CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

黃金級

V2

Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Advanced Threat ProtectionZero-day VulnerabilityRansomware

ESET ENTERPRISE INSPECTOR

An Endpoint Detection & Response tool designed to exploit ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to:Detect advanced persistent threats/Stop file less attacks/Block zero-day threats/Protect against ransomware/Neutralize state-sponsored attacks

PhishingAdvanced Threat Protection

ESET THREAT INTELLIGENCE SERVICE

Get in-depth, up-to-date global knowledge about specific threats and attack sources, traditionally difficult to detect for security engineers, who access information only within their own networks. Enable your organization to:Block targeted attacks/Protect against phishing/Stop botnet attacks/Detect advanced persistent threats

Network SecurityGDPRMachine Learning

GREYCORTEX MENDEL

A Network Traffic Analysis tool helps enterprise, government, and critical infrastructure users make their IT operations secure and reliable through advanced artificial intelligence, machine learning, and big data analysis.
#Provides round-the-clock security monitoring
#Gives you powerful rapid detection & response capabilities
#Take advantage of the solution’s powerful detection capabilities
#Let’s you gain a deep visibility into the internal network
#Powerful and easy to use

Machine LearningZero-day VulnerabilityCloud Security

ESET DYNAMIC THREAT DEFENSE

provides another layer of security for ESET products like Mail Security and Endpoint products by utilizing a cloud-based sandboxing technology to detect new, never before seen type of threats. Future proof your company IT security with:Behavior-based Detection/Machine Learning/Zero-day Threats Detection/Cloud Sandbox

Endpoint ProtectionGDPRRansomware

ESET ENDPOINT SECURITY

Leverages a multilayered approach that utilizes multiple technologies in dynamic equilibrium to constantly balance performance, detection and false positives enabling organizations to:Protect against ransomware/Block targeted attacks/Prevent data breaches/Stop file-less attacks/Detect advanced persistent threats

Threat Analysis ProtectionThreat IntelligenceGDPR

ESET FILE SECURITY

Provides advanced protection for your company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity via:Ransomware prevention/Zero-day threats detection/Data breaches prevention/Botnet protection

Email SecurityBusiness Email CompromiseCyber Criminal

ESET MAIL SECURITY

Provides an additional layer of security to organizations who are interested in stopping threats from ever reaching their users – multilayered security of the host itself with:Anti-malware/Anti-spam/Anti-phishing/Optional Cloud Sandbox analysis

Managed Security Service

ESET REMOTE ADMINISTRATOR

Provides real-time visibility for on-premise and off-premise endpoints as well as full reporting for ESET enterprise-grade solutions from a single pane of glass securely deployed on premise or in cloud.(Complete network visibility/Full security management/Flexible reporting/Security management automation)

Network Security

ESET GATEWAY SECURITY

#Low System Demands. Leaves more system resources free while still delivering complete protection
#Remote Management. Fully manageable via ESET Remote Administrator 6
#Employs ESET's award-winning LiveGrid® scanning engine

Data SecurityGDPR

ESET ENDPOINT ENCRYPTION

A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:Zero data breaches/Compliance with requirements/Seamless encryption

AuthenticationGDPRPassword Management

ESET SECURE AUTHENTICATION

A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems. Enables your organization to:Prevent data breaches/Meet compliance requirement/Easily manage authenticati/Secure mobile devices

Data Loss PreventionGDPR

SAFETICA®

#Covers all data leak channels
#Saves the cost of repairing a data breach.
#Identifies suspicious activities before they result in lost time and money.
#Reduces personnel costs by identifying productivity issues and improving work performance.

Virtualization Containerization & Segmentation

ESET VIRTUALIZED SOLUTIONS _ESET SHARED LOCAL CACHE (AGENT-BASED)

With ESET Shared Local Cache and the protection of an ESET security product, one of which must be present on each virtual machine, you get the same full set of tools and security features that you would have in a physical environment, plus significantly boosted scanning speed.

