Aug 11 - 12

Taipei Nangang Exhibition Center, Hall 2

Resilience Matters

List of exhibitor products

F-Secure Business Suite

F-Secure

Scalable on-site business security for organizations of all sizes 
Designed to simplify the demanding security needs of today's organizations

F-Secure Business Suite is an on-site business security solution that offers the best continuous protection for your organization by combining the best of accumulated expertise, advanced technologies, and modern, cutting-edge features with full on-site control. It is a full protection bundle designed to cover the demanding business security needs from gateway to endpoint.

  • Layered protection to protect your assets from gateway to endpoint
  • Best protection levels covering both known vulnerabilities and new, emerging threats
  • Advanced management features to allow you full control of your organization's IT security
  • Less work through automation of daily tasks
  • Less hassle with a scalable all-in-one package with flexible and transparent licensing for organizations of all sizes

F‑Secure TOTAL

F-Secure

Premium cyber security for you and your devices

What does F-Secure TOTAL include?

  • SAFE internet security

The world's best antivirus, brought to you by 30 years of cyber security experience. Includes family rules to let you limit children's device use. 

  • FREEDOME VPN

The privacy app which received special mention in an independent comparison of over 300 competitors. Make your devices invisible online.

  • KEY password manager

A light and easy password manager, allowing you to store your passwords securely and access them from any device.

SPAM SQR

Softnext Technologies Corp.

SPAM SQR features exclusive filtering technology against spam and threat mails. It has a complete pattern database, fingerprint database, malicious address database and cloud incremental update technology. It also features threat defense engine for email traffic control, social engineering detection engine and file attachment analysis engine, effectively eliminating the risk of zero-day attacks and improving the overall interception performance of a system.

Mail SQR Expert

Softnext Technologies Corp.

Provides email auditing, archiving, and management solution for corporate email management. Its modular expandable design allows users to quickly fix problems found in the management process. 
Support email lifecycle management in compliance with regulations.Implement the decentralization and flexible email policy management and be ideally suited to each type of enterprise and organization.

Mail Archiving Expert

Softnext Technologies Corp.

Mail Archiving Expert provides not only real-time archiving to eliminate the trouble of deleting important emails by mistake but also complete email lifecycle management. Archived emails are moved automatically to different storage media according to different departments' policy of maintenance time. The flexibility of access authorization management combined with the ability of assigning results to other administrators for refined search to accurately find emails, preventing granting unneeded permission and risk exposure of mail contents to those who should not be given the authority.

Dr.IP

e-SOFT CORP.

CrowdStrike Falcon

CrowdStrike

The CrowdStrike Falcon® platform is pioneering cloud-delivered endpoint protection. It both delivers and unifies IT Hygiene, next-generation antivirus, endpoint detection and response (EDR), managed threat hunting, and threat intelligence — all delivered via a single lightweight agent. Using its purpose-built cloud-native architecture, the Falcon platform collects and analyzes over 1 trillion endpoint events per week from millions of sensors deployed across 176 countries.

DXC Security Services

DXC Technology

Build digital security into the fabric of your enterprise.
Enterprises are facing more sophisticated and more persistent attacks, both from outside and within, while they’re under pressure to take advantage of emerging digital technologies.
DXC Technology serves as a trusted advisor and primary security integrator to protect your enterprise and enable your digital transformation. Backed by more than 3,500 security experts and a global network of 24x7 security operations centers, DXC’s industry-leading solutions help protect data, applications, infrastructure and endpoints; detect and predict attacks; and proactively respond to threats.

DXC Analytics Services

DXC Technology

Business insights deliver the most value when they’re fresh. DXC Technology offers analytics services and a robust partner ecosystem to help you uncover and apply insights rapidly to improve business outcomes. Our Analytics Services accelerate your ability to uncover valuable insights and apply them quickly to improve business outcomes.
 

HENNGE Access Control

HENNGE Taiwan

✔︎ Cloud Authentication and Single Sign-On service, including MFA digital certification like OTP etc.
✔︎ Provides single interface to manage users and synchronize users and password information from AD.
✔︎ Monitor logins to reduce the risk of unknown device accessing.
✔︎ Set access IP restrictions to keep company information from being accessed outside of office.
✔︎ With Device Certificate and Secure Browser, it is able to keep restrictions and flexibility.

HENNGE Email Archive

HENNGE Taiwan

✔︎ Unlimited storage for archiving Email. 
✔︎ Keep Email forever or delete it regularly to comply with company's requirement.
✔︎ Fits the requiremants of ISO 27001.
✔︎ Easy to search and send backup Email back by using simple web interface.
✔︎ Easy to control searching-authority which made handover and audit more convenience.

HENNGE Email DLP

HENNGE Taiwan

✔︎ Effective way to prevent sensitive data leaks by automatic Email keyword filter.
✔︎ Customize rules to fit company's DLP policy.
✔︎ Automatically encrypt email attachments.
✔︎ Special function which Email with sensitive data will only be sent after getting supervisor's approval. 

HENNGE Secure Transfer

HENNGE Taiwan

✔︎ Safe, quick, easy-to-manage way to transfer large files.
✔︎ Transfer LOG for admin to track and audit.
✔︎ No additional software is required, can be used immediately with browser.

Thunder Convergent Firewall (CFW)

A10 Networks

A10 Networks Thunder Convergent Firewall (CFW) is the industry’s first security solution that incorporates multiple security functions for enterprise and service provider deployments, including highly scalable and high-performance firewall, IPsec VPN, secure web gateway, Carrier-Grade NAT with integrated DDoS protection and traffic steering in a single, standalone product.

The Armis Security Platform

Armis

Agentless. Passive. Comprehensive
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. We discover every managed, unmanaged, and IoT device on and off of your network, analyze device behavior to identify risks or attacks, and protect your critical business information and systems. Armis is agentless and integrates easily with your
existing security products. 
We passively monitor wired and wireless traffic on your network and in your airspace to identify every device and to understand each device’s behavior without disruption. Then we analyze this data in our Risk Engine. The engine uses device profiles and characteristics from the Armis Device Knowledgebase to identify each device, assess its risks, detect threats, and recommend remediation actions.
The Armis Security Platform could provide enterprises with the following benefit:

  • Comprehensive Asset Inventory
  • Device Tracking & Risk Assessment
  • Automatic Detection & Response
  • Frictionless Deployment & Integration

The Armis Device Knowledgebase

Armis

Device Insights Driving Security
Core to the Armis platform is our Device Knowledgebase. It is a giant, crowd-sourced, cloud-based device behavior knowledgebase—the largest in the world, tracking 280 million devices—and growing.
With our Device Knowledgebase, Armis understands not only what the device is and what it is doing, but what it should be doing. This is because we understand the context of each device in its use in each environment.
These device insights enable Armis to classify devices and detect threats with a high degree of accuracy. Armis compares real-time device state and behavior to“known-good”baselines for similar devices we have seen in other environments. When a device operates outside of its baseline, Armis issues an alert or can automatically disconnect or quarantine a device.

IDC

Digicentre

Digicentre uses secure, high-performance, and cost effective infrastructure. With professional expert advice digicentre  provide tailor-made solutions for customers’ operating demands.

Cloud

Digicentre

Highly integrated local and virtual services designed for large-scale computing.

Security

Digicentre

With decades of security experience, digicentre  protects clients in 95 countries.  This includes 60,000 computers and over 6 million attacks every day. Digicentre  protects customers from attacks and security risks.
 

App Security

Digicentre

Protect developers from revenue loss, hackers tampering with in-game purchase systems, source code theft, fraud, or application credentials being compromised.

WhatsUp® Gold

EC-NETWORKER

MOVEit Transfer

EC-NETWORKER

Ipswitch Gateway

EC-NETWORKER

ANCHOR (Ark of Network, Cyber Hamper for Operations Reliability)

Global Wisdom

ANCHOR(Ark of Network, Cyber Hamper for Operations Reliability) starts with the spirit of ISO and best practice experience. Each management link in the privileged account lifecycle (certification, application, review, activation, notification, connection, monitoring, reporting, auditing) corresponds to the managing process and auditing requirements and other functions that constitute a centralized managing platform to save the traditional high cost of implement and time costs.
This product uses single portal to complete the privileged account lifecycle management, includes controlled device/group authorization management, temporary ID/connection/password application, audit, auto sign-in, live monitoring, playback, reporting and audit workflow. To exempt unnecessary risks and avoid maintenance disputes, the controlled-device does not need to be installed any software or opened catalogue (Agent-less). It is a solution with best security, best convenience, best initiative, best immediacy, best importability and best usability.

IP-guard Endpoint Protection

IP-guard

Designed to protect and manage endpoint computers against potential data theft by recording end-user operation logs and enforcing corporate policies and regulations. IP-guard provides end-user operation analysis by collecting detailed document, application, website, peripheral and many other operation logs. Whilst collecting user logs the IP-guard can generate real-time warnings alerts to notify any unauthorized behaviors and intervene operation against corporate policies.

IP-guard Data Discover

IP-guard

Designed to scan existing documents to detect predefined keyword and patterns within the documents.  IP-guard data discover work in conjunction with IP-guard V4 endpoint protection and IP-guard V+ document encryption to prevent detected documents been copied, mail or uploaded etc. to unauthorized medium. 

IP-guard V+ Document Encryption

IP-guard

A robust and reliable document encryption system that automatically encrypt documents on creation to ensures documents only accessible in the authorized environment.  Apart from the traditional encryption methodology, IP-guard V+ Document encryption emphasis on the smoothness of data transfer within the organization and between supplier and vendors. IP-guard's USB agent, offline reader facilitates the obstacle when opening encrypted document outside authorized environments. 

  • Type:Encryption
  • IP-guard Encryption Security Gateway

    IP-guard

    Designed to work in conjunction with IP-guard V+ Document Encryption system to avoid customization with existing ERP, CRM, revision control system and act as the gateway to prevent any unauthorized device interact with abovementioned systems.

    IP-guard NAC

    IP-guard

    Designed to increase the safety of the network by limiting the availability of network resource to endpoint computers. IP-guard NAC works in conjunction with IP-guard endpoint protection to deny network access to computers who do not meet the minimum requirement of corporate regulation.

  • Type:NAC
  • Identity and Access Management Solution

    One Identity

    One Identity Identity and Access Management (IAM) solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. With our solutions, you can enhance your organization’s agility while you address IAM challenges from on-premises, cloud and hybrid environments.

    Privileged Access Management Solution

    One Identity

    One Identity Privileged Access Management solutions mitigate security risks and help you achieve compliance by securing, controlling, monitoring, analyzing and governing privileged access to critical organizational data and applications. Our privileged access management solutions enable you to provide the full credential when necessary or limit access with granular delegation for least privileged access. All privileged activity is recorded and all keystrokes are logged with real-time analyzation of activity and data. This eliminates shared credentials and assigns individual accountability to administrator activity with the ability to detect and halt unknown threats immediately. The result is enhanced security and easier compliance with more efficient administration and governance of privileged access.
     

    Active Roles

    One Identity

    One Identity Active Roles delivers automated user account and group management that overcomes the shortcomings of native Microsoft Active Directory and Azure Active Directory tools. These enhanced identity-management capabilities enable you to do your job more efficiently, more accurately, and with less manual intervention. Active Roles is designed with a modular architecture, so your organization can easily meet your business requirements today and in the future. With Active Roles, you can automate tedious and error-prone administrative tasks and solve security issues by protecting and controlling all-important administrative access.

    One Identity Safeguard

    One Identity

    One Identity Safeguard can reduce the stress and worry with your privileged accounts. This innovative privileged access management solution – available as an easily deployed, hardened appliance – gives your organization a secure way to store, manage, record and analyze privileged access. It is an integrated solution that combines a secured and hardened password safe, and a session-management and -monitoring solution with threat detection and analytics. Safeguard detects and shuts down threats while satisfying your auditors and admins.

    Change Auditor

    One Identity

    Change reporting and access logging for Active Directory (AD) and enterprise applications is cumbersome, time-consuming and, in some cases, impossible using native IT auditing tools. This often results in data breaches and insider threats to AD and other Microsoft platforms, and can go undetected without protections in place.
    Fortunately, there's Change Auditor. With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange, Office 365, Exchange Online, file servers and more. Change Auditor also tracks detailed user activity for logons, authentications and other key services across enterprises to enhance threat detection and security monitoring. A central console eliminates the need and complexity for multiple IT audit solutions.

    Openfind Secure Cloud Service

    Openfind

    OSecure Cloud Security Service is cloud service brand by Openfind. It provides additional Email security services for corporate, especially good for Office 365/G Suite. OSecure offers advanced prevention with precision filtering technology, upgraded mail protection to ensure the security of corporate communications. Also it offers adjustable filtering settings and comprehensive review of corporate security requirements and with high-speed interception and report generation for optimal management efficiency. 

    MailGates Mail Protection System

    Openfind

    The MailGates mail protection system is deployed in front of corporate mail servers. To provide users with comprehensive anti-spam protection, global and local samples are analyzed on the mail cloud to identify all e-mail attack behaviors and threats, provide real-time anti-virus protection, as well as automatic detection and filtering of spam.
    The reliable and high-performance system environment, clear and succinct statistics reports and logs, as well as comprehensive and user-friendly administration functions with industrial-level mail management requirements. The MailGates mail protection system will continue to refine its mail protection functions and build the most secure, smooth and reliable channel for e-mail delivery and receiving.
    More Information:https://www.openfind.com.tw/english/downloads/MailGates_EN.pdf

    Mail Archive and Management System

    Openfind

    MailBase Replication Mode makes the archiving of e-mails easy and requires absolutely no changes to the existing network structure and mail process. Its high level of compatibility with cloud mail and mail servers makes deployment fast and easy. Mail life cycle management can store archived e-mails on the local server, cloud service or other external storage media based on access frequency. If there are hundreds of millions of e-mails, a distributed architecture can be used to process all e-mails, speed up searches and carry out mail browsing and auditing tasks. 
    More Information:https://www.openfind.com.tw/english/downloads/MailBase_EN.pdf

    MetaDefender Email Gateway Security

    OPSWAT

    Deliver trust to your inbox
    MetaDefender Email Gateway Security examines every email and attachment, scanning and addressing malicious content, before it’s delivered. 
    MetaDefender Email Gateway Security evaluates inbound and outbound emails, reconstructs suspicious attachments, and redacts sensitive content—while maintaining consistent email delivery flow. Hyperlinks to unsafe URLs are also replaced with plain text to prevent user misbehavior.

    MetaDefender Kiosk

    OPSWAT

    Trust at the point of entry 
    MetaDefender Kiosk acts as a digital security guard—inspecting all media for malware, vulnerabilities, and sensitive data.
    MetaDefender Kiosk accepts multiple form factors, including CD/DVD, 3.5"" diskettes, flash memory cards, mobile devices, and USBs—even when encrypted.
    Once inserted, MetaDefender Kiosk immediately scans for malware, vulnerabilities, and sensitive data. Suspicious files can be sanitized. Sensitive files can be redacted. MetaDefender Kiosk lets you trust all portable media that enters or exits your facility.

    MetaDefenr Drive

    OPSWAT

    Trust you can hold in your hand
    Any transient device, like a laptop, is a prime target for malicious attacks and infection. 
    MetaDefender Drive is a durable USB drive that creates a portable perimeter, it inspects devices before they enter a facility or its network—even before they boot up.
    Once plugged into a USB port, the computer can be booted safely from Drive, by running off of Drive’s own operating system. This separation allows analysis without software installation — a scan of the entire device for malware, vulnerabilities and a determination of the device’s integrity.

    Alteon

    Radware

    Alteon is Radware’s next-generation application delivery controller (ADC) and the only load balancer that guarantees application SLA. It provides advanced, end-to-end local and global load balancing capabilities for all Web, cloud and mobile-based applications.
    Alteon load balancer combines best-of-breed application delivery capabilities, market-leading SSL performance that supports all of the latest encryption protocols, and advanced services to companies with ongoing application lifecycle management challenges that impact the performance of web applications (such as heavier, more complex web content); mobility, and the migration to the cloud.
     

    DefensePro

    Radware

    DefensePro provides advanced DDoS prevention, protection and IoT botnet attack mitigation. DefensePro is an award-winning, real-time, perimeter DDoS defense and attack mitigation device, securing organizations against emerging network and applications threats. Part of Radware’s attack mitigation solution, DefensePro provides automated DDoS defense and protection from fast moving, high volume, encrypted or very short duration threats, including IoT-based attacks like Mirai, Pulse, Burst, DNS, TLS/SSL attacks and those attacks associated with Permanent Denial of Service (PDoS) and Ransom Denial-of-Service (RDoS) techniques.

    cloud-waf-service

    Radware

    Web application development is becoming increasingly complex and more rapid. DevOps is increasing the level of functionality and frequency of product releases. With application availability more important to the user experience than ever, web applications are becoming increasingly vulnerable, exposing enterprises to the risk of data breach and financial loss.

    cloud-ddos-services

    Radware

    Distributed denial-of-service (DDoS) attacks are becoming more frequent, more powerful and more sophisticated. With the growing availability of attack tools and global botnets, the pool of possible attacks is larger than ever. Relying on humans to block attacks is simply not enough, and organizations dependent on manual-based protection are not fully protected from today’s threats.

    Multi-layer Anti-DDoS Service

    Taiwan Mobile

    TWM’s Multi-layer Anti-DDoS Service is constructed on TWM backbone network. It can block massive DDoS attack data packets. Enterprise clients can deploy DDoS defense without changing their network infrastructures. The service can detect and defense different types of DDoS attacks from layer 3 to layer 7 24x7.

    SOC

    Taiwan Mobile

    Internet attacks vary from time to time. Enterprise now has to face compound internet attacks. Thus, comprehensive information security deployment is future trend. In addition to deploy information security equipment, how to manage the equipment also matters. Once enterprise gets warnings from SOC service, TWM has rich-experienced information security consulting team, which provides consultant service, to help enterprise on finding solutions and giving suggestions. As a result, enterprise doesn’t have to spend a huge cost on training information security professionals. 

    All-in-One UTM

    Taiwan Mobile

    TWM cooperates with Check Point on developing All-in-one UTM solutions. It contains high speed FTTx service and All-in-one UTM. Enterprise can enjoy anti-malware service, spam detection, malicious sites defense, etc. and can pay the fee monthly.

    M+ Messenger for Enterprise

    Taiwan Mobile

    M+ Messenger is an instant communication application for enterprise. It contains enterprise exclusive functions such as instant message, corporate directory, bulletin board, etc. Not only