CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

白金級

TONG WEI -NETWORK BOX

Tong Wei Internet Technology is the general agent of Network Box in Taiwan. It has set up SOC of defensive detection center in 28 countries and regions around the world, and detects network and equipment status 24 hours a day, using the most advanced security and security joint defense monitoring and management technology. In response to the latest cyber threats and the ability to instantly update the "PUSH" technology, the signatures can be updated to Network Box in the world within 45 seconds to ensure the most immediate protection for customers.
Tong Wei Internet Technology provides information security defenses such as hacker attacks, worms and malicious programs that are faced after the mechanical industry information network to establish a safe and flawless production line environment.

Unified Threat ManagementHackers & ThreatsWeb Security

Network-Box- Omni-directional network security management system

Network Box provides customers with "hybrid firewall", "intrusion detection and protection system", "antivirus gateway", "virtual private network", "spam filtering", "web content filtering", "web application firewall WAF" "DDoS Decentralized Blocking Service Attack Defense" and "Application Control" real-time monitoring and defense management system help enterprises to do the most powerful computer information protection for enterprises in response to rapid network changes and enterprises facing various network threats. To prevent theft of important information, the infringement of electronic digital assets, and the loss of corporate reputation, to prevent and eliminate possible network threats and attacks.

Managed Security ServiceInternet of ThingsNetwork Security

Information Security Monitoring Management Service

The Security Operation Center provides 7*24 professional monitoring management and consulting, management interface and online real-time reporting, and a professional team provides MSSP (Managed Security Service Provider) web hosting service, complete security management We will help you to solve your own integrated threat management equipment and help enterprises to maximize their protection under a limited budget: (1) Early warning and notification mechanism (2) Instant alarm mechanism, master the latest security trends (3) Alarm message collection And correlation analysis (4) information security equipment adjustment and policy setting (5) accident elimination and tracking processing (6) consulting services (7) to enhance corporate employees' information security awareness

Risk ManagementSecurity ConsultingThreat Management

Weakness analysis audit management service

Weakness analysis audit management services for information security threats companies generally can not effectively grasp the threat information, information personnel often play the fire brigade, but can not effectively deal with information abnormal threats, we provide assistance to the customer information system vulnerability scanning risk analysis audit and advisory services can be effective Help customers keep track of the risks of corporate information and effectively reduce risk of control, support IPv4/IPv6 dual protocol, support Unicode, support CVSS score, support CVE, support CIA impact, support command line mode to perform scan auto-detection communication The communication protocol (Protocol) of the service provided by the service includes the ID connection of the CVE, the intelligent scanning of the network, and the simultaneous scanning of IP address hosts and devices using IPv4 and IPv6 protocols.

1.    DDoS and WAF website application attack combined solution
The Network Box Anti-DDoS WAF+ Defense System provides customers with rules that comply with OWASP security risks. When the latest Web application vulnerability is discovered or launched, the defense system provides specific WAF rules for immediate (Real-Time) emergency patching and provides a customizable interface for HTML-5 GUI graphicalization. The interface is instantly monitored and tested to ensure safety. Customized format reports are also available to meet corporate reporting requirements. When traffic passes through WAF rules, administrators can make rules that allow for denial and logging of traffic. System rules can provide a customer-defined positive / negative security model.
Network-Box Anti-DDoS WAF+ provides five security modules that can be integrated with defenses, regardless of server, website, URL path and application.
(1) DDoS/DoS Model: Instantly track the used pattern and identify the source of the attack for defense protection.
(2) Negative Security Model: Scan for inbound requests and apply protection criteria for detection.
(3) Vulnerability Protection Model: Protected systems can be patched to ensure system security.
(4) Outbound Protection: Provides protection policies such as data leakage prevention (DLP)/tamper detection.
(5) Positive Security Model: Developed through active security rules: all non-compliant traffic is rejected.

2.    Anti-malicious anti-virus system
The Network-Box Anti-Malware Anti-Virus System provides 16 malicious software engines that combine with Kaspersky to provide a powerful protection system with more than 12 million signatures to identify and prevent viruses, Trojans, worms and Other malware infects your network system. Anti-Malware anti-virus systems scan and analyze incoming and outgoing email, HTTP, HTTPS, and FTP-compliant malware and malicious websites. Even attachments such as .exe, .zip files, and other compression and encoding formats are decoded and scanned. Network Box provides global unique and proactive instant update technology to ensure that the information network is secure and the malware virus (ransomware) is invisible.

