where, when and how the malware started and what it has done.
Therefore, users can plan few necessary steps to deal with this issue.
2.SmartPhone Triage
SmartPhone Triage is an intelligent on-site evidence collecting tool. By quickly and automatically collecting digital evidence from target mobile devices, it helps law enforcement officers acquire information needed in the shortest time on the scene. With high OCR accuracy and instant keyword filtering, critical evidence could be found within seconds. Moreover, a standalone, user-friendly interface featuring relationship analysis could be very helpful when it comes to in-depth analysis of the collected cases.
iMobile Mind行動智慧iMobile Mind was founded in 2003 in Taiwan, currently having branch offices
in USA, China, Japan, and Malaysia. iMobile Mind is an innovative and global
technology firm . We focus on R & D APP Information Platform and Mobile
Security. Our mission is to provide high quality, efficient, cost effective solutions
to assist companies to realize mobile work for their employees. Our competitive
advantages are the strong R&D team and skillful development experiences of
enterprise mobile solution over 10 years.WEBSITE:www.isaicloud.com
EMAIL:cs@imobilemind.com
TEL:+886-2-2312-1098ISAI is a powerful mobile security and the integration platform, which includes APP portal, Mobile middleware, Security Push Gateway, APP management, and Device Data Security functions. After implementing ISAI, enterprises could provide many mobile applications of integrating original e-system for staffs and managers to work conventiently anytime and anywhere. Product Benefit :
● Save 70% development time, cost, and manpower of designing Native APP of iOS and Android.
● Prevent employees from leaking corporate confidential information through personal's mobile devices.
● Validate identifications of users by machine's ID of users' phones.
● Support MIS to delete remotely the data of ISAI APP form user's mobile devices.
● With these powerful functions,ISAI APP Platform has enhanced mobile security and APP management for enterprises.
InfoBoom訊苗科技InfoBoom is a new startup company from Sept. 2018 . We focus on personal information protection (PIP) and applications of secure messaging. Our main mission is building a general and secure instant messaging (SIM) infrastructure, upon which we could build many brand new services and applications. We wish to provide a more secure messaging infrastructure for creating applications and reliable services with more ?uent user experience. These daily-used messaging applications will be a great help on improving PIP and SIM to overcome messy insecure social activities that are prevalent today.WEBSITE:www.infoboom.com
EMAIL:ziv@infoboom.com
TEL:+886-986-183-743● Sekret Messenger:
- Sekret: Secure, Instant and Professional
Sekret adopts rigorous and comprehensive end-to-end encryption technology to avoid malicious attacks, eavesdropping and theft during the transmission of the encrypted messages.
- Portable Encryption Key
It prevents information from being tampered with or forged. Sender decryption confirms data integrity and provides non-repudiation, so as to ensure data security and correctness.
- Encryption of Real-time Audio and Video
Audio and video calls are end-to-end encrypted. The connection initiator can decide whether to save the audio and video. Only the participants or group members can use the private key to decrypt.
● Sekret-Form
The encrypted form of Sekret that designs forms according to your needs, quickly creates questionnaires, forms and quizzes, and generates exclusive QR Codes. The instant notification and automatic collection and organization of questionnaires allow you to view the responses any time. Statistics and data analysis are just a click away, which can be exported as Excel.
● Sekret-U2F Key
Sekret can automatically detects the user's U2F Key via Bluetooth. After fast binding, Sekret starts to use the key authentication mechanism to automatically verify the bound U2F Key device.Without this key device, Sekret will lock the screen to prevent using functions or viewing any confidential or sensitive information.
Jrsys捷而思Jrsys was founded on April 20, 2010. This Taiwanese company is dedicated in developing security software services for PKI encryption/decryption security components, eGov, FinTech, Blockchain, IoT security, Cyber Security (TRUST Platform) and Digital Transformation.WEBSITE:www.jrsys.com.tw/en-us/
EMAIL: sales.support@jrsys.com.tw
TEL:+886-2-2511-7131● Mobile certificate:
PKI based Mobile eID is convenient for customers to carry and use. Now more than 1 million Taipei citizens Mobile eID citizen card holders can be authenticated by showing his dynamic one time digital signed QR code which is only valid for 60 seconds. Taipei pass already integrated with 26+ kinds of eCards and electronical financial payments for different identities purpose. This technology can be applied in industries that need instantly identity verification.
● PDFSign:
Green Electronic documents can greatly reduce the company's operation costs. It's easy to save, to read, to improve security level, and convenient for customers. It can be combined with the Jrsys PDFFill automatic filling system, which can quickly defines document fields, facilitate the establishment of enterprise document templates and adjustment of detailed content for user to input from mobile then automatically fill in the PDF forms. This is suitable to eGovernment, FinTech, Healthcare and general enterprises.
●Secure IoT TRUST Platform:
Jrsys IoT Security solution is built by Jrsys TRUST Cloud service, IoT security suite, and device security life cycle management system to fulfill strong e-Authentication, secured private communication, firmware secure boot, and device key management.
Based on ISO/IEC 27001, 27701, 62443, that Jrsys protects your data’s confidentiality, integrity, non-repudiation, availability and with time stamp attributes.
KeyXentic關楗KeyXentic Inc. is a professional mobile and data security service provider, composed of 15+ years of experienced and enthusiastic experts. We design a variety of applications that make
it easy for all users and have strong security in terms of data protection and user privacy. We provide an all-around security solution from hardware integrated chip (IC) , software to system integration consultant for customer's requirements.
With biometric identification, multi-factor authentication and public key infrastructure (PKI) technologies, people can enjoy the security more conveniently.
