TOGETHER, WE

RESPOND

FASTER

CYBERSEC 2019

Taipei International Convention Center
Taipei World Trade Center Hall 1, 2F

Think Like Great Minds – Why Top IT managers see NAC compulsory

Adrian Cheng, CEO, PIXIS Technology

In 2018, numerous events of data breaches occur despite the size or scales of the leaking corporations. Verizon suggests that 65% of data breaches come from the physical networks, which highlights the network security loophole exposed in this BYOD era. Organizations tend to invest more on the security of perimeters and overlook the local area networks, which sensitive information is easily retrieved. 

“We have found the users in Europe and the United States more accepting the concept and importance of Network Access Control,” shares the CEO of PIXIS Technology, Adrian Cheng. “The case is different in APAC countries. Clients here like to think it’s a management tool and can be replaced by time and manpower, so it’s not compulsory. This is actually very dangerous logics to put the local area network in a more risky environment.” 

Cheng mentions that the clients with rather simpler networks cannot even track all connected devices, not to mention control the access of them. “This is an era of multiple devices. It is normal for a company with 200 employees to own 500 or more connected devices.” For those organizations with branches, the complexity of management multiplies. In a manpower-limited outpost, it is a better practice for the headquarters to have visibility of the branch network and enforce the policies directly with a centralized management tool. 

PIXIS Technology suggests several points for network administrators to evaluate in purchases of such systems. First off, automation is a must. Deploying a system that requires future manual update for operation is a waste of time, cost, and manpower. Secondly, such solution should not rely on switches to perform blocking. In APAC countries non-SNMP manageable switches or hubs still widely exists in networks. A solution relies on switches would be handicapped in such environment, or end up costing the organizations more by upgrading network devices. Last but not least is the future adaptability. IPv6 is picking up in IoT and industry 4.0 venues now. PIXIS Technology suggests organizations to test the capability of solution on IPv6, in case of future potential network upgrade. 

Cheng highlights, “PIXIS Technology majorly serve giant enterprises and government sectors now, not because these organizations are sizable, but because they have strong awareness in security.” It is believed that the organizations who get to consult with PIXIS Technology can also gain from the advanced security manage concept of their peer IT managers, and the solutions that PIXIS Technology develops correspondingly.

  • Share:

CYBERSEC 2019 Partners

Endorsed by

行政院資通安全處
經濟部

Organizer

iThome

Co-Organizer

社團法人台灣駭客協會

Premiere Technology Partner

台灣思科系統股份有限公司

Strategic Technology Partner

奧義智慧科技股份有限公司

Diamond Sponsor

中華電信股份有限公司
CHT Security 中華資安國際
精品科技股份有限公司

Platinum Sponsor

台灣國際商業機器股份有限公司
漢領國際有限公司
台灣微軟
Splunk

Gold Sponsor

惠普科技
商丞科技股份有限公司

Exhibitor

Consulting Partner

勤業眾信聯合會計師事務所

Supporting Association

中華民國電腦稽核協會
亥客書院
財團法人資訊工業策進會
財團法人國家實驗研究院國家高速網路與計算中心
財團法人中華民國國家資訊基本建設產業發展協進會
美商國際半導體產業有限公司台灣分公司
Students’ Information Technology Conference
臺灣學術網路危機處理中心
台灣資通產業標準協會
台中市電腦商業同業公會
財團法人電信技術中心
台灣電腦網路危機處理暨協調中心
台灣數位安全聯盟
臺灣電腦安全事件應變中心
國立成功大學資通安全研究與教學中心

Media Partner

Equipment Sponsor

台灣三星電子股份有限公司
維嘉全球科技股份有限公司

Cyber Taiwan Pavilion

Endorsed by

經濟部

Organizer

工業局
iThome

Co-Organizer

工研院

Supporting Association

資策會

Cyber Taiwan Pavilion Exhibitor

社團法人台灣駭客協會
中華資安國際
奧義智慧科技股份有限公司
精品科技
詮睿科技股份有限公司