CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

Cyberview Information Co., Ltd.

Cyberview Information Co., Ltd.

Cyberview 力悅資訊

Cyberview Information Co., Ltd. Info

Booth Number:B01

Established in 2005, Cyberview has successfully introduced a number of security protection software into Taiwan, which have being praised by our distribution parters and clients in various industries. Meanwhile, as a "VAD- Value Added Service Distrbutor" expert in co-marketing, we are dedicated to provide professional security products and services to the Greater China region, ultilize the power of technology and security to help enterprises make profits. 

With this belief, Cyberview continues to introduce world's latest concepts and top technology products. Through distribution channels, these useful information that increases Taiwan's businesses' international competitiveness will continue to be promoted to various industries, so that IT units imorting Cyberview products are no longer "Cost Centers", but "Centers for balancing security and profitability" of companies.

Products

CyberArk
CyberArk

CyberArk is a global leader in securing identity. CyberArk focuses on Privileged Access Management, provides the most comprehensive security products any identity (human or machine) across business application systems, distributed workforces, hybrid cloud workload, and throughout DevOps lifecycle. 

(1)Privileged Access

80% of security exploits are caused by privileged credential leakages. With CyberArk, you can isolate and block privileged attacks before damages are done. Users have native access to all the contents needed, you can sit back and relax knowing critical assets are ensured.

(2)Customer and Employee Identity

Identity is the new battlefield for information security today. A robust password-less experience allows users to access seamlessly, while leveraging AI to keep threats out. Empowers your employees and customers the right to access easily and safely on any device, any where, at any time.

(3)DevOps Protection

Applications and automation tools are essential elements of innovation, however, they are also popular targets for sophisticated cyber attacks. We can support you to protect human identities in the enture DevOps procedure, without sacrifising business flexibility.


Extended Detection and Response
Bitdefender
Bitdefender

Bitdefender XEDR Total Antivirus Protection

Bitdefender offers a centralised control center that provides a single management platform for all security management modules, which can be hosted in the cloud or deployed locally. Through providing cross-platform security, it resists targeted attacks for endpoints, servers, virtual desktops, mobile devices, and Exchange mail services. This design offers maximum flexibility and allows administrators to set security policies easily, to satisfy the needs of enterprises.

  • Speedy and flexible implementation, easy for remote deployment.
  • Uses Machine Learning, progressive heuristic technology, advanced exploit defence, and other exclusive technology to protect endpoints.
  • Offers highest detection accuracy with zero false positives.
  • Provides full visibility of suspicious activity.
  • Dedicated virtual machine platform, simplifies the steps needed for multiple virtual machines to install the same anti-malware software repeatedly, allowing efficient centralised management.

About Bitdefender—

  • Protected over 500 million systems in 150 countries for over 18 years
  • Over 150 OEM clients, including several well-known antivirus vendors
  • Stable quality acquiring the highest three-star certification from AV-Comparative for many years
Extended Detection and Response
Votiro
Votiro

Votiro Secure File Gateway

100% protection from weaponized files.

The only file security solution that guarantees all files entering your organization are completely safe.

(1) Secure File Gateway for Email

Easily connects all mail servers, protecting all contents and attachments, without delaying or interrupting business.

(2) Secure File Gateway for Web Application

Prevents malicious files to be uploaded through company specific web application, portals, or other services used to receive customer data.

(3) Secure File Gateway for Web Downloads

Integrates into all existing proxy servers, and secures files downloaded from any browser.


Extended Detection and Response

Solutions

Identity Security and Access Management

CyberArk is a global leader in securing identity. CyberArk focuses on Privileged Access Management, provides the most comprehensive security products any identity (human or machine) across business application systems, distributed workforces, hybrid cloud workload, and throughout DevOps lifecycle. 

(1)Privileged Access

80% of security exploits are caused by privileged credential leakages. With CyberArk, you can isolate and block privileged attacks before damages are done. Users have native access to all the contents needed, you can sit back and relax knowing critical assets are ensured.

(2)Customer and Employee Identity

Identity is the new battlefield for information security today. A robust password-less experience allows users to access seamlessly, while leveraging AI to keep threats out. Empowers your employees and customers the right to access easily and safely on any device, any where, at any time.

(3)DevOps Protection

Applications and automation tools are essential elements of innovation, however, they are also popular targets for sophisticated cyber attacks. We can support you to protect human identities in the enture DevOps procedure, without sacrifising business flexibility.