KeyXentic Inc. provides a full solution for your daily security.WEBSITE:www.keyxentic.com
EMAIL: sales.support@keyxentic.com
TEL:+886-2-2883-4283●KX906 Smart Token:
Data security and personal privacy should be intuitively and conveniently. KeyXentic Inc. provides a secure one-stop-shop for customers. Platform free, multi-modal bio-authenticated and certified secure key is what enterprises need. KX906 Smart Toke, All technical design is based PKI standard with MoC (Match On Card) to defined, all private information is saved in secure element chip, providing you the most secure cyber key to access your cyber network.
●KX905 Smart Terminal:
Protecting the enterprise internal system and modern payment system is quite challenging in the mobile environment. KeyXentic Inc. provides a total secure iPad solution with bio-identification and strong authentication hardware platform to keep your access control more carefully.
KlickKlack Information Security可立可資安KlickKlack Information Security (KKIS) , a member of KlickKlack Group, thrives to protect, safeguard and secure your business against the escalating cyber threats we are facing each day. On demand evaluation, annual check up or a customized support profile to accommodate at your request.WEBSITE:www.kksec.com.tw
EMAIL:service@kksec.com.tw
TEL:+886-2-8101-0186
HACFO:Audit Service for Penetration Testing
As an external and independent auditor, HACFO provides comprehensive risk assessment on Penetration Testing (PT) and Red Team Assessment. It enables organizations to supervise PT performance and to minimize sensitive data and security vulnerability leakage risk. HACFO casts a shield to the everyday intensifying cyber threats, which empowers our client to focus more on the quality, reliability and quantitative indicators in every PT and red team assessment.
L7 Networks迅捷系統Founded in 2002 , members from senior R&D teams, joint ventured with D-Link, ZyXEL, Advantech, L7 has OEM its UTM products to many major networking companies.WEBSITE:www.L7-Networks.com
EMAIL: hywei@L7-Networks.com
TEL:+ 886-939-140-280
● InstantCheck:
Currently InstantCheck? can filter detailed behaviors and reconstruct mainstream webmail contents (Gmail / Outlook / YahooMail ) webhd contents (Dropbox / One Drive / Google Drive), messenger contents (Line / WeChat / Facebook Chat / Gmail Chat), social contents (Facebook / Twitter) for network data forensics. select multiple targets or start multiple tasks at the same time and easy to adjust the
parameters of the Exploit and the Payload which be matched.
● InstantQoS:
InstantQoS bandwidth manager from L7 Networks recognizes applications with the DPI (Deep Packet Inspection) technology. With its unique multi-view realtime traffic discovery, you can get a full picture of your network. Then assign the analyzed result with its dynamic bandwidth borrowing, prioritization, fair queuing, per-ip rate / quota / session controls, and tree-based QoS channels to optimize your traffic. Finally, the built-in report engine can bring you fully customizable charts to demonstrate its effectiveness.
Lionic鴻璟科技Lionic, founded in 2003 , is a leading network security solutions provider. The core technology of Lionic is Deep Packet Inspection (DPI) which allows network devices to protect against viruses, malicious websites and intrusion. Besides, Lionic can also identify the applications in use and the footprint of connected devices. Based on DPI engine and related software modules, Lionic provides value-added solutions to customers.
Lionic mainly focuses on DPI software licensing, signature service, mobile anti-virus program, network security appliance reference design. Several products are market proven as well as obtained 3rd party certificate like AV-TEST, NBL Real?ow certificate.WEBSITE:www.lionic.com
EMAIL:sales@lionic.com
TEL:+886-3-578-93991.Network Security Solution Licensing
●DPI Engine (Pattern Matching Engine)
● Anti-Virus, Malicious Website, Intrusion Prevention System
● Application / Device Identification & Control, Usage Analysis
● URL Filtering
2.Smart Router Solution Licensing
● Network Security can prevent hackers, viruses, malware and malicious websites attack from home network.
● Smart QoS can manage and prioritize network traffic according to content category.
Parental Control can filter unwanted apps & websites, get usage analytics report of each child, etc. Manage home network by app through cloud.
3.Pico-UTM 100
●Pico-UTM 100 is a security network bridge device designed for protecting SMB, SOHO and Home users without changing the original network topology.
As Working-From-Home has become a trend. There is a demand surge of network upgrades and it’s also drive the demand of network protection.
Pico-UTM 100 is able to destroy virus file, block malicious content and suspicious intrusion. One Pico-UTM 100 protecting one appliance is suggested.
The Central Management System is also ready for large deployment of Pico-UTM 100.
4.AegisLab Antivirus Premium
● AegisLab Antivirus premium is a comprehensive security tool which not only executes the antivirus job but also permission check, file encryption and decryption, anti-theft jobs, etc on the Android devices.
● AegisLab Antivirus premium obtained the AV-TEST certification with 100% detection rate.
Loop Telecommunication International星通資訊Loop Telecom has been focused on the development of communication systems since 1991. With decades of experience, Loop Telecom has become one of the few Taiwanese companies which possesses R&D capability of vertical integrated solutions. Based in Taiwan, Loop Telecom has expanded its market to over 80 countries around the world. Loop Telecom has sales offices in Taiwan, Belgium, U.S. and Australia. Moreover, Loop Telecom has deployed several Technical Assistant Centers (TAC) to serve customers worldwide including TAC-EMEA in Greece covering Europe, Middle East and Africa, TAC-CSA in Colombia covering Central and South America, TAC-USA in USA covering North America and TAC-SEA in Malaysia covering Southeast Asia.WEBSITE:www.looptelecom.com
EMAIL: jayson_wang@looptelecom.com
TEL:+886-3-578-7696 ext. 2305Loop's information security solution is the latest of all with NFV (Network Function Virtualization) which is the pioneering technology structure of cloud and data center in the world. Recently, many telecommunication operators, cloud service providers and multinational corporations began to import NFV based network solutions. NFV structure does not require weeks or months to replace or update hardware that is scattered across a wide range of geographical locations. NFV allows transformation to new system structure and opens to new and ?exible network design. VNF (Virtual Network Function) is the crucial element to replace traditional security internet hardware equipment.
