CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

黃金級

Pumo

Applicure Technologies Ltd. founded in 2004 in Israel. Focusing on website service security, and specializing on behavior pattern recognition and attack techniques of hackers. They continuously update professional knowledge and technology every year. dotDefender is known for behavioral database and supports a variety of server architectures and OSs. It accurately identifies hacking attack techniques and adjusting security settings according to website services. Blocking hackers immediately and protecting websites from being hacked. Pumo Network Digital Technlogy Co.,Ltd is authorized agent in Taiwan.

Web Service SecurityApplication SecurityData Security

Web Application Security – dotDefender

Regardless of the website scale, the vulnerabilities in the website programs are fatal threats to the enterprises. The hackers keep seeking for the vulnerabilities in the website programs. dotDefender uses a variety of program engines which Pattern Recognition, Signature Knowledgebase, Data Leak Prevention, and Upload Inspection included to detect and prevent hacking attacks. dotDefender is the most suitable solution for the Web Application Security. It provides powerful and proactive security protection for websites and web applications.

Web Service SecurityApplication SecurityData Security

Keep Database Security - DAF Database Application Firewall

Database Application Firewall integrates Data Auditing, Data Security, and Data Masking, these main functions. It provides comprehensive security protection for the database to minimize the leakage possibility of confidential information of enterprise by Data Auditing in advance, Data Security immediately and Data Masking in the after. And it could also be integrated with third-party security management (SIEM) systems. Database types supported: MySQL, MsSQL, Oracle, IBM DB2, MariaDB.

Vulnerability AssessmentPenetration TestingExploit of Vulnerability

To find the vulnerabilities of websites - Vulnerability Assessment

Up to 90% of websites are hacked without being awareness about it. Hackers hack the websites to steal data and implant malwares. The goodwill of company might be ruined and you have no idea about is totally. Vulnerability Assessment takes different hacking ways to find out different website vulnerabilities by imitating the hacker behavior. During the process, it won’t affect website performance. By using automatic tool to scan website, we will give you the vulnerability report in detail to list security concerns. The software will be updated or upgraded according to the TOP 10 security vulnerabilities listed by the OWASP every year to strengthen the security of websites.

Cloud SecurityData SecurityNetwork Security

Cloud Hosting

The cloud hosting is developed by R&D departments in PUMO based on three core ideas, effective, stable and security. The enterprises could use high specification cloud hosting by renting instead of buying. You don’t need to buy the servers, you don’t need to build systems and you don’t need to hire MISs to manager it. Concatenating to the TOP 3 ISPs, hence you don’t be afraid of being disconnected. With a backup architecture, you don’t be worried about server malfunction. With load balance, you don’t be worried about the over loading. Your website will always be available anytime. We value cyber security more than you.

  • A Clear and Present Danger

    Today’s commercially-motivated hackers are targeting the valuable data on corporate Web servers.
    Skillfully crafted attacks penetrate unprotected sites without leaving a trace, stealing financial data,
    such as credit card numbers, and other personal details. How can they be stopped?

  • Secure Your Business with dotDefender
    • Fits any computing environment – physical, virtual or cloud
    • Easy installation on Apache and IIS servers
    • Open API for wide integration with management platforms and other applications
    • Manage multiple instances remotely with Central Management
    • Pre-defined best practice security rules
    • Protection against known and zero day attacks
    • Fully customizable automated reporting
    • Low ongoing maintenance costs
    • No influence on network performance

捕夢網弱點掃描.定期滲透測試 打造網站安全環境


Product Type

Web Service SecurityApplication SecurityData SecurityWeb Service SecurityApplication SecurityData SecurityVulnerability AssessmentPenetration TestingExploit of VulnerabilityCloud SecurityData SecurityNetwork Security