CYBERSEC EXPO 2019

The largest CYBERSEC EXPO in Taiwan, A Collection of Solutions in Cyber Security

MAR.19 - 21

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

臺灣資安館參展夥伴

I.X

I.X established to innovate of mobile security and combined best IT manufacturing with innovative software, cloud services to provide secure and outstanding innovative security solution in the mobile security arena.
 
I.X invented the world's first wireless key authentication and data encryption communication platform. With global patent 3-key authentication mechanism, I.X provides the physical key based 2FA authentication login mechanism including legal effectiveness electronic signature. All communication data and messages are encrypted and protected, and not compromised to ensure data security. I.X also provides tools for IT department to manage and audit company confidential information access record.

Messaging SecurityMobile SecurityData Security

2FA secondary authentication

  • The user uses the Smartphone + I.X wireless key card as a 2FA login. No need to worry about password stolen, no need for complex passwords that even users can't remember and no need to change password regularly because authentication is protected by I.X privacy card.
  • I.X can integrate with enterprise services (e.g. PC / MAC login, enterprise ERP, CRM, HR system, etc.) to achieve the single-sign-on. I.X can also upgrade normal VPNs with high-level 2FA login, it can also applied to online banking and mobile app login to strengthen login protection.
Messaging SecurityMobile SecurityData Security

Enterprise Group Encryption IM

  • Group IM uses the keys of each group members to encrypt the communication content and files. Only authorized group members can use their own I.X wireless key to decrypt messages and read the communication content to protect the company's confidential information from leakage.
  • I.X can automatically update active employee list to improve management efficiency and security, that significantly reduce potential security loopholes caused by employee turnover.
Container SecurityWeb Service SecurityContent Security

Prevent data leakage

  • I.X's secure browser can connect to intranet services (e.g Email, ERP, CRM, SRM, etc.), disable user to download important file.
  • I.X Cloud Gateway can filter unauthorized browser access to sensitive enterprise services.
  • 2FA secondary authentication
  • Enterprise Group Encryption IM
  • Prevent data leakage

I.X Wireless Privacy Key

World’s first 3-way authentication mechanism to provide highest level of authentication and most secure communication platform


Product Type

Messaging SecurityMobile SecurityData SecurityMessaging SecurityMobile SecurityData SecurityContainer SecurityWeb Service SecurityContent Security