Aug 11 - 12

Taipei Nangang Exhibition Center, Hall 2

Resilience Matters




About the Exhibitor

Cyberview is a professional VAD(Value Added Distributor). We have the power of “Technical”, “Sales” and “Marketing”. Become the strongest and most powerful backing of partner and customer. Through our vision of helping businesses gain profit through information technology, we have continuously introduced the latest concepts and products, and successfully became an agent for many IT products over the past 10 years. We provide customers in the Chinese market with professional analysis, consulting, and system development.

Exclusive agency of Votiro Disarmer, efficient tool of information security, it is the terminator of malicious attacks. Its proven CDR technology builds an indestructible wall towards the company’s internal network, removes malicious threats before they have a chance to penetrate, and ensures all files coming into the company’s network can be opened at no risk. Vitoro Disarmer not only detects but provides protections before any other security system. It is the only solution to any zero-day cyberattacks.


Privileged Management


Since CyberArk established in 1999, we have been focused on assisting customers organizing high-level account security management, to provide all-round solution to internal arrangement, cloud, and ICS environment. Not only provides extensive support to applications and devices at business level, including important server, AP and DB system and internet security, but also released Endpoint Privilege Manager(EPM), a control system integrating "highest authorized account of local machine" and "application programs", protecting the security of window machine(PC, NB, Macbook) and Windows Server, providing an effective "cyber security protection" system to the overall environment.

CyberArk Core PAS – Privileged Access Security Solution includes the following characteristics:
. According to organizational privileged access security principles, focus on protection and control of access right on privileged password
. Able to view privileged user’s connection real time, can remotely end all suspicious connections.
. Saves complete record of privileged connection, make it easier for the auditor
. Automatic identification, warns of irregular activities

Endpoint Privilege Manager (EPM) includes the following characteristics:
. Self-learning/ establishes policy according to business needs
. Minimal exquisite privileged principles enforced on Windows system manager
. May raise user authority according to business needs
. Identifies and blocks malware application software promptly
. Detects and blocks behaviors trying to steal authentication
. Unknow application software are to be executed safely in restricted mode
. Integrates with threat detection tool, to analyze unknown application programs
. To find all application programs in the environment

《2018/Nov Gartner Magic Quadrant for Privileged Access Management》

White paper

  • CyberArk Company Overview

  • Core Privileged Access Security Data Sheet

  • CyberArk Application Access Manager

  • CyberArk Cyber Hygiene White Paper

  • 5 Top Reasons to Prioritize Privileged Access Security



Securing Privilege and Containing Attacks on the Endpoint

Enforcing privilege security on the endpoint is a fundamental part of your security program, but doing so could impact user and helpdesk productivity. This short video demonstrates how CyberArk Endpoint Privilege Manager helps remove this barrier, adding a critical protection layer to strengthen your existing endpoint security and allowing you to contain attacks at the endpoint.


Privileged Access Security

Product Type

Privileged Management