Lydsec Digital Technology來毅數位科技Lydsec Digital Technology was founded in 2012 and developed Keypasco Multi-factor authentication (MFA) solution with Keypasco AB from Sweden. A total solution for Internet content providers (ICPs) and service providers a convenient, easy-to-implement, and cost-effective software. It is successfully used in banking, third-party payment companies, smart building, E-commerce, online gaming companies, and health-care industries. In recent years we also introduced Multi-Peer VPN, program weakness scanning, and program quality control tools as well as biometrics like facial/voice recognition, providing a complete solution from endpoint authentication, protection, and programs security to meet the needs of customer identification and data leakage prevention.WEBSITE:www.lydsec.com
EMAIL: services@lydsec.com
TEL:+886-2-2346-3366
Keypasco multi-factor authentication (MFA) solution holds multinational technology invention patents. The Multi-factors include users' devices (such as computers, mobile phones, tablets, or laptops) , Geographical Location, Proximity, Sign What You See, and PKI Sign. Through the Two-channel authentication method and Software Risk Management, it protects the security of identity authentication in a variety of application scenarios effectively. It also avoids man-in-the-middle attacks, phishing, and other attacks. The complete Web Service API function can be ?exibly interfaced with various network service systems, and this highly reduces the cost of hardware construction.
N-Partner新夥伴科技N-Partner Technology Ltd. Co., founded in 2011 in Taiwan, specializes in big data collection and analysis and AI and abnormal analysis and provides solution. All of our core members have over 20 years of experience in network operation and software development. We have professional experts in internet, security, operation system and Kernel, database, big data processing
and Cloud computing, art design and marketing, etc. As the best management helper of IT administrators, we help become more effective and find root cause. Educational organizations, multinationals, and telecoms now use our products as IT operation system. Besides Taiwan, N-Partner has expanded the business scale to China and Southeast Asia.WEBSITE:www.npartnertech.com/en/
EMAIL: sales@npartnertech.com
TEL:+886-4-2375-28651.N-Reporter:
N-Reporter can collect, store and analyze Syslog/Flow data for query and report making.
It differs from other reporters in that it correlates Syslog and Flow. N-Reporter analyzesSyslog from different brands and devices, and by normalizing complex, long Syslog data, IT administrators can clearly know every detail. Also, N-Reporter is with AI analysis and auto-learning. It builds baseline automatically and sends real-time alerts; users do not have to set each threshold manually and can make various reports with the analysis functions. N-Reporter perfectly meets organizations’ needs for management, analysis, and audit.
2.N-Cloud
N-Cloud provides a log management and analysis center for Home network. Cloud computing architecture and NoSQL are used in N-Cloud for non-stop operation and high processing efficiency, up to hundreds of thousands of EPS. It is also with high expandability and the ability for lots of people to use simultaneously and is the very first to be used as SaaS Service with both NOC and SOC.
3.N-Probe
Receive mirror traffic from router/switch and generate 1:1 NetFlow records sending to ?ow analysis tools. It can provide 1G/10G/40G interface by real demand.
Onward Security安華聯網Onward Security is a leading brand in cybersecurity and provides security assessment solutions for connected devices. Founded in 2014 , in addition to possessing an international laboratory, it develops automated security assessment products with AI and machine learning features. Onward Security has received patents and Honors & Awards in many countries and helped customers in government, IoT/IIoT equipment manufacturing, finance, telecom, and other industries with certificates obtaining. Its products and services discover potential cybersecurity threats and vulnerabilities and protect important information or product security, as well as be fulfill with security compliance and industrial standards.WEBSITE:www.onwardsecurity.com
EMAIL: ginger@onwardsecurity.com
TEL:+886-2-8911-50361.HERCULES SecFlow - Product Security Management System
SecFlow provides a full spectrum of systematized solutions for product security development management that complies with DevSecOps for all the phases from the requirement, design, development, test, to deployment, providing product security ?ow management, security vulnerability databases, proactive product security monitoring and reporting to help customers quickly establish a secure software development process in a short period of time, as well as fulfill with ISO 27001 , ISO 27034 , IEC 62443 , OpenSAMM, NIST SP 800-64, and more.
2.HERCULES SecDevice - Automated Vulnerability Assessment Tool
SecDevice is an automated security assessment tool designed for connected products. It is equipped with functions such as vulnerability testing, fuzz testing, and web security testing. Adopting our patented AI machine learning technology, it accelerates the detection time and improves the accuracy of vulnerability detection. The assessments cover IEC 62443 , OWASP TOP 10, CWE / SANS TOP 25 , and more.
