Due to the outbreak of the coronavirus, CYBERSEC 2020 will be rescheduled to August 12 (Wednesday) to August 14 (Friday), 2020. We apologize for any inconvenience this may have caused and your consideration will be much appreciated. CYBERSEC 2020 will continue open for registration. New updates regarding the event will also continue to be posted on the official website.×
The fastest growing cybersecurity conference in Asia with over 250 exhibitor brands. The only super-scale cybersecurity exhibition in Taiwan. The designated must-see event for industry, government, academia and research leaders.
Over 250 vendors from around the world along with renowned cybersecurity brands of Taiwan, including thousands of the latest cybersecurity products and services
CYBERSEC EXPO 2020, with brand new extensive planning, the most anticipated exhibition experience
First-tier cybersecurity global vendors and cybersecurity White Unicorns are fully powered-up to demonstrate the latest technology and services.Exhibition Brands
Global cybersecurity mainstream service providers with professional demonstration offer comprehensive explanation of products.Exhibition Brands
The gathering of the most comprehensive cybersecurity products and services will provide you with variety of cybersecurity solutions.Exhibition Brands
You may understand the Taiwan’s powerful capacity in cybersecurity development through featured exhibition, in-depth guided tours, thematic forums and 1on1 Matchmaking with international vendors.
Situational designs will allow you to experience the most frequent cybersecurity attacks to businesses, and on-site experts will provide you with the most practical defense strategies.
Taiwan Cyber Security Landscape is specially designed for you to find your necessary cybersecurity products precisely and quickly plan your personal strategy.
72.96% Participants saidAble to find the products that helped to resolve cybersecurity issues facing by the company currently at CYBERSEC EXPO
91.84% Participants saidAble to help them in cybersecurity product procurement by visiting CYBERSEC EXPO
95.31% Participants saidAble to better understand cybersecurity products after visiting CYBERSEC EXPO
■ Disarmer for EMAIL
(1) Supports all mail system
(2) Retains complete email content and attachment
(3) Easy to deploy and integrate with email server
2. Context of Use
(1) Prevent Email extortion scams
(2) Ensure the URL Link in the email and attachement is safe
■ Disarmer For WEB
(1) Provides security for browser downloads
(2) Prevent weaponized files to be loaded to endpoint
2. Context of Use
(1) Security protection on "save as" in web browser
■ Disarmer For File Transfer
(1) Integrats with current file server
(2) Supprts internet isolation structure
(3) Achieve seamless file transfer
2. Context of Use
(1) Security on file transfer between internet and intranet
(2) High security files/ Quarantined files
■ Disarmer For Removable Device
(1) Security protection on importing files from portable media devices
(2) User-friendly interface
(3) Can be established according to unit protection policy
2. Context of Use
(1) Safety control on imported files
(2) Record on exported files
■ Disarmer API
(1) Integrates with existing programs
(2) Safe REST API
(3) Supports complexed file quarantine and exchange structure
2. Context of Use
(1) Security protection on program file exchange (For example, submit for publication, quiz contest, public opinion mailbox, questionnaire, project plan documents)
Fortinet NSS Labs Recommended for SD-WANFortiGate next-generation firewalls (NGFWs) utilize purpose-built security processors and threat intelligence security services from AI-powered FortiGuard labs to deliver top-rated protection, high performance inspection of clear-texted and encrypted traffic. Next-generation firewalls reduce cost and complexity with full visibility into applications, users and networks and provides best of breed security. As an integral part of the Fortinet Security Fabric next-generation firewalls can communicate within Fortinet’s comprehensive security portfolio as well as third-party security solutions in a multivendor environment to share threat intelligence and improve security posture.
Dogfight hackers in the cloud to secure vulnerable choke points and neutralize threat flows
An impregnable Email IPS and APT Gateway
Sandbox malicious hyperlink download analysis.
APT attack connection counter Sandbox malware behavior analysis
Double authentication whitelist.
Next-gen AI unknown malicious threat program behavior analysis
A malicious program is a program that,from the perspective of a programmer, customizes the simulation program,recognizes and automatically classifies the language library, and defines the ratings of each type of project, including
The schedule can be immediately sent, or sent on a specified month, week, day, and time;the content includes periods (starting with today, yesterday, this week, last week, this month, last month, this year, last year) and risk level;regular input comparison of sender, recipient, subject, source routing, message code;recipients can add their own, custom report format (supports webpage, text, PDF).
Network Box provides customers with "hybrid firewall", "intrusion detection and protection system", "antivirus gateway", "virtual private network", "spam filtering", "web content filtering", "web application firewall WAF" "DDoS Decentralized Blocking Service Attack Defense" and "Application Control" real-time monitoring and defense management system help enterprises to do the most powerful computer information protection for enterprises in response to rapid network changes and enterprises facing various network threats. To prevent theft of important information, the infringement of electronic digital assets, and the loss of corporate reputation, to prevent and eliminate possible network threats and attacks.
an advanced network traffic mining system to provide decision support on network service operation, network security reinforcement on locating problems instantly, powerful traffic analysis with flexibility, and various traffic statistics reports.
One Identity Identity and Access Management (IAM) solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. With our solutions, you can enhance your organization’s agility while you address IAM challenges from on-premises, cloud and hybrid environments.
NAKIVO Backup & Replication offers an integrated approach to data protection, ensuring that your critical data and applications are safe.
Enterprise Firewall Performance Tester
Enterprise firewalls improve network security by segmenting corporate LANs. However, each of the advanced security functions (e.g. antivirus, app-control, IPS and SSL decryption) has a performance penalty. Combined, these features can seriously reduce network performance (in some instance up to 90%) – frustrating users and reducing business performance.
Safire is the only solution on the market that solves this problem quickly and cost-effectively.
TECHNOLOGIES: Network Security
It's InfinitiesSoft's patented and award-winning enterprise multi/hybrid cloud self-service and management software, developed to readily connect with prevailing private cloud hypervisor virtualization technologies (e.g. VMware, Hyper-V, OpenStack, Xen, etc.) and popular public cloud platforms (e.g.AWS, Azure, GCE, AliCloud, etc.) with open APIs to embrace the fast-changing cloud landscape.
InfinitiesSoft have been helping leading data centers to transform into cutting edge cloud providers (e.g. AI/GPU Cloud and Big Data Cloud with TWGC under NCHC/NARLab - Taiwan's national HPC centers for advanced research, and Chief Telecom - one of the largest data centers in Taiwan under CHT, just to name a few) with our patented and award-winning technologies and software solutions to help them achieve data center modernization and cloud transformation with feature sets packaged in CloudFusion, offering:
(1) a unified self-service User Portal (or IaaS Store Front, ushering AWS-like experience) for customer's tenant administrators and end-users to access, buy, and use the hosted datacenter infra as cloud resources, and
(2) an Operation Portal (or IaaS Backoffice) for cloud provider's administrators to pool/define resources as sellable inventories from prevailing solutions among private/public clouds, and to package/price them into different offers in service catalogs.
With our solutions, a vast majority of data center/cloud providers' IaaS commerce workflows can be automated and self-serviced, to improve customer experience on par with world-class public clouds and to elevate manageability and efficiency in monetizing cloud infrastructural resources.