Aug 11 - 12

Taipei Nangang Exhibition Center, Hall 2

Resilience Matters




About the Exhibitor

UGuard Technologies was founded Continued from 2004. By a group of many years of bandwidth management, information security, network communications and other product development and installation of practical -experience in the formation of a team consisting of professionals, headquartered in Taiwan.
To develop its own brand and OEM / ODM and other technology research and development of diversified business model,
the current focus on the Asian market and focus on the application of flow control solutions.


Network Analysis & Forensics

AgileLink-Wan load balance

UGuard AgileLink family of appliance and virtual devices delivers failover and load balancing across multiple WAN connec- tions , help to ensure greater reliability , bandwidth and redundancy network services for the enterprise , improved applica- tion performance , raising traffic visibility and reduce complexity of WANs cost.
By leveraging multiple connections(T1, xDSL, Cable, 3G/4G etc.), AgileLink provides highest reliable Internet access and remain VoIP quality. Furthermore, allows traffic across multiple Internet or service provider networks for redundant link connectivity, real-time failover. This enables customers to shift to a broadband WAN whether site-by-site, or via a hybrid WAN approach that leverage MPLS and broadband Internet connectivity.

Network Analysis & Forensics

UAC-Unified Access Controller

Powered by our custom DPI engine and I.D. centric design, the Unified Access Controller - "UAC" provides a comprehensive Layer 7 trace management mechanism that allows IT administrators to effectively manage, monitor and secure their network resources. Whether it is for individual, department or company wide access to internet services, UAC can precisely enforce network policies compliance and control while provides  extensive monitoring reports for daily operations.
No matter by using wireless or wired network got access of internet connection, and what type of device (Laptop, PAD, Smart Phone, etc), UAC would guiding people through its diversely authentication rules to making proper control and keep such access log for further auditing purpose. Even though one person has couple devices keeping online with traces, UAC can bonding to one single account, thus , to fully control impossible becomes possible and achievable.

White paper

  • UAC Unified Access Controller

    • WAN LINK Load Balancing
    • Stateful Firewall
    • Proactive-Reactive
    • Application QoS
    • Boundary Flow Control
    • User Identity
    • Threat Blocking Security(TBS)
    • Endpoint Online StatusDetection (EOSD)
    • Internet Behavior Auditing &Logging



  • Wan Load Balance /SD WAN/ Intelligence Solutions
  • L7 QOS/SD WAN/ Intelligence Solutions

Product Type

Network Analysis & ForensicsNetwork Analysis & Forensics