Openfind Information Technology網擎資訊Openfind offers integration of functionalities for email, instant message and file sharing, including security, productivity, communication, and continuity. We’ve rounded out a complete end-to-end set of solutions for enterprises and taken first place by market share in Taiwan and Japan. Openfind's superior products for business application enable and create the most value for customers by the reliable, ?exible and manageable services.WEBSITE:www.openfind.com.tw/english/
EMAIL: imt@openfind.com
TEL:+886-2-2553-2000The operating principles of Openfind are honest and responsible, it may be the reason why most clients appreciate us for our reliability. Especially for medium to large enterprises, the cost effectiveness drew the attention and became one of the differentiations between competitors. Our customers not only love the fast and steady system but also are satisfied with the localized functionalities and user-friendly interfaces. Furthermore, our active support is appreciated by customers. The support includes advisory of deploy, customization, troubleshooting, and end-user help desk services
1.Openfind Secure Cloud Service
2.MailGates Mail Protection System
3.Mail Archive and Management System
PacketX瑞擎數位PacketX dedicates to developing the next-generation network monitoring platform with the innovative DPI-enabled visibility software. Its solutions are majorly used as the data acquisition infrastructure to support multiple network security devices and enhance their performance. PacketX has proven itself by deploying its products in several domains: finance, telecom, government and LEA. Moreover, for the convergence of IP and telecom in 5G trend, PacketX also is the technology pioneer to extends its visibility applications within mobile edges to build an IoT security framework.WEBSITE:www.packetx.biz/index.php
EMAIL:sales@packetx.biz
TEL:+886-918-352-459Cybersecurity spending in the public and private sectors continues to grow, but
it is still unresolved in the face of a huge amount of data, highly sophisticated
networks and diversified attacks. GRISM, the next-generation network visibility
platform, can tackle the challenges mentioned above by forming the analysisassisted monitoring fabric for accurately directing the production network traffic
to varied security devices achieving more efficient inspection. GRISM also can
extract network metadata that assist behavior tracking, such as DDoS or lateral
movement detection, and block massive IPs/Domains/URLs according to threat
intelligence. That is, GRISM provides not only pervasive network visibility but also
front-line security.
PIXIS飛泓科技PIXIS is a Taiwanese NAC / IPAM software developer running by an experienced R&D oriented team. As network security has been complicated by explosive evolution of mobility, IoT, and IPv6, PIXIS has been innovating to drive to excellence, and hence has acquired 6 patents in 2018 .
With unique solutions as backbones, PIXIS has fortified the networks in hundreds of customers, including government agencies, financial institutions, hospital networks, and giant enterprises. What is more, PIXIS has expanded its channels in South Eastern Asian as well as West European countries and has obtained tender projects in these areas. WEBSITE:www.pixis.com.tw
EMAIL:agnes.huang@pixis.com.tw
TEL:+886-2-2394-1199PIXIS DSI is a solution in attempt to tackle the issues of ineffective control and inefficient management of local networks. With PIXIS DSI, PIXIS helps organizations to shield, visualize, and administer agentless approaches from the networks. Blending NAC and IPAM in one package, PIXIS DSI delivers capabilities beyond current industry standards. BYOD and Visitor Management are simplified yet enhanced with NAC. Endpoint, switches, and network structure information are consolidated to a comprehensive yet intuitive fashion. Thorough and patented IPv6 integration has turned the solution to be future-proof and has been pioneering in the industry on IPv6 administration. With all the functions developed under one license, PIXIS DSI is a friendly tool for channel partners and end users. This solution can fit in different managerial demands, and thus allows channel partners to market products in creative and ?exible approaches.
Radiant Tech睿明知通Radiant Tech, founded in 2011 , is committed to the development of cyber security measurement methods and technologies to strengthen the effectiveness of control measures. Products of Radiant Tech are jointly developed with 4MOSAn (pronounced as Formosan Security Technology Co., Ltd.) Radiant Tech leads in the field of measurement technology and management practices in Government Configuration Baseline (product : 4MOSAn GCB Doctor) and Distributed Vulnerability Management System (products : 4MOSAn DVMS) ., Base in Taiwan, Radiant Tech is planning to expand into overseas markets.WEBSITE:www.radiant-tech.com.tw
EMAIL:barbet@radiant-tech.com.tw
TEL:+886-2-2365-94824MOSAn DVMS is an enterprise Distributed Vulnerability Management System
(DVMS) that implement into each use agent and control by a Central Control
Interface. 4MOSAn DVMS features 3-tier Architecture which inspect intranet user
without AD, distributed deployment, centralized management system, software
portfolio management, active vulnerability management, assessment report and
continuously-updated library of vulnerability checks. Moreover, each assessment
point is not only limited to assessing system vulnerability, but also monitored
and controlled by Central Control Interface which allows you to patch up the
vulnerable point and also generate integrated vulnerability risk assessment
report from information collected through all use agents.
Ruiting Key Management System叡廷We help enterprises and government agencies to fulfill increasingly complex information system requirements, including development, maintenance and operation management.
Members of Ruiting service team are experienced professionals, with average over 10 years experience on technical support of information security products. We have served major companies and government-related information security management services.WEBSITE:www.ruitingtech.com
EMAIL:casey@ruitingtech.com.tw
TEL:+ 886-2-2627-6340
●HSM – Utimaco
The SafeGuard? CryptoServer of Utimaco company can protect the encryption keys of various servers and applications.The SafeGuard? CryptoServer Se-Series was developed to protect the standard encryption application operations of current critical business. Applications include personal management and PKI environments, file management and archiving solutions and database security.
●CP5 eIDAS HSM
Utimaco CryptoServer CP5 can assist Trust Service Providers (TSPs) as defined in the EU eIDAS specification to fulfill the policies defined in several ETSI technical standards (ETSI EN 319 401, EN 319 411, EN 319 421) and Safety requirements.
●Atalla Payment
Atalla Hardware Security Module (HSM) is a payments security module for protecting sensitive data and associated keys for non-cash retail payment transactions, cardholder authentication, and cryptographic keys.
