CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

銀級

Terilogy Taiwan

Terilogy Technology Co., Ltd. is a Terilogy Japen sales representative office in Taiwan. 

We are a leading global provider of service assurance solutions that help both service providers improve and enterprises achieve better returns from their complex IT infrastructures. 

We are strives to continue being a leading network infrastructure and solution integrator.

ForensicsNetwork MonitoringNetwork Visibility

Momentum

Because of terrorism, we want to challenge the world with the new value of transmitted network data.

Our strengths are monitoring and security. You should be able to fight anywhere in these two areas.

Momentum it is worth the network data that can be conveyed.

The current mechanism of collecting and analyzing network data , whether for security purposes, for fault analysis purposes, or for marketing purposes, is too complicated and expensive.

We realize a mechanism to extract and analyze the necessary information more simply and in real time as needed when necessary . 

Functions required for analysis provide an environment that can be freely used as open source applications (momentum Apps).

We are worthy of network data that can be conveyed because we are network & security territory. 

Continue to provide new values of our network data all over the world.

Endpoint SecurityData Loss PreventionPolicy Management

LanScope Cat - Protect & Manage Your IT Before It Gets Out of Control.

As your company grows, so do the number of endpoints you have to protect. Did you know over 61% of small businesses experienced a cyber attack in 2016? Hackers see small businesses as easy targets. LanScope Cat changes that.

LanScope Cat protects every single endpoint on your network by allowing you to define and enforce your own company policy. Our easy-to-use console allows you to monitor web activity, external device usage, USB usage, printing activity and more!

Threat IntelligenceThreat Analysis & ProtectionThreat Management

KELA - We Provide Comprehensive Cyber Intelligence Solutions.

We search the Darknet to identify specific, targeted threats against our client.

These can be leaked IT systems and topology, employee information, user credentials, and product vulnerabilities. 
In the process, KELA will essentially map the most relevant attack vectors and leak sources. 
This targeted cyber intelligence enables our clients to get a completely external viewpoint of their situation and vulnerabilities in order to prevent data breaches at the earliest possible stage.

DDos protect / APT protect / Threat situation solution
 

    Product Type

    ForensicsNetwork MonitoringNetwork VisibilityEndpoint SecurityData Loss PreventionPolicy ManagementThreat IntelligenceThreat Analysis & ProtectionThreat Management