CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

Tachun

Tachun Info

Booth Number:F20&B12

Tachun Technologies, Inc. is a Taiwanese cybersecurity agency, representing for international leading brands as their solution provider in Taiwan. We aim to help our enterprise clients to develop a future-ready comprehensive cybersecurity framework against nefarious threats.

Contact Representative

前往https://ccmsassets.ithome.com.tw/2022/3/7/7311b96f-1620-4bf2-95f2-b29ed796b910.png

Products

Proofpoint Advanced Threat Protection
Proofpoint Advanced Threat Protection

These new threats call for a new, integrated approach to cybersecurity. To protect your people, data, and brand, today’s defenses must work where your people do. That means on and off your corporate network, across a wide mix of technologies, and through new communications channels. 

Proofpoint helps you protect the way your people work by detecting and managing advanced threats and compliance risks. Our advanced threat solutions work across email, mobile apps, and social media to help safeguard what matters most. We protect your critical information and equip you with the right intelligence and tools to respond quickly when things go wrong."


Advanced Threat Protection
Netskope Security Cloud
Netskope Security Cloud

The Netskope Security Cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and delivers data-centric security from one of the world’s largest and fastest security networks.


Cloud Security
CybereasonXDR Platform
CybereasonXDR Platform

The Cybereason XDR Platform moves beyond endless alerting to instead recognize, expose, and end malicious operations before they take hold. Using one agent, one console, and one team to defend all endpoints, the AI-driven Cybereason XDR 

Platform was designed to expose and intercept every MalOp (malicious operation). 

A MalOp is not an alert, but a contextualized view of the full narrative of an attack. Only Cybereason provides the actionable intelligence to outthink the adversary, the remediation speed to outpace their operations, and the insights to end any attack.

Extended Detection and Response

Tech Demo

Protect 2022: The Proofpoint Platforms vs. The Attacker's Platform Webinar
  • 21st Sep., 11:25-11:55

With risk continuing to converge around people, Proofpoint is helping you keep pace with the visibility, effectiveness, and operational efficiency you need to mitigate those risks. Join this session to hear about Proofpoint’s latest innovations across our threat protection, information protection, and compliance platforms.

Protect 2022: Voice of the CISO report
  • 22nd Sep.,10:05-10:35

Learn what key challenges are facing CISOs across the globe as we unveil the findings of the 2022 Voice of the CISO report. The survey explores three key areas: the threat risk and types of cyber-attacks CISOs combat daily, the levels of employee and organizational preparedness to face them, and the impact of supporting a hybrid workforce as businesses prepare to re-open their corporate offices. It also covers the challenges CISOs face in their roles, position amongst the C-suite, and business expectations of their teams.

Protect 2022: Practitioner's session: Using the Proofpoint platform to defend against threats	Webinar
  • 22th Sep., 12:25-12:55

Join us for a technical, hands-on session on how to counter the attacker's platform and protect your users over email and the cloud.

Solutions

APT Protection, Email Security, Insider Threat Management, Managed Detection & Response

WORLD-LEADING CYBERSECURITY SOLUTIONS

With years of experience in Cybersecurity industry, Tachun keeps providing world-leading cybersecurity solutions and services to clients, seeking integrated solutions in the goal of developing a cyber-resilience structure against growing targeted attacks and sophisticated threats.

INTEGRATED SOLUTIONS

Prioritizing on enhancing clients’ enterprise cyber-resilience as one of business objectives, Tachun not only resells well-developed solutions, but actively focuses on and develops a better service and technical support. With comprehensive cybersecurity consulting service and experience, Tachun provides localized supports in Taiwan and works along with clients on their digital transformation journey.

PROFESSIONAL SERVICE

In Tachun are a group of experts with solid experiences in cybersecurity field, with knowledges in cybersecurity, information technology system consulting, software developing and more, with one and the only purpose of helping clients to build up a stronger cyber defense against attackers."


White Papers

2022 State of the Phish Report
2022 State of the Phish Report

Proofpoint eighth annual State of the Phish webinar for an in-depth look at the latest threat landscape, including phishing, business email compromise and ransomware attacks.

下載
The Human Factor 2021
The Human Factor 2021

Cybersecurity, Ransomware and Email Fraud in a Year that Changed the World

As the global pandemic upended work and home routines in 2020, cyber attackers pounced. Dive deep into how this extraordinary time has changed the threat landscape—and what it means for the year ahead. Our premiere threat report draws from one of cybersecurity's largest and most diverse data sets to explore user vulnerability, attacks and privilege through a people-centric lens. You'll learn:

  • How ransomware activity has evolved
  • The latest techniques and tactics used in attack campaigns—and why they work
  • How nearly every threat actor we track piggybacked the pandemic to target people
  • Why business email compromise is so effective and costly
  • Which threat actors persuaded more people to click
下載
Ransomware Survival Guide
Ransomware Survival Guide

Be Ready for Ransomware

Ransomware is an old threat that just won't go away. While overall volumes have fallen from their peaks a few years ago, today's ransomware attacks are more targeted, more lucrative for attackers and more potentially damaging to your organization. Learn what to do before, during and after a ransomware attack with the 2022 Ransomware Survival Guide. You'll learn:

  • How ransomware works, and how it is changing
  • Preventative measures every organization can take
  • The first thing security teams should do if ransomware infects users' systems
  • Whether you should pay the ransom—and when not to
下載
Upgrade Your Secure Web Gateway - Next Generation of Secure Web Gateways
Upgrade Your Secure Web Gateway - Next Generation of Secure Web Gateways

Ensure your secure web gateway (SWG) can decode the latest cloud services and web traffic to deliver the visibility and context you need to enforce granular policy controls that protect your data and operations.

下載
First Generation CASB - Take a Step Up Beyond First Generation CASB
First Generation CASB - Take a Step Up Beyond First Generation CASB

Modern CASB vendors like Netskope have evolved from first generation CASBs that were architected primarily to discover cloud services and provide limited API-only controls. A modern CASB cloud security architecture consists of real-time traffic inspection of all enterprise traffic, ensuring that real-time, granular visibility and control is provided for both managed and unmanaged cloud applications so enterprises can safely enable the cloud instead of being forced to block it or simply monitor it.

下載

Videos

Proofpoint: Protecting your most valuable assets

Cyber criminals know the easiest way into your business is through your people. Proofpoint is an industry-leading security company that provides a unique, people-centric approach to cybersecurity. See how Proofpoint’s multi-layered security strategies and solutions are designed to protect your people and prevent attackers from gaining access to your networks, resources, and IP.