●ESKM
Enterprise Secure Key Manager (ESKM) provides a centralized key management hardware-based solution for unifying and automating an organization’s encryption key controls by creating, protecting, serving, and auditing access to encryption keys for secure, reliable administration.
●Randtronics
Randtronics is proud to have developed the Data Privacy Manager product, also known as DPM. DPM is a software based solution and enables users to easily protect data on any application, database or file. With DPM, users are able to encrypt their data without any software code changes.
Secward Technologies台灣信威Secward Technologies, Inc. is the first company selling transparent file encryption system
in Taiwan since 2008 . Over a decade we have been accumulating experiences in various industries and know-how of electrical file control, and have relative patents. Keeping pace with the latest information technologies, manufacturing development, and worldwide regulations, we keep our steps ahead and provide the most up-to-date data security solutions.WEBSITE:www.secward.com
EMAIL: info@secward.com
TEL: +886-2-2731-58601.TotalFileGuard
TotalFileGuard is a file encryption system to protect important drawings, documents, and programming codes, and etc..
2.File Multi-Clone
It saves a copy for important files in client PCs whenever they are changed. The function can prevent damages caused by ransomware or intentional file deletion or manipulation.
3.Printing Retracing
It enables detailed log for both virtual and physical print, and saves a copy of the content, that can be searched with key words for investigation, or for sending alerts.
ShareTech眾至資訊Founded in 1999 , ShareTech initially focused on selling IP router. As IT networks grow in more complexity, ShareTech expanded its business focus to information security and aimed to provide more affordable and reliable IT products in order to benefit individuals are SMBs. ShareTech provides intelligent network security and data protection solutions that allow industries, education institutions, and government to connect and collaborate securely. In 2016 , ShareTech cooperated with one of the best Taiwan global brands - ZyXEL, to provide more products and value-added technical support for domestic distributors and businesses.WEBSITE:www.sharetech.com.tw
EMAIL:sales@sharetech.com.tw
TEL:+886-4-2705-0888Next-Gen UTM delivers a full range of Layer 2-7 switching which can be a great
replacement for a L3 core switch. Administrators can create a zone by binding
multiple interfaces. Additionally, access between zone members is controlled by
the default zone policy. Next-Gen UTM functionality allows businesses to create
effective security policies and set up access control between storage devices
or user groups based on application controls over DPI, IPS, and anomaly flow
analysis.
Simpro立寶科技Simpro Technology Co., Ltd. was established in 2007 . The founder members have more
than 15 years of experience in network system and network security. Simpro was a pioneer
in the planning, installation, maintenance and consulting of network security. Simpro focused on the implementation and services of network security and IoT. The products Simpro were franchised including Array, Fidelis, Kaspersky, Owl, Wheel, etc. Simpro's own-brand product was CyberSecureBox. Simpro also cooperated with IoT vendors to provide total solutions for network security, antihacker attacks and big data analysis.
Simpro had competence as well as experience of wireless network, network management, authentication, cameras, etc.WEBSITE:www.simpro.com.tw
EMAIL:steven@simpro.com.tw
TEL:+886-2-8786-0988Simpro's main focus was on network security and IoT. Simpro offered security products of own-brand, CyberSecuBox, and products with franchises included Array Networks, Fidelis APT Cyber Security, Kaspersky, Netaxle, Wheel, etc. Simpro also cooperated with SI to develop ad hoc projects/service of security, and with telecom vendors to provide information security related devices and total solutions.
Simpro also planning, installation, maintenance and consulting of network. The products include Cisco, Extreme, HP Aruba. Simpro has abundant experience and competence in the planning and implementation of large-scale backbone and campus network. Simpro also provides wireless network implementation, management, authentication, and information pushing, etc.
Softnext中華數位科技Softnext aims to provide enterprise IT application management and security of data. Softnext specializes in providing service and technologies of internet application and solutions for content security. Our innovative products enable enterprises manage and protect data easily and efficiently in compliance with regulations. With secure and well-managed network, enterprises will be able to enhance their performance and competitiveness.WEBSITE:www.softnext.com.tw/EN
EMAIL:leo@softnext.com.tw
TEL:+886-2-2542-2526 ext. 251SPAM SQR
The new generation email filtering platform
● Features exclusive filtering technology against spam and threat mails.
● Won a number of Information System Awards.
Mail SQR Expert
Perfect Platform for Email Auditing, Archiving, and Management
● The best optimized balance of search performance and storage space.
● Support email lifecycle management in compliance with regulatory.
Mail Archiving Expert
Provide professional email lifecycle management in compliance with personal
regulatory law
● Online service transparently without changing existing email system
architecture in 3 minutes.
● The best optimized balance of search performance and storage space.
SWT Solutions碩文拓智慧科技SWT Solutions Inc. develops and distrubutes Big Data, Artificial Intelligence, Data Analysis, and Digital Forensics Products. Through reseller partnership we offer industry specific solutions to a variety of clients including financial institutions, law enforcement, governments, health care companies, and enterprises.WEBSITE:www.swtsolution.com.tw
EMAIL: swtsales@swtsolution.com.tw
TEL:+886-2-2358-2011The digital intelligence platform for discovering person-to-person relationships across mutiple cases.
"One-Stop-Shop" platform for digital Investigation that allows you to discover unexpected personal connections, similarity between individual cases, and correlations among seemingly unrelated individuals and cases.