3.    IoT Internet of Things production line information security protection
Network-Box provides a high-end active defense system and a global SOC (Security Operation Center) to protect the factory's intelligent production line, collect and analyze abnormal traffic, control remote access, establish security boundaries, and block hacking attacks from other areas. Malicious packets protect the PLC from attacks and protect the data collection and monitoring system SCADA (Supervisory Control And Data Acquisition) security.

4.    Information Security Risk Analysis and Consultant Service
With the development of the Internet, network security has become an important part of the business or organization. How to protect valuable information assets from unauthorized users to steal (Confidentiality), how to ensure the integrity of information transfer and transactions (Integrity) and how to ensure business operations related network application service availability (Availability), has become organization with employees, customers and between business organizations and business organizations and companies eager difficult issues urgent solution.
Network-Box can assist customers in information security risk analysis vulnerability scanning. After using the vulnerability auditing service, they can know what risks exist in the enterprise network environment after scanning, and distinguish them into urgent, serious, high, medium and low level. Managers and management assess current risks and correct solutions to effectively reduce risk and control.

5.    Global Information Security Monitoring Center
Network Box is the only company in the world to combine information security equipment with information security services, won numerous international information security awards and passed ISO9000; ISO27001; ISO20000 and other international certifications. High-quality information security solutions enable customers to reduce costs, simplify management, and improve information security. ability. Network-Box information security module: Firewall / IDP / VPN / Anti-Virus / Anti-Spam / Content Filter / DLP / DDoS / WAF / Application Identification / Entity Management / SSL Proxy / SIEM and other functions, the module can be flexibly selected, The Network Box Information Security team assists customers with complete migration and implementation, rule setting, instant alert notification, event removal, configuration of multiple backups, and equipment provisioning.

  • Network Box Z-Scan

    Network Box Z-Scan Zero-day malware protection, anti-malware module system provides 16 anti-malware software, running more than 12 million signatures, identifying and preventing viruses, Trojans, worms and other malicious software from infecting your network System, anti-malware system transparently scans and analyzes incoming and outgoing SMTP email, HTTP and FTP protocol malware, even if attachments such as .exe, .zip files, other compression and encoding formats are decoded and scanned, Scan external emails from POP3 and IMAP accounts, and the unique patented PUSH technology updates the latest signatures to the client at any time within 45 seconds to ensure 24/7 network security.

  • The Network Box Anti-DDoS WAF+

    The Network Box Anti-DDoS WAF+ system is configured with rules that comply with the top ten security risks of the OWASP (Open Web Software Security Program). You can also customize each Anti-DDoS WAF+ rule to prevent attacks against specific web applications. With the patching or version update of each protected web application, the system can make similar modifications and updates to ensure continuous and effective protection.

  • Network-Box S-Scan

    Network-Box S-Scan mainly provides customers with control and browsing of website content while providing protection against webpage threats. It uses high-performance signature-based technology and provides identification and classification of instant web content, providing customers with their own defined access rules.

  • Network-Box Infected LAN

    Network-Box Infected LAN can identify infected workstations, servers and connected smart devices in the LAN/DMZ area of the network for isolation, as well as scanning and identifying botnet access and malicious websites and malware.

  • Network-Box Application Scanning and Control

    Network-Box Application Scanning and Control provides application scanning and control engines to analyze data-level web traffic to identify the application responsible for that traffic, and the engine can properly tag connections for reporting and policy control. Integrated into an SSL proxy that even identifies and controls traffic within an encrypted SSL session. In addition to tags and categories, the engine allows for analysis of data flow in terms of productivity and potential risk, and enhanced provisioning in terms of control rules: Flexible category control / Time control / user control / flexible condition control.

The global professional security team 365*24 always guards you

The Global Information Security Monitoring Service Center helps companies achieve pre-protection against cyber threats and attacks in response to rapid network changes and various network threats.


Effective protection of IoT IoT production line system

Protect the factory's smart production line, collect and analyze abnormal flow control remote access, protect PLC and data collection monitoring and analysis system to ensure SCADA security.


Product Type

Unified Threat ManagementHackers & ThreatsWeb SecurityManaged Security ServiceInternet of ThingsNetwork SecurityRisk ManagementSecurity ConsultingThreat Management