Due to the outbreak of the coronavirus, CYBERSEC 2020 will be rescheduled to August 12 (Wednesday) to August 14 (Friday), 2020. We apologize for any inconvenience this may have caused and your consideration will be much appreciated. CYBERSEC 2020 will continue open for registration. New updates regarding the event will also continue to be posted on the official website.×
UGuard Technologies was founded Continued from 2004. By a group of many years of bandwidth management, information security, network communications and other product development and installation of practical -experience in the formation of a team consisting of professionals, headquartered in Taiwan.
To develop its own brand and OEM / ODM and other technology research and development of diversified business model,
the current focus on the Asian market and focus on the application of flow control solutions.
UGuard AgileLink family of appliance and virtual devices delivers failover and load balancing across multiple WAN connec- tions , help to ensure greater reliability , bandwidth and redundancy network services for the enterprise , improved applica- tion performance , raising traffic visibility and reduce complexity of WANs cost.
By leveraging multiple connections(T1, xDSL, Cable, 3G/4G etc.), AgileLink provides highest reliable Internet access and remain VoIP quality. Furthermore, allows traffic across multiple Internet or service provider networks for redundant link connectivity, real-time failover. This enables customers to shift to a broadband WAN whether site-by-site, or via a hybrid WAN approach that leverage MPLS and broadband Internet connectivity.
Powered by our custom DPI engine and I.D. centric design, the Unified Access Controller - "UAC" provides a comprehensive Layer 7 trace management mechanism that allows IT administrators to effectively manage, monitor and secure their network resources. Whether it is for individual, department or company wide access to internet services, UAC can precisely enforce network policies compliance and control while provides extensive monitoring reports for daily operations.
No matter by using wireless or wired network got access of internet connection, and what type of device (Laptop, PAD, Smart Phone, etc), UAC would guiding people through its diversely authentication rules to making proper control and keep such access log for further auditing purpose. Even though one person has couple devices keeping online with traces, UAC can bonding to one single account, thus , to fully control impossible becomes possible and achievable.
L7 DPI UNIFIED ACCESS CONTROLLER
• WAN LINK Load Balancing
• Stateful Firewall
• Application QoS
• Boundary Flow Control
• User Identity
• Threat Blocking Security(TBS)
• Endpoint Online StatusDetection (EOSD)
• Internet Behavior Auditing &Logging