CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

銀級

eZoom

eZoom information Inc. was established by 1996, the office is location in TaipeiHsinchu and Tainan. eZoom focus on the extension in ICT industry, and expend the serveice on agency and project implementation and service to satisfied the customer’s needs. Also, eZoom provide the ERPBISecurity, Cloud and BOSS solution and consulting/outsourcing service for customers.
 

Insider ThreatData SecuritySIEM

ALog

Released originally in September 2005, ALog ConVerter is an agentless (non-resident program) access log management tool. ALog ConVerter takes a server event log and looks for file access, domain logins, and other activity, providing all-in-one proprietary analysis and file compression for long-term storage. 

ALog EVA is the latest product in the ALog ConVerter series, the No.1 seller in the server access market for 11 consecutive years. ALog EVA takes ALog Convertor to a new level by making it possible to detect irregular or illegal activities through a wider range of big data by various network devices and application logs via advanced correlations techniques.

Insider ThreatData SecuritySIEM

ALog ConVerter

•    Server Access Log Management
•    Acquires server access from layers of Operation System (OS)
•    Integrated log management system of multiple servers 

Insider ThreatData SecuritySIEM

ALog ConVerter DB

•    Database Log Management
•    Acquires log from the database application layers
•    Stores scattered database logs as a unified data

Insider ThreatData SecuritySIEM

ALog EVA

•    Simplified SIEM 
•    Expands the domain of ALog protection
•    Unifying log product 

Insider ThreatData SecuritySIEM

Resource Athlete

•    Server Management 
•    Multifunctional server management tool
•    EX) Identifying access permission information of particular folders, eliminating  unnecessary files, etc.  

Access ControlPrivilege ManagementPassword Management

SecureCube Access Check

SecureCube Access Check is a gateway-based privileged access management solution. It is all-in-one product, equipped with strong authenticaion feature, authorization flow by using policy and request-approval based, and privileged session monitoring feature that can monitor the operation of system administrator during access to servers or network devices. It has been deployed world-wide and has study case in a very large environment with minimum deployment time.

Identity Management & GovernanceAccess ControlAuthentication

Uni-ID Libra

Uni-ID Libra is a customer identity and access management (CIAM) solution. It has all features that is needed to control the identity and access for customers by strengthening the security and maintain the usability. It also has the feature to identify possible fraud used by the identity in the service.

DevSecOpsApplication SecurityVulnerability Assessment

Vulnerability Explorer(VEX)

Vulnerability Explorer (VEX) is a web application assessment solution. Very high detection rate is one of the strong point of this solution. Developed based on long experience in web application penetration test, we can even use this solution to check a production server that is located behind a web application firewall with a non-destructive method.

AMIYA

ALog ConVerter(Data Security Management/logging management )

NRI Secure

1)    SecureCube Access Check : Gateway-Based Privileged Access Management Solution
2)    Uni-ID Libra : Customer Identity and Access Management Solution
3)    Vulnerability Explorer (VEX): Web Application Assessment Solution

  • SecureCube Access Check
  • Uni-ID Libra
  • ALog ConVerter

    Centralization of all data into a single, secure location Immediate and intuitive pull-out of all essential items. ALog ConVerter centralizes logs in file servers storing important enterprise data and analyzes complex system logs with our proprietary logic and converts them into readable access logs. Using this converted log data enables a clear understanding of access activity, intuitive searches and reports via a web browser, thus facilitating monitoring and protecting enterprise-critical data.      

  • ALog ConVerter DB

    Protecting your database – Monitoring access to valuable data actions taken by DB administrators Incidents or accidents such as data leaks and falsification can badly damage your organization. With its focus on database activity, ALog ConVerter DB is an access log management tool that enables users to monitor “when, who and what” with regard to critical data including customer information.    

  • ALog EVA

    Manage and monitor your logs from various perspectives Ranging from network devices to web servers ALog EVA is an integrated log management tool; helping you discover visits to career sites via Web proxy or monitor workers’ excess overtime from time cards, so as to uniformly manage all records of activity.    

  • Resource Athlete

    Easy reporting of operational statuses of files, access privileges and accounts Resource Athlete is a full-featured server management tool, providing a comprehensive visual insight into server resources including change and management of Folder Access privileges or sweeping large numbers of unnecessary files.     

SecureCube Access Check

The video shows why privileged access management is important and how SecureCube Access Check solves problems with many advantages.


Vulnerability EXplorer(VEX)Demo

The video shows the demonstation how we can easily do assessment toward the web application.


Data Security Measures—ALog ConVerter

Today’s information systems encompass an increasingly diverse range of IT devices. How do you monitor device access without adding to your stress and cost? Reduce stress and cost by monitoring important data centrally from the server. Log management without relying on client devices. ALog ConVerter is the answer.


Product Type

Insider ThreatData SecuritySIEMInsider ThreatData SecuritySIEMInsider ThreatData SecuritySIEMInsider ThreatData SecuritySIEMInsider ThreatData SecuritySIEMAccess ControlPrivilege ManagementPassword ManagementIdentity Management & GovernanceAccess ControlAuthenticationDevSecOpsApplication SecurityVulnerability Assessment