CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

ArmorX Global Technology

ArmorX Global Technology

鎧睿全球科技

ArmorX Global Technology Info

“Ultimate Secure Solution” is the eventual goal for construction of environmental information in 21st century.

ArmorX is a well-known domestic enterprise. Forward-looking technology research and development is led by Chih-Wen Cheng CMU Ph.D.,

Solutions we provide Flow Cleansing, APT Anti-Malicious Email Defense, Spam Mail Control, DLP Email Audit, Mail Collaborative Operations,instant messaging, video conferencing, document co-editing, etc..

We have won trust of thousands of medium-sized enterprises,

Awards

2019 Golden Yang Award

2018 IT Monthly’s Top 100 Innovative Product Award

Recognitions

ISO/IEC 27001:2013

Qualification certificate for foundational security testing of mobile applications

Contact Representative

前往https://ccmsassets.ithome.com.tw/2022/3/5/2ef464f5-2207-4455-a74d-78056fabd632.png

Products

ArmorX APT Malicious Mail Forensics
ArmorX APT Malicious Mail Forensics

Technological Adavantage

Sandbox malicious hyperlink download analysis.

APT attack connection counter Sandbox malware behavior analysis

Double authentication whitelist.

Instant traceback tracking of malicious threat communication behavior analysis

APT (Advanced Persistent Threat) is a common attack method that, after locking on its target, collects intelligence, designs bait, and performs various tasks. Some common baits include impersonating customers, government agencies, and other well-known service providers, such as Apple, Google, the State Administration of Taxation, the Health Insurance Bureau, and international express delivery agencies.

Such socially engineered mail are not suspected as advertisements due to the content of the email, and the exploitation of traditional email gateway weaknesses to set the email address of the current unit as a system or personal whitelist, thereby removing any barriers against such fraudulent commercial email.

Our system has the world's most cutting-edge fraudulent email identification technology, providing an exclusive dual-verification whitelisting mechanism, meaning that the sender's mailbox plus the sender's host must both be approved before the mail can be released; and our exclusive SMTP delay counter, prohibit the hacker from utilizing system resources for replies, forcing the hacker to respond.

Next-gen AI unknown malicious threat program behavior analysis 

A malicious program is a program that,from the perspective of a programmer, customizes the simulation program,recognizes and automatically classifies the language library, and defines the ratings of each type of project, including

 Attachment type:attachment encryption, forged subfile name, bomb compression (ZIP Bomb), decompression times.

 Characteristic database:complete (Md5), multi-segment (Ssdeep), loading (Imphash) sampling, original database.

 Program behavior:Antidebug Antivm, CVE Vulnerability, encryption calculus, Exploit Kits, Packers Hidden, Webshells , email identification, malicious files, malware, mobile malware, malicious URLs.

 Sandbox analysis (optional - independent dynamic sandbox simulation system):behavior analysis, network analysis.

Forensic Report

The schedule can be immediately sent, or sent on a specified month, week, day, and time;the content includes periods (starting with today, yesterday, this week, last week, this month, last month, this year, last year) and risk level;regular input comparison of sender, recipient, subject, source routing, message code;recipients can add their own, custom report format (supports webpage, text, PDF).

Advanced Threat Protection
ArmorX Spam  Spam Mail Defense
ArmorX Spam Spam Mail Defense

Taiwan’s strongest APT l BEC information center

Instant traceback tracking of malicious threat communication behavior analysis

Technological Adavantage

Instant traceback tracking of malicious threat communication behavior analysis.

15 million + (Taiwan attacks) static signatures Next-gen AI unknown malicious threat program behavior analysis.

30 million+ (Taiwan attacks) hacker IPs and short-term domains Sandbox malicious hyperlink download analysis.

Instant traceback tracking of malicious threat communication behavior analysis

APT (Advanced Persistent Threat) is a common attack method that, after locking on its target, collects intelligence, designs bait, and performs various tasks. Some common baits include impersonating customers, government agencies, and other well-known service providers, such as Apple, Google, the State Administration of Taxation, the Health Insurance Bureau, and international express delivery agencies.

Such socially engineered mail are not suspected as advertisements due to the content of the email, and the exploitation of traditional email gateway weaknesses to set the email address of the current unit as a system or personal whitelist, thereby removing any barriers against such fraudulent commercial email.

Our system has the world's most cutting-edge fraudulent email identification technology, providing an exclusive dual-verification whitelisting mechanism, meaning that the sender's mailbox plus the sender's host must both be approved before the mail can be released; and our exclusive SMTP delay counter, prohibit the hacker from utilizing system resources for replies, forcing the hacker to respond.

Proactive analysis of spammer communication behaviors

Using the global exclusive patented technology "SMTP Instant Traceback" and "SMTP Hacker Behavior Analysis," you can effectively identify spam, illegal, anonymous, fraudulent, and other malicious mailing behaviors during the SMTP handshake phase.

Determined, decisive, and efficient blocking of more than 90% of spam; cloud reputation blacklist, international blacklist, DNSRBL, content weight calculation, etc., all come together to bring the best and most complete protection for enterprises.

Complete and multi-function organizational reporting

SpamTrap provides self-learning, policy comparison, blacklist reporting, whitelist feedback, personal and group policy development and black and white lists, overdue unread management, agents, quarantine reports, resend reports, aliases, group merges, and other pinpoint functions.

SpamTrap provides a variety of statistical charts and leaderboards, and can send statistics reports to department heads in a timely manner, according to the organizational structure.

Email Anti-spam
ArmorX DLP  Mail Audit System
ArmorX DLP Mail Audit System

Enterprise audits are divided into pre-audits and post-audits

The main purpose of pre-audits is DLP data leakage prevention, which is divided into single excess and cumulative excess (meaning drip leakage prevention), that focuses on risk index and behavior analysis.

The primary purpose of the post-audits are the normal post-management and case-review applications.

BestFiler supports online release applications, online access applications, and various audit reports to implement paperless and strict audit management for enterprise efficiency.

Pre-Audit

excellent risk management tool

 Legal compliance:pre-configure PII I standard and PII II behavior

 Accurate:supports regular expression and program verification, custom exclusion

 Completeness:32/64-bit applications, large and multi-blank attachments

 Defensive power:supports single-capped over-range and interval cumulative excess (meaning drip leak prevention)

 Data protection:supports email/attachment encryption, prohibit attachment encryption (avoid checks)

 Customized mail:group-send but single-recipient display (better than BCC), subject/content replacement (time-saving individualization)

 Flexible execution:online routine/individual whitelist, immediate supervisor notification and review release

 Management Report:produce various statistical and analytical reports based on audit and management needs

Post-Audit

UBA Big Data Behavior Analysis

 Normal post-audit management:set query conditions, query permissions, and valid period

 Individual case access application:the reviewer applies to the auditor (can require multiple signatures)

 Drip Report:when exceeds the upper limit, immediately report the maximum and total amount while display the details

 Manage reports:schedule when to send a variety of user and group reports to supervisors and auditors

 Mail log:display authentication account and source country code/city, supports forwarding and re-sends

 System log:contains core log, authentication log, antivirus log, load log

 Security log:record administrator actions, including searches, forwards, and setting changes, etc.

 Queue management:configure queue re-transmission and delay, queue notification, periodic queue reports

ELM Lightweight storage of massive data with efficient full-text search 

OEA Organizational cloud archiving and quick historic mail query

ELM Massive Data Management

Supports local and network cluster management.

Supports Journal SMTP/POP de-duplication archives.

Supports .eml format (encrypted) storage and multiple restoration methods.

Supports a wide range of archiving mechanisms, including local, web, CD, and tape.

More than 50 attachment formats and 10 million emails searched in 5 seconds.

Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.

OEA supports hierarchical organization development, mail preview, and attachment text quick search.

OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.

VigiCrypt Email Encryption Protection

The strongest email encryption gateway ever.

DLP protection and social fraud prevention are the best tools for eliminating fraud.

PDF/ZIP/HTTPS mail and attachment conditional gateway encryption. 

Flexible subject marking, compatible with existing systems, attain internal and external control. 

Custom and random passwords, password database, extensive editing, personal settings.

Data Loss Prevention
ArmorX Archive  Mail Archive System
ArmorX Archive Mail Archive System

ELM Lightweight storage of massive data with efficient full-text search 

OEA Organizational cloud archiving and quick historic mail query


ELM Massive Data Management

Supports local and network cluster management.

Supports Journal SMTP/POP de-duplication archives.

Supports .eml format (encrypted) storage and multiple restoration methods.

Supports a wide range of archiving mechanisms, including local, web, CD, and tape.

More than 50 attachment formats and 10 million emails searched in 5 seconds.

Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.

OEA supports hierarchical organization development, mail preview, and attachment text quick search.

OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.

Database Security
ArmorX Mail  Secure Mail System
ArmorX Mail Secure Mail System

Patented SMTP Stream Processing and MTA Transmission Control 

OTP double certification - Natural persons certificate signature encryption – Zero leakage of national security-grade data

Web Mail Adopts the latest interactive web technology 

ActiveSync Compatible standards for synchronizing address book and calendar

Impenetrable Security

 Core Operation

  Intermediary program list-checking

  shut off useless instructions

  real-time vulnerability protection

 Identity Security

  Root PKI/ACL control

  (natural persons) certificate digital signature

  OTP security authentication

 Static Encryption

  National security grade

  data leak prevention with maximum specification DLE dynamic length encryption

 Dynamic Encryption

  Third-party or spontaneous certificate encryption

SSH encrypted connection with zero successful cracks thus far

Flexible Expansion

 Cluster Architecture

  HA Heartbeat automatic backup and reply

  AA SAN cluster anagement

  Rsync parameter synchronization

  DRBD local and Cyrus remote mailbox synchronization

 High Efficiency Clustering LDAP

  Multi-domain management and advanced routing

  Password policy and online application

  Individual permissions for shared contacts

  AD/LDAP multiple integration

  SQL vacation agent integration

 Various SOAP (XML) API Interface

Forceful Innovation

 Mailbox Service

POP(S)/IMAP(S)/HTTP(S) ActiveSync read service, mailbox capacity, mailbox capacity expiration control, mailbox overview, mailbox cleanup, mailbox parameters, internal mail recycling, internal read tracking, consolidated post backup, news group, read letter control (account, internal/external/country, download subject/content/attachment), certification control (POP/IMAP password-guess defense).

 Mail Transmission

Advanced SMTP TLS, SMTP authentication forgery defense, SMTP success and failure authentication control, SMTP forwarding, SMTP proxy, advanced SMTP forwarding, domain authentication key, signature encryption proxy, fast backup, mail routing, email NIC IP binding (with IP name corresponding to multiple external IP facilitating large number of mail), mail replacement, error message replacement (avoiding closed network), code replacement (avoid garbled code), variable replacement (LDAP column position change to subject/content), outgoing address book, fake Postmaster bounce attack protection, restore winmail.dat mail format, special title (record all recipient mailbox and envelope sender mailbox), queue management (retransmission times/delayed transmission/inquiry/resend/notification/report).

 Safety Controls

Conditional forwarding backup, multi-domain disclaimer, outbound speed control (avoiding graylisting), advanced SMTP control (single/accumulated number of senders/number of recipients/size/total), sender domain restrictions, attachment backup, attachment removal, recipient exclusion, security level (configure account and email security level), (PDF/ZIP/HTTPS) email encryption, virus scanning.

WebLook Adopts the latest interactive web technology 

ActiveSync Compatible standards for synchronizing address book and calendar

Next Generation Cloud Data Center

 Excessive capacity!

Virtual mailbox, one mail one file, zero mailbox damage

 Efficient space conservation!

Mail deduplication, latest mail ID storage and index management technology

 Extreme speeds!

Latest Ajax/HML5 interactive web technology, near 100% bandwidth usage

 Mobile business!

Supports ActiveSync compatible standard sync email, contacts, and calendars

Mobile Device

Dedicated APP

Device binding

Data is not available

Email's content, attachments, address book, calendar

Watermark

Email's content, attachments, calendar details

Email Security
Email Security

Solutions

ArmorX Secure Mail System

ArmorX Mail Secure Mail System

•Patented SMTP Stream Processing and MTA Transmission Control 

•OTP double certification - Natural persons certificate signature encryption – Zero leakage of national security-grade data

•Web Mail Adopts the latest interactive web technology 

•ActiveSync Compatible standards for synchronizing address book and calendar

ArmorX Spam Spam Mail Defense

•Taiwan’s strongest APT l BEC information center

•Instant traceback tracking of malicious threat communication behavior analysis

ArmorX APT Malicious Mail Forensics

•Next-gen AI unknown malicious threat program behavior analysis 

•APT attack connection counter - Double verification whitelist

ArmorX DLP Mail Audit System

•DLP Trade secrets and personal information 

•Drip leakage prevention and data encryption protection

ArmorX Archive Mail Archive System

•ELM Lightweight storage of massive data with efficient full-text search 

•OEA Organizational cloud archiving and quick historic mail query

ArmorX NAS Extreme security High performance

•Extreme security High performance Environmental factor encryption

•Organization integration, flexible and easy to use, anti-encryption ransomware

White Papers

Videos