Big Data hidden in overwhelming numbers of devices will need not just one but many tools for discovery and analysis. In order to uncover evidence, acquire critical information, or investigate inside an organization, a "Toolbox" approach with multiple digital forensics tools is essential. Sol-DISC integrates multiple forensics reports on one platform for review and analysis. Information is structured into case management and POI management categories for cross examinations among individuals and cases in order for actionable insight discovery.
Syscom凌?電腦SYSCOM, established in 1975 , continues leading Taiwan's system integration and e-commerce industry with innovative solutions. Headquartered in Taipei, SYSCOM has regional offices around the world including Taiwan, Asia and the Americas.
SYSCOM's evolution from peripheral sales to system integration allowed us to amass a tremendous wealth of domain knowledge. Sharply focused on our areas of domain expertise, SYSCOM offers solutions in areas including: system integration, online custom information integration, e-Business, high-tech manufacturing, network planning and implementation, outsourcing, hardware sales and maintenance, software development and maintenance, and training.
SYSCOM devotes significant resources to service quality. Our results include: ISO 9002 certification in 1996 , approved in 1997 by Taiwan’s Ministry of Economic Affairs for bidding on public sector projects, awarded Best Technology Developer in 1998 by the Ministry of Economic Affairs and in 2000 , SYSCOM achieved ISO 9001 quality certification. Our efforts
to further improve software quality led us to strive for CMMI certification and in 2004 SYSCOM reached Level 3 and then later CMMI Level 5 in 2006 . Since 2009 , we have continued CMMI reappraisals at more rigorous maturity levels.
WEBSITE:www.syscom.com.tw
EMAIL:info@syscom.com.tw
TEL:+886-2-2191-6066NETCenter—IT Auditor and Network Management System:
As an advanced IT auditor and network management tool, NETCenter has some critical ISO network management functions: fault management, configuration management, accounting management, performance management and security management. Additionally, NETCenter offers provisioning management and topology management.
Many customers of both public and private sectors had successfully adopted NETCenter.
Taiwan Information Security Center資通安全研究與教學中心The Taiwan Information Security Center (TWISC) was initiated as a research program in April 2005 and funded by the National Science Council for the past few years. TWISC pulls together experts in information security from various universities and research institutes in Taiwan with an aim to boost research and development activities in information security, promote public awareness, and foster partnership among government, academia, and private sectors. TWISC has established seven affiliated regional centers respectively across Taiwan since then with the headquarters (TWISC@AS) established within and funded by the Research Center of Information Technology Innovation, Academia Sinica. The research activities in TWISC include cryptology, network & software security, data protection, and critical information infrastructure protection, etc..WEBSITE:www.twisc.org
EMAIL:admin@twisc.org
TEL:+886-2-2782-2120● TWISC@NTU center focuses on Artificial Intelligence and Data Science as the main research and development topics and develops intelligent cybersecurity defense, detection and forensic technology based on Big data and SDN/NFV network technology.
● TWISC@NTUST focuses on security solutions and techniques for IoT-based sensing devices, gateways, cloud platform and IoT-oriented application services. The research goals of TWISC@NTUST are to provide integrated multi-layered defense systems and security tools for heterogeneous IoT environments and corresponding applications.
● The research area of TWISC@NCTU is mainly focused on practical attacks and defense technologies against network threats and malware threats, which government institutions, industries, and end users may encounter. Applying deep learning to "Network Attack and Defense" and "Malware Vetting" is also an ongoing topic to address the complex future threats.
T5 Team杜浦數位TeamT5 is a professional cyber security solution provider. Compared with other cyber threat intelligence (CTI) vendors, TeamT5 has the deepest understanding of cyber espionage in the Asia-Pacific region. Our world-class research team has been dedicated to malware research and security incident response for more than 10 years. We are also frequent speakers in the world' s top security conferences, including Black Hat, Code Blue/AVTokyo, Troopers, Hack In The Box, FIRST, etc. With solid technical background and frontline expertise, our portal ThreatVision delivers the best CTI, and ThreatSonar offers the most effective APT hunting solutions.WEBSITE:www.teamt5.org
EMAIL: sales@teamt5.tw
TEL:+886-2-7706-12991.ThreatSonar is an advanced threat hunting and MDR platform with capabilities in Compromise Assessment, auto-investigation, and orchestration. Equipped with over 100 built-in IoCs and thousands of backdoor indicators, ThreatSonar helps discover threats and execute incident responses remotely in a post-compromised environment.
2.ThreatVision is a customer-engaged threat intelligence platform that provides real-time alerts, technical data, OSINT analysis, and in-depth APT investigation. Our platform prepares multi-levels approach to applying intelligence, from operational actions to strategic planning, which allows implementing precise measures to occurred or hidden threat.
Telecom Technology Center電信技術中心Since its foundation in February 2004 , TTC has established InfoCom security, Broadcasting and Wireless Broadband testing laboratories and has been endeavoring to satisfy the requirements for info-communications product testing, certification and technical consulting services. In addition, with the successful implementation of Number Portability Centralized Database Administration Center (NPAC) by TTC since 13th Oct. 2005 , over thirteen million fixed-line users and twenty-one million mobile users have been enable to enjoy high quality and highly reliable NP service. That has created a win-win situation among the users, operators and the government.
For a long term, Taiwan info-communications industry has been more centered in northern Taiwan. TTC is the first national-level InfoCom testing laboratory to station in the Kaohsiung Science Park. Thus TTC has shouldered responsibilities of providing technological assistance to the southern InfoCom manufacturers, enhancing the R&D level for industry in the fields of telecom, broadcasting and InfoCom security technologies, and attracting a cluster of industries. TTC will strive to make the Kaohsiung Science Park a communications park in the future, and to promote the balance of regional development.
WEBSITE:www.ttc.org.tw
EMAIL:Junwei.Song@ttc.org.tw
TEL:+886-7-627-7077Android malware analysis engine is not a new story. Every antivirus company has their own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.We have an order theory of criminal which explains stages of committing a crime. For example, crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced.According to the above principle, we developed our order theory of android malware. We develop five stages to see if the malicious activity is being practiced. They are:
1. Permission requested.
2. Native API call.
3. Certain combination of native API.
4. Calling sequence of native API.
5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of a malware.
Trend Micro趨勢科技For over 30 years, Trend Micro's unwavering vision has been to make the world safe for exchanging digital information. Security is Trend Micro's entire focus, and it shows. This single-minded passion has inspired Trend Micro to progress and innovate to cope with a changing IT landscape, new criminal methods, riskier user behavior, and constantly evolving threats. This makes Trend Micro consistently raises the bar on protection by expanding boundaries, challenging assumptions, and building a safer future.
Trend Micro's defense covers from the endpoint to the network to the cloud. The depth of experience and comprehensive defense remains Trend Micro unmatched and be widely recognized by customers and industry gurus of all kinds.
Trend Micro has provided protection to 250+ million Endpoints with 500,000+ Companies worldwide.WEBSITE:www.trendmicro.com/en_us/business.html
EMAIL:sales@trend.com.tw
TEL:+886-2-2378-9666Hybrid Cloud Security Solution:
Cloud security simplified with Trend Micro Cloud One? security services platform
1.Workload Security: Secure your data center, cloud, and containers without compromising performance or security with a comprehensive SaaS solution.
2. Container Security: Simplified security for your cloud-native applications with automated container image and registry scanning.
3. File Storage Security: Security for cloud file/object storage services leveraging cloud-native application architectures.
4. Application Security: Detection and protection for modern applications and APIs built on your container, serverless, and other computing platforms.
5. Network Security: Powerful, seamless network layer protection, detection, and threat disruption for your multi-cloud environment.
6. Conformity: Real-time security for cloud infrastructure – secure, optimize, comply.
Trustview優碩資訊TrustView is a Taiwanese information security company with its self-developed software and focuses on the field of information leak protection.
Since founded in 2000 , we have gained trust from hundreds of clients in Taiwan, Japan and China. TrustView is the first choice for more than 40% of the top 100 companies in Taiwan. We work hard on technology related to DRM/Area DLP/CASB information security and has almost 22 patents in these fields. The information security is extended to desktops, mobile devices, file servers and storage media on the cloud, helping businesses manage internal/external confidential files, graphics, source codes, personal information and web pages. TrustView is the best partner of our customers in digital intellectual property security.WEBSITE:www.trustview.com.tw/en/
EMAIL:mkt@trustview.com.tw
TEL:+886-2-2772-9900 1.IDP (Individual Document Protection):
IDP solves the internal circulation control problem and ensures prevention of data leakage. The applicable file formats include the commonly used Office and PDF.
2.VDP (Virtual Disk Protection):
The unique virtual disk isolation technology can satisfy the need to protect all kinds of documents in the company, especially the R&D design file of special format or the program file that can be damaged during encryption.
3.ODP (Outgoing Document Protection):
ODP enables the company to keep controlling outgoing documents. In addition to controlling the rights of external users, ODP allows all the operation records to be returned to the company. With the ODP, TrustView provides a total solution to control the documents wherever they were delivered.
TWISC@NCKU成功大學資通安全研究與教學中心Taiwan Information Security Center @ National Cheng Kung University is abbreviated as TWISC@NCKU. Taking system security as the main topic, our center conducts research and development of cutting-edge technology and cultivates talents. Major operating items include system attack and defense, vulnerability testing, analysis and management of operational diary, and the planning and suggestion of cyber security management policy.WEBSITE:www.twisc.ncku.edu.tw
EMAIL:contact@twisc.ncku.edu.tw
TEL:+886-6-238-7092 Critical infrastructure such as power plants, water supply systems, and rail transport are all part of industrial control systems. Unlike general information appliance, the security of critical infrastructure is highly related to national security. With the advent of the 5G, the rapid growth of the IoT devices application and remote connection control system has gradually expanded and deepened the network security threats. To ensure the security of critical infrastructure service, we analyze several attack methods from the perspectives of attackers and figure out the weaknesses and vulnerabilities of the system. By doing these, we can develop different kinds of detection and defense technologies that adapt to various industrial control systems. Then, we can ensure the safety of the system and make sure that the service will not be interrupted.
UGuard崴遠科技UGuard Technologies was founded Continued from 2004 . By a group of many years of bandwidth management, information security, network communications, and other product development and installation of practical experience in the formation of a team consisting of professionals, headquartered in Taiwan. To develop its own brand and OEM / ODM and other technology research and development of the diversified business model, the current focus on the Asian market and focus on the application of ?ow control solutions.WEBSITE:www.uguard.com.tw
EMAIL:sales@uguard.com.tw
TEL:+886-2-8751-6800
UGuard is a leader in complex network traffic management and optimization solutions provider, hardware-based enterprise solutions, focusing on application bandwidth management and security protection, focusing on application traffic control solutions, and will develop more networks in the future Services and products of intelligent security management platform.
1.AgileLink NextGen WAM Management
2.UAC NextGen Traffic Management
UPAS優倍司UPAS was founded in 1993 as a pioneer and leader of intranet security control system. With years of product development, it has eventually independently developed the core technology of ARPScanner for IP management patented in Taiwan, China, and US. After the ongoing R&D and sales of almost 20 years and the accumulated R&D investment of more than NTD 400 million, UPAS has accumulated the product use testimonies of more than 1000 customer groups on the market.WEBSITE:www.upas-corp.com/en
EMAIL:service@upas-corp.com
TEL:+886-2-2739-3226UPAS automatic whitelist function allows you to manage network devices and
restrict unauthorized devices. The integrated compliance audit detects and
reports on configuration changes and compliance violations to prevent security
attacks, which included vulnerability scan, IP, MAC, computer name, and
hardware UUID analysis.
UPAS statistics dashboards allow you to quickly monitor, troubleshoot, and
optimize your virtual network. It provides the overall view of the network health
and shows the potential threats from different angles, so the manager can make
relative recommendations based on the summarized information and make plans
for future IT resources requirement to ensure network reliability.
WiSECURE Technologies匯智安全WiSECURE Technologies (WiSECURE) was founded in 2019 , aiming to design standardized hardware security modules in various form factors, including PCIe cards, microSD cards, USB tokens, etc. WiSECURE specialize in cryptographic processing, key storage and key generation, which are fundamental applications in storage encryption, authentication, emerging digital assets, industrial control, IoT, WFH (Working from home) , digital rights managements (DRM) and other innovative services and applications. WEBSITE:www.wisecure-tech.com
EMAIL:support@wisecure-tech.com
TEL:+886-2-2934-31661.kvHSM is a hardware security module coming in the form of a PCIe card. Possessing purpose-built cryptographic engines, it provides high-performance cryptographic services, including data encryption, digital signature, key generation, etc. Equipped with key storage having acquired CC EAL 5+ certification, kvHSM can protect systems from advanced hardware attacks such as side-channel attack, mitigating the risk of key leakage. With a user-friendly console in an integrated package, kvHSM enables out-of-the-box functionality.
2.VeloCrypt? MicroSD HSM is a hardware security module coming in the form of a microSD card. It provides cryptographic services driven by hardware-based crypto engines, including encryption, key generation, key life cycle management, digital signature, authentication. To meet security requirements in a wide range of use case applications, VeloCrypt? MicroSD enables customization of algorithms, which can be operated against advanced hardware attack. VeloCrypt? MicroSD can be widely used in strong authentication, data storage encryption in transit and at rest, secure communication, secure mobile payment, etc.
Xcome擎願XCome has more than ten years of experience in software Development and got Google
EMM product developer certified in 2018 . Dedicated in MDM solution, XCome's proudct is adopted by many customers to secure their company confidential data. Because of strong R&D capabities and industry domain know how, XCome win the trust of customers.WEBSITE:www.xcome.com
EMAIL:nory.wang@xcome.com
TEL:+886-2-2976-5188 ext. 866XCome MDM solution-SkyMDM can effectively and quickly control the information security of mobile devices.
Through this platform, enterprise can centrally control all mobile devices, rapidly mass deployment. Set different management policies according to different groups. includes control of basic mobile phone functions: such as Camera, WI-FI, Bluetooth , USB access and other restrictions, APP management: such as APP whitelist, run time permissions and other settings. Our key success cases, semiconductor manufacturer TSMC and government organizations, through XCome SkyMDM , quickly and mass deployment of nearly 10,000 mobile phones, to achieve their goal of enterprise mobile security control.
ZUSO Generation如梭世代For ages, antivirus software is key to preventing the above mentioned; however, it is apparently insufficient after all. Instead of passively relying on a ready-made or all-purpose antivirus software, possessing a custom-built one broadens your horizons of information security and technology.
We provide a diversity of the most optimal portfolio of solutions to your budget preference and for your selection.
Defend as the majority of companies may, in the aspects of hackers we consider it to the contrary; say, ""THE BEST DEFENSE IS OFFENSE."
We are your trustworthiest ally going by name... ZUSO Generation that is always on the same page with you and turns over a new leaf of "happily-ever-after" for you!WEBSITE:zuso.ai
EMAIL:service@zuso.ai
TEL:+886-4-2252-83381.Penetration Testing
In the aspects of hackers, we attempt to invade a corporate's website and information system, from exterior to interior, in purpose of doxing the possibility of potential threats for issuance of complete report and advice of improvement.
2.Red Team
Our red team use zero-day vulnerabilities into potential attack paths, business impact of the breach, remediation steps and analysis to understand root causes of security failures.
3.Cyber Security Incident
Cyber Attacks Anywhere Are a Threat Everywhere. Our team has a lot of experience in investigating security incidents, allowing companies to quickly understand the overall incident, All to help you get back to business as usual with confidence- quickly and efficiently.
Zyxel合勤科技Zyxel has been getting home and business users online for over 30 years, relying since Day 1 on innovation and customer-centric service. Zyxel is a global force in the communications market with an unrivalled international presence that includes:
1.150 markets served
2.1,000,000 businesses working smarter with Zyxel solutions
3.100 million devices creating global connectionsWEBSITE:www.zyxel.com/homepage.shtml
EMAIL:sales@zyxel.com.tw
TEL:+886-3-578-3942Zyxel’s security solutions provide powerful real-time protection that ensures
service continuity, optimal cost performance and complete network control.
Zyxel’s highly acclaimed USG Series has helped businesses to satisfy all these
demands. Zyxel’s new Advanced VPN Series are business-grade VPN gateways
fine-tuned to deliver the fastest VPN and firewall for the most performancedemanding deployments. Built with remote management and ironclad security
for organizations with increasing distributed sites, the Zyxel Nebula Cloud
Managed Security Gateway Series provides extensive protection every small- to
mid-size business would need.