CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

ITTS Info

Booth Number:B59

Founded in 1999, Information Technology Total Services (ITTS), a subsidiary of TECO Group, is dedicated to providing smart-application services, IT outsourcing services, business process outsourcing services, AIoT solutions, and Cloud cloud value-added solutions for business. Furnished with technology and experience accumulated by over 20 years, ITTS has become the most reliable and trustworthy long-term partner of major enterprises for IT outsourcing services. 

With years of experience in IT consulting capabilities and obtaining IT services and cybersecurity certifications, ITTS provides cybersecurity services and solutions including SOC monitoring, IO/OT cybersecurity testing, Security Information Event, and Management to satisfy cybersecurity needs for enterprises and government institutions.

Contact Representative

前往https://ccmsassets.ithome.com.tw/2022/4/1/4076965a-f5bb-4b3b-8572-ece9ed78f4cf.jpg

Products

SecBuzzer ESM (Enterprise Security Management) solutions
NEW SecBuzzer ESM (Enterprise Security Management) solutions

SecBuzzer ESM (Enterprise Security Management) solutions provide information security quick screening services for ransomware and DDoS, so that enterprises can avoid attack threats in the high-risk environment of information security incidents. Actively defend against information security incidents through monitoring. 

Featuring cloud supply chain threat-hunting technology, we build the cybersecurity joint defense platform with precise analyzed detection, quick response and also meet the compliance regulations. 

Security Information Event and Management
Industrial Cyber Threat Detector (ICTD)
NEW Industrial Cyber Threat Detector (ICTD)

Industrial Cyber Threat Detector (ICTD) solution provides cybersecurity assessment that can help the enterprise to enhance the necessary action and improve the security protection into next level by our automated compliance assessment tool. ICTD solution can perform resource inventory for factory equipment, provide support for communication protocols across IT and OT equipment and automatically generate equipment lists, provide supply chain network topology and visualize related information security events and problems, Innovative multi-level collaborative analysis and detection, information security monitoring, and network blacklist, automatic detection of abnormalities, comprehensive observation of OA&OT network, active prevention, and create a solid network environment.

OT Security

Tech Demo

Solutions

Cybersecurity Consulting Services

ITTS provides professional enterprise-level cybersecurity consulting services

We provide cybersecurity detection and real-time monitoring services, from prevention, monitoring, reinforcement, response and investigation to provide a full range of information security services.

ITTS agents the cybersecurity solutions of Taiwan Cyber Security Foundry Co., Ltd. (TCFC), includes SecBuzzer ESM (Enterprise Security Management) solutions and Industrial Cyber Threat Detector ( ICTD) solution; ESM provide information security quick screening services for ransomware and DDoS, so that enterprises can avoid attack threats in the high-risk environment of information security incidents. Actively defend against information security incidents through monitoring. In addition, Industrial Cyber Threat Detector ( ICTD) solution provides cybersecurity assessment that can help the enterprise to enhance the necessary action and improve the security protection into next level by our automated compliance assessment tool. ICTD solution can perform resource inventory for factory equipment, provide support for communication protocols across IT and OT equipment and automatically generate equipment lists, provide supply chain network topology and visualize related information security events and problems, Innovative multi-level collaborative analysis and detection, information security monitoring, and network blacklist, automatic detection of abnormalities, comprehensive observation of OA&OT network, active prevention, and create a solid network environment.


White Papers

Videos