Virtualization Containerization & Segmentation

ESET VIRTUALIZED SOLUTIONS _FOR VMware ESET VIRTUALIZATION SECURITY FOR VMware

By leveraging VMware agentless technology, protecting compatible hypervisors is as simple as using ESET Virtualization Security Appliance. The solution is natively compatible with ESET Remote Administrator 6, ESET’s web-based console for rapid task execution and complete endpoint security management.

Mobile Security

MOBILE DEVICE SECURITY_ESET ENDPOINT SECURITY FOR ANDROID

Leverages a multilayered approach to provide complete protection and secure device management of your Android mobile devices. Enables:Protection against ransomware/Data loss prevention/Application control/Remote management

Mobile Security

MOBILE DEVICE SECURITY_ESET MOBILE DEVICE MANAGEMENT FOR APPLE iOS

Set-up, configure and monitor all company iOS devices from a single pane of glass. Enables:Anti-theft/Web content filtering/Applications white/black listing/Device security

1.ESET ENTERPRISE INSPECTOR
An Endpoint Detection & Response tool designed to exploit ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to:Detect advanced persistent threats/Stop file less attacks/Block zero-day threats/Protect against ransomware/Neutralize state-sponsored attacks
Web page : http://eset.version-2.sg/business/enterprise-inspector

2.ESET THREAT INTELLIGENCE SERVICE
Get in-depth, up-to-date global knowledge about specific threats and attack sources, traditionally difficult to detect for security engineers, who access information only within their own networks. Enable your organization to:Block targeted attacks/Protect against phishing/Stop botnet attacks/Detect advanced persistent threats
Web page : http://eset.version-2.sg/business/threat-intelligence/

3.GREYCORTEX MENDEL
A Network Traffic Analysis tool helps enterprise, government, and critical infrastructure users make their IT operations secure and reliable through advanced artificial intelligence, machine learning, and big data analysis.
#Provides round-the-clock security monitoring
#Gives you powerful rapid detection & response capabilities
#Take advantage of the solution’s powerful detection capabilities
#Let’s you gain a deep visibility into the internal network
#Powerful and easy to use
Web page : http://eset.version-2.sg/business/network-traffic-analysis/

4.ESET DYNAMIC THREAT DEFENSE
provides another layer of security for ESET products like Mail Security and Endpoint products by utilizing a cloud-based sandboxing technology to detect new, never before seen type of threats. Future proof your company IT security with:Behavior-based Detection/Machine Learning/Zero-day Threats Detection/Cloud Sandbox
Web page : http://eset.version-2.sg/business/dynamic-threat-defense/

5.Small Business
Easily manageable IT security software incorporating ransomware protection. Install and forget. Cloud-based administrator maximizes convenience and slashes hardware expense.
Web page : http://eset.version-2.sg/business/small-business/

6.Mid-Size Business
Manage your company IT security from a single web console. Ensure business continuity, minimize downtime and benefit from ESET's light footprint and flexible licensing.
Web page : http://eset.version-2.sg/business/mid-size-business/

7.Enterprise (500+ Seats)
ESET is the Challenger in Gartner’s 2018 Magic Quadrant for endpoint protection
Key points of Gartner's report include:
#Detailed analysis of the endpoint protection market including growth factors and challenges.
#Unbiased, comparative evaluation of vendors in this space.
#Specific criteria which assist in the selection of endpoint protection platforms.
Web page : http://eset.version-2.sg/business/enterprise/

ESET Official Video

For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology.


Product Type

Advanced Threat ProtectionZero-day VulnerabilityRansomwarePhishingAdvanced Threat ProtectionNetwork SecurityGDPRMachine LearningMachine LearningZero-day VulnerabilityCloud SecurityEndpoint ProtectionGDPRRansomwareThreat Analysis ProtectionThreat IntelligenceGDPREmail SecurityBusiness Email CompromiseCyber CriminalManaged Security ServiceNetwork SecurityData SecurityGDPRAuthenticationGDPRPassword ManagementData Loss PreventionGDPRVirtualization Containerization & SegmentationVirtualization Containerization & SegmentationMobile SecurityMobile Security