Aug 11 - 12

Taipei Nangang Exhibition Center, Hall 2

Resilience Matters

CYBERSEC EXPO 2020

臺灣資安館參展商

InfoBoom

About the Exhibitor

InfoBoom is a Taiwan-based start-up technology company that consists of a technology team of encryption and security experts. We focus on mobile applications for personal data protection, confidential security, and encrypted communications. Our goal is to establish a cross-platform, universal and basic encryption and decryption architecture, as well as developing a variety of novel security protection and encrypted communication applications. Most of our staff are from well-known Internet and technology companies around the world, with more than ten years of experience in their own professional fields. Under the issues of global concerns about data security, we are now expanding the scope of user services to both our local and overseas clients. In the future, we will take Taiwan as the base for our global strategy to progressively achieve the goal of internationalization!

Products

Mobile Security

Sekret Messenger

- Sekret: Secure, Instant and Professional
Sekret adopts rigorous and comprehensive end-to-end encryption technology to avoid malicious attacks, eavesdropping and theft during the transmission of the encrypted messages.
- Portable Encryption Key
It prevents information from being tampered with or forged. Sender decryption confirms data integrity and provides non-repudiation, so as to ensure data security and correctness.
- Encryption of Real-time Audio and Video
Audio and video calls are end-to-end encrypted. The connection initiator can decide whether to save the audio and video. Only the participants or group members can use the private key to decrypt.

Encryption

Sekret-Form

The encrypted form of Sekret that designs forms according to your needs, quickly creates questionnaires, forms and quizzes, and generates exclusive QR Codes. The instant notification and automatic collection and organization of questionnaires allow you to view the responses any time. Statistics and data analysis are just a click away, which can be exported as Excel.

Data Leak Protection

Sekret-Lottery

This encrypted lottery event is a safe and simple marketing campaign for enterprises. To participate, customers just need scan the QRcode. The system only records the ticket numbers of the lottery to prevent leakage of customer data. This effectively increases the willingness of customers to participate in the event, enhances credibility and consumer personal data protection, and establishes a good corporate image.

    Videos

    Sekret Messenger

    - Sekret: Secure, Instant and Professional
    Sekret adopts rigorous and comprehensive end-to-end encryption technology to avoid malicious attacks, eavesdropping and theft during the transmission of the encrypted messages.

    - Portable Encryption Key
    It prevents information from being tampered with or forged. Sender decryption confirms data integrity and provides non-repudiation, so as to ensure data security and correctness.

    - Encryption of Real-time Audio and Video
    Audio and video calls are end-to-end encrypted. The connection initiator can decide whether to save the audio and video. Only the participants or group members can use the private key to decrypt.


    Solutions

    Sekret Messenger users top-level end-to-end encryption technology to secure communication transmission and to encrypt a variety of messages, including text, sound, pictures, videos, locations, business cards, files, as well as archivable real-time encrypted audio and video. Each message sent will be dually protected by a user-specific unique key and a digital signature.
    Without any complex settings or much fuss of starting a private conversation, Sekret can keep your trade secrets safe and prevent the risk of leakage of and tampering with sensitive information.

    • Official website
    • Email
    • Contact Information

    • Phone Number:+886-2-26552280
    • Contact Us

    • ZIV
      +886-986183742
      ziv@infoboom.com.tw

    Product Type

    Mobile SecurityEncryptionData Leak Protection