CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

臺灣資安館參展夥伴

ArmorX

We are specializing in core and operating systems and the crime analysis of multi-task platforms, application behaviors and communication protocol. We have obtained Taiwanese and European Union patents. We have successfully assisted more than one thousand companies in building security fortresses.
President Chih-Wen Cheng has a Ph.D. in mathematics from Carnegie Mellon. He specializes in systems security infrastructure, big data analysis, and self-learning AI. His published papers are located with the Archive for Rational Mechanics and Analysis, and have been awarded by the Society for Industrial and Applied Mathematics for being one of the leading papers it its appropriate field.

Business Email CompromiseAdvanced Threat ProtectionRansomware

SpamTrap Mail Threat Defense

Taiwan’s strongest APT l BEC information center
Instant traceback tracking of malicious threat communication behavior analysis

Technological Adavantage Instant traceback tracking of malicious threat communication behavior analysis.
15 million + (Taiwan attacks) static signatures Next-gen AI unknown malicious threat program behavior analysis.
30 million+ (Taiwan attacks) hacker IPs and short-term domains Sandbox malicious hyperlink download analysis.
APT attack connection counter Sandbox malware behavior analysis
Double authentication whitelist.

Instant traceback tracking of malicious threat communication behavior analysis
APT (Advanced Persistent Threat) is a common attack method that, after locking on its target, collects intelligence, designs bait, and performs various tasks. Some common baits include impersonating customers, government agencies, and other well-known service providers, such as Apple, Google, the State Administration of Taxation, the Health Insurance Bureau, and international express delivery agencies.
Such socially engineered mail are not suspected as advertisements due to the content of the email, and the exploitation of traditional email gateway weaknesses to set the email address of the current unit as a system or personal whitelist, thereby removing any barriers against such fraudulent commercial email.
Our system has the world's most cutting-edge fraudulent email identification technology, providing an exclusive dual-verification whitelisting mechanism, meaning that the sender's mailbox plus the sender's host must both be approved before the mail can be released; and our exclusive SMTP delay counter, prohibit the hacker from utilizing system resources for replies, forcing the hacker to respond.

Nex-gen AI unknown malicious threat program behavior analysis
A malicious program is a program that,from the perspective of a programmer, customizes the simulation program,recognizes and automatically classifies the language library, and defines the ratings of each type of project, including

  • Attachment type:attachment encryption, forged subfile name, bomb compression (ZIP Bomb), decompression times.
  • Characteristic database:complete (Md5), multi-segment (Ssdeep), loading (Imphash) sampling, original database.
  • Program behavior:Antidebug Antivm, CVE Vulnerability, encryption calculus, Exploit Kits, Packers Hidden, Webshells , email identification, malicious files, malware, mobile malware, malicious URLs.
  • Sandbox analysis (optional - independent dynamic sandbox simulation system):behavior analysis, network analysis.

Next-gen AI unknown malicious threat program behavior analysis 
APT attack connection counter - Double verification whitelist

Proactive analysis of spammer communication behaviors
Using the global exclusive patented technology "SMTP Instant Traceback" and "SMTP Hacker Behavior Analysis," you can effectively identify spam, illegal, anonymous, fraudulent, and other malicious mailing behaviors during the SMTP handshake phase.
Determined, decisive, and efficient blocking of more than 90% of spam; cloud reputation blacklist, international blacklist, DNSRBL, content weight calculation, etc., all come together to bring the best and most complete protection for enterprises.

Complete and multi-function organizational reporting
SpamTrap provides self-learning, policy comparison, blacklist reporting, whitelist feedback, personal and group policy development and black and white lists, overdue unread management, agents, quarantine reports, resend reports, aliases, group merges, and other pinpoint functions.
SpamTrap provides a variety of statistical charts and leaderboards, and can send statistics reports to department heads in a timely manner, according to the organizational structure.

Forensic Report
The schedule can be immediately sent, or sent on a specified month, week, day, and time;the content includes periods (starting with today, yesterday, this week, last week, this month, last month, this year, last year) and risk level;regular input comparison of sender, recipient, subject, source routing, message code;recipients can add their own, custom report format (supports webpage, text, PDF).

Data Loss PreventionCryptographyForensics

BestFiler Mail Archive Audit

DLP Trade secrets and personal information 
Drip leakage prevention and data encryption protection

Email remains a vital tool for communications
between modern business transactions
Based on corporate secrecy protection and compliance, such as national personal data protection laws (EU GDPR, ISO27001, BS10012, etc.), companies must fulfill and comply with their email filing and auditing Duties.

Enterprise audits are divided into pre-audits and post-audits
The main purpose of pre-audits is DLP data leakage prevention, which is divided into single excess and cumulative excess (meaning drip leakage prevention), that focuses on risk index and behavior analysis.
The primary purpose of the post-audits are the normal post-management and case-review applications.
BestFiler supports online release applications, online access applications, and various audit reports to implement paperless and strict audit management for enterprise efficiency.

Pre-Audit
excellent risk management tool

  •  Legal compliance:pre-configure PII I standard and PII II behavior
  •  Accurate:supports regular expression and program verification, custom exclusion
  •  Completeness:32/64-bit applications, large and multi-blank attachments
  •  Defensive power:supports single-capped over-range and interval cumulative excess (meaning drip leak prevention)
  •  Data protection:supports email/attachment encryption, prohibit attachment encryption (avoid checks)
  •  Customized mail:group-send but single-recipient display (better than BCC), subject/content replacement (time-saving individualization)
  •  Flexible execution:online routine/individual whitelist, immediate supervisor notification and review release
  •  Management Report:produce various statistical and analytical reports based on audit and management needs

Post-Audit
UBA Big Data Behavior Analysis

  • Normal post-audit management:set query conditions, query permissions, and valid period
  •  Individual case access application:the reviewer applies to the auditor (can require multiple signatures)
  • Drip Report:when exceeds the upper limit, immediately report the maximum and total amount while display the details
  • Manage reports:schedule when to send a variety of user and group reports to supervisors and auditors
  • Mail log:display authentication account and source country code/city, supports forwarding and re-sends
  • System log:contains core log, authentication log, antivirus log, load log
  • Security log:record administrator actions, including searches, forwards, and setting changes, etc.
  • Queue management:configure queue re-transmission and delay, queue notification, periodic queue reports

ELM Lightweight storage of massive data with efficient full-text search 
OEA Organizational cloud archiving and quick historic mail query

ELM Massive Data Management
Supports local and network cluster management.
Supports Journal SMTP/POP de-duplication archives.
Supports .eml format (encrypted) storage and multiple restoration methods.
Supports a wide range of archiving mechanisms, including local, web, CD, and tape.
More than 50 attachment formats and 10 million emails searched in 5 seconds.
Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.
OEA supports hierarchical organization development, mail preview, and attachment text quick search.
OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.

VigiCrypt  Email Encryption Protection
The strongest email encryption gateway ever.
DLP protection and social fraud prevention are the best tools for eliminating fraud.
PDF/ZIP/HTTPS mail and attachment conditional gateway encryption. 
Flexible subject marking, compatible with existing systems, attain internal and external control. 
Custom and random passwords, password database, extensive editing, personal settings.

Email SecurityManaged Security ServiceCloud Security

LisoMail Mail Collaboration

Patented SMTP Stream Processing and MTA Transmission Control 
OTP double certification - Natural persons certificate signature encryption – Zero leakage of national security-grade data

National-Grade Security (download subject/content/attachment/attachment can be read but not downloaded)

Impenetrable Security

  •  Core Operation

    Intermediary program list-checking
    shut off useless instructions
    real-time vulnerability protection

  •   Identity Security

    Root PKI/ACL control
    (natural persons) certificate digital signature
    OTP security authentication

  • Static Encryption

    National security grade
    data leak prevention with maximum specification DLE dynamic length encryption

  •  Dynamic Encryption

    Third-party or spontaneous certificate encryption
SSH encrypted connection with zero successful cracks thus far

Flexible Expansion

  •  Cluster Architecture

    HA Heartbeat automatic backup and reply
    AA SAN cluster anagement
    Rsync parameter synchronization
    DRBD local and Cyrus remote mailbox synchronization

  • High Efficiency Clustering LDAP

    Multi-domain management and advanced routing
    Password policy and online application
    Individual permissions for shared contacts
    AD/LDAP multiple integration
    SQL vacation agent integration

  • Various SOAP (XML) API Interface

Forceful Innovation

  • Mailbox Service

POP(S)/IMAP(S)/HTTP(S) ActiveSync read service, mailbox capacity, mailbox capacity expiration control, mailbox overview, mailbox cleanup, mailbox parameters, internal mail recycling, internal read tracking, consolidated post backup, news group, read letter control (account, internal/external/country, download subject/content/attachment), certification control (POP/IMAP password-guess defense).

  • Mail Transmission

Advanced SMTP TLS, SMTP authentication forgery defense, SMTP success and failure authentication control, SMTP forwarding, SMTP proxy, advanced SMTP forwarding, domain authentication key, signature encryption proxy, fast backup, mail routing, email NIC IP binding (with IP name corresponding to multiple external IP facilitating large number of mail), mail replacement, error message replacement (avoiding closed network), code replacement (avoid garbled code), variable replacement (LDAP column position change to subject/content), outgoing address book, fake Postmaster bounce attack protection, restore winmail.dat mail format, special title (record all recipient mailbox and envelope sender mailbox), queue management (retransmission times/delayed transmission/inquiry/resend/notification/report).

  • Safety Controls

Conditional forwarding backup, multi-domain disclaimer, outbound speed control (avoiding graylisting), advanced SMTP control (single/accumulated number of senders/number of recipients/size/total), sender domain restrictions, attachment backup, attachment removal, recipient exclusion, security level (configure account and email security level), (PDF/ZIP/HTTPS) email encryption, virus scanning.

Web Mail Adopts the latest interactive web technology 
ActiveSync Compatible standards for synchronizing address book and calendar
Next Generation Cloud Data Center

  • Excessive capacity!

Virtual mailbox, one mail one file, zero mailbox damage

  • Efficient space conservation!

Mail deduplication, latest mail ID storage and index management technology

  • Extreme speeds!

Latest Ajax/HML5 interactive web technology, near 100% bandwidth usage

  • Mobile business!

Supports ActiveSync compatible standard sync email, contacts, and calendars
 

E-mail SecurityBehavioral Analytics

ePromotion Professional Marketing Electronic Newsletter

EP newsletter – attain your mission
Excellency oriented delivery, open, and click rate

Effective email marketing
not only ensures that customers receive messages, but also knows what kind of messages customers like.

This way marketing professionals can continue to sell their products and improve marketing performance.

Using the system's unique letter editing mechanism, the general letter content can be converted in to a variety of collection conditions, and various responses can be set in to different points to facilitate analysis and improve email marketing performance.

  • Types of Newsletters

Can configure the: name; the option to make it as the subscription page; display names on the subscription page (Traditional Chinese, Simplified Chinese, English);
permission (user, group); notes; whether you need to review, assign a reviewer (supervisor, types of supervisors, other custom classification);
notification mailbox, notification mail language;
whether the user can select more, select the upper limit, or cancel the subscription list’s application mode (in accordance with any, in line with all).

  • Mail Delivery

Supports inline map transfer link, group-send single-recipient display, content variable replacement, online preview, unsubscribe, scheduled delivery, review. Web version of e-newsletter can display community website sharing links, etc. Supports queued mode delivery, number of re-sends, queue re-send time, DKIM/DomainKeys/SPF domain authentication key, outgoing speed, IP name, network card IP binding, etc.

  • Marketing Template

Source contains the file and the URL. The file format supports
    automatic judgment
    RFC/822 format (.eml)
    MHTML format (.mht, .mhtml)
    HTML format (.htm, .html)
    ZIP format (.zip, including HTML and image files)
The URL is limited to static web pages;
JavaScript or complex CSS web content may be distorted.

  • Marketing List

Includes: marketing list, rejection list, test list; users can delete the marketing list from the system; new list fields contain name contact, permissions, and notes; contacts can add new, edit, delete, import, and download template; import formats supported are the .csv format and .txt format; data column symbol supports commas, semicolons, and tabs; fields include mailboxes, display names, company names, titles, and etc.

  • Scheduling Management

Query field includes: period (last N day/week/month, from year/month/day to year/month/day), user, subject, audit account, audit result (all, pending reviews, permissions, prohibited); supports comparison methods (partial comparison, full comparison, left-to-left comparison, right-to-right comparison), whether to display “has been deleted.”
The list field contains: the time the letter was sent, the sender, subject, user, auditing supervisor, final decision-maker, audit result, audit opinion, audit time, and delivery status. Delivery status includes: re-editing, test sending, delivery initiation, submit for review, review (whether to agree, review opinion), and deleted.

  • Statistic Reports

Query field contains: period (last N day/week/month, period), user (user, group), and newsletter type. List field contains: the user, number of transmissions, number of mailboxes, number of successes, number of failures, number of opened messages, number of clicks, success rate, and failure rate.

  • System Features

Supports custom text and graphical RWD for unsubscribtion Can perform secondary marketing for query results Define recipient behavior scores for profit analysis Integrate APIs with third-party systems Synchronize with CRM Synchronize logs with CRM

  • Marketing Log

Query field contains: the period (last N day/week/month, period), sender, subject; support comparison method (partial comparison, full comparison, left-to-left comparison, right-right comparison). List field includes: marketing activities, subject, number of mailboxes, unsubscribe rate, failure rate, success rate, open rate, click rate, subscription rate. Marketing activity information includes: marketing activities, newsletter type, account number, event time, subject matter, sender, system list, rejection list, other recipients, unsubscribe, total number of recipients, scheduled delivery, and message code. Delivery log display fields include: recipient, sent date, DSN code, delivery result. Query conditions include: support list screening, recipient, filter by delivery results (all, success, failure, queue), opened letters (all, open, unopened), clicked (all, clicked, unclicked).
 

SpamTrap  Mail Threat Defense

  • Taiwan’s strongest APT l BEC information center
  • Instant traceback tracking of malicious threat communication behavior analysis

MalSnipe  Malicious Mail Forensics

  • Next-gen AI unknown malicious threat program behavior analysis 
  • APT attack connection counter - Double verification whitelist

LisoMail  Mail Collaboration

  • Patented SMTP Stream Processing and MTA Transmission Control 
  • OTP double certification - Natural persons certificate signature encryption – Zero leakage of national security-grade data
  • Web Mail Adopts the latest interactive web technology 
  • ActiveSync Compatible standards for synchronizing address book and calendar

BestFiler  Mail Archive Audit

  • ELM Lightweight storage of massive data with efficient full-text search 
  • OEA Organizational cloud archiving and quick historic mail query
  • DLP Trade secrets and personal information 
  • Drip leakage prevention and data encryption protection

VigiCrypt  Email Encryption Protection

  • The strongest email encryption gateway ever
  • DLP protection and social fraud prevention are the best tools for eliminating fraud
  • PDF/ZIP/HTTPS mail and attachment conditional gateway encryption 
  • Flexible subject marking, compatible with existing systems, attain internal and external control 
  • Custom and random passwords, password database, extensive editing, personal settings

ePromotion Professional Marketing Electronic Newsletter 

  • EP newsletter – attain your mission
  • Excellency oriented delivery, open, and click rate

NetAudit  Network Security Audit Management 

  • Control MTA Standard Agreement POP/IMAP/SMTP 
  • Control Exchange ROH/OWA/ActiveSync
  • According to national security-grade read title/text/attachment (readable data does not leak)
     

    Product Type

    Business Email CompromiseAdvanced Threat ProtectionRansomwareData Loss PreventionCryptographyForensicsEmail SecurityManaged Security ServiceCloud SecurityE-mail SecurityBehavioral Analytics