XEDR Antivirus Total Protection

Bitdefender XEDR Total Antivirus Protection

Bitdefender offers a centralised control center that provides a single management platform for all security management modules, which can be hosted in the cloud or deployed locally. Through providing cross-platform security, it resists targeted attacks for endpoints, servers, virtual desktops, mobile devices, and Exchange mail services. This design offers maximum flexibility and allows administrators to set security policies easily, to satisfy the needs of enterprises.

• Speedy and flexible implementation, easy for remote deployment.

• Uses Machine Learning, progressive heuristic technology, advanced exploit defence, and other exclusive technology to protect endpoints.

• Offers highest detection accuracy with zero false positives.

• Provides full visibility of suspicious activity.

• Dedicated virtual machine platform, simplifies the steps needed for multiple virtual machines to install the same anti-malware software repeatedly, allowing efficient centralised management.

About Bitdefender—

• Protected over 500 million systems in 150 countries for over 18 years

• Over 150 OEM clients, including several well-known antivirus vendors

• Stable quality acquiring the highest three-star certification from AV-Comparative for many years

File Firewall/ File Sanitizing

Votiro Secure File Gateway

100% protection from weaponized files.

The only file security solution that guarantees all files entering your organization are completely safe.

(1) Secure File Gateway for Email

Easily connects all mail servers, protecting all contents and attachments, without delaying or interrupting business.

(2) Secure File Gateway for Web Application

Prevents malicious files to be uploaded through company specific web application, portals, or other services used to receive customer data.

(3) Secure File Gateway for Web Downloads

Integrates into all existing proxy servers, and secures files downloaded from any browser.

White Papers

Cyberview joins hands with high-tech manufacturing industries to move towards to technology sustainability, a new frontier for information security
Cyberview joins hands with high-tech manufacturing industries to move towards to technology sustainability, a new frontier for information security
下載
In just 10 minutes! Cyberview takes you through financial security penalty to understand the legal compliance requirements!
In just 10 minutes! Cyberview takes you through financial security penalty to understand the legal compliance requirements!

According to iThome 2021 Cybersecurity Survey, the financial industry, which emphasizes information security, will be faced with four major security threats and risks, including hacker attacks, attacks through scial engineering, ransomware, and information security vulnerabilities. These will be the top priority for the financial industry when enhancing information security protection.

Financial Supervisory Commission pushed for ""Financial Cyber Security Plan"" on August 6, 2020, aimed to provide secure, convinient, reliable, stable and uninterrupted financial services to the public. Strengthening the inspections on cybersecurity measures for financial inudstry are cut into from four aspects, enhancing the competent authority's cybersecurity supervision, intensifying financial institution's cybersecurity control, enhancing financial institution's security operation resilience, and implement cybersecurity joint defense.

Using the first half of this year as an example, the Financial Supervisory Commission imposed penalties on a number of financial institutions for failing to implement cybersecurity practices and failing to implement internal controls. Summarize security missing below: (Reference - Financial Supervisory Commission)

下載
Identity Security — Top priority that is not to be neglected to move forward without worries
Identity Security — Top priority that is not to be neglected to move forward without worries

Digital transformation has opened up many new opportunities for businesses, but it has also opened the door to attackers. Cyber attacks may be inevitable, but we can prevent attacks from damaging our businesses. This eBook outlines how an identity-centric security model increases your resilience in today's new threat situation.

下載

Videos

Bitdefender GravityZone Security for Containers

Bitdefender GravityZone Security for Containers extends Bitdefender leading cloud workload security offering, providing your on-premise or cloud-hosted container Endpoint Detection and Response(EDR), including AWS Microsoft Azure and Google Cloud Platform.

With Bitdefender Security for cloud workloads, you will see your team gain flexibility to use the right platform to host their workload, without sacrificing security.

What is 「Identity Security」?

In today's hybrid and multi-clouds world, every identity represents a potential attack path to an organization's most valuable assets. Traditional network barriers are not enough to protect the perimeter. This is why having a strong identity security strategy is so important. Watch this video to understand how your organization can take the zero trust approach to protect the increasing number and variety of identities. 

Neutralize weaponized files from any source:Positive Selection Technology

Unlike detection-based file security solutions that scan for suspicious elements and blocks certain malicious files, Positive Selection only selects safe elements, ensuring every file entering the organization is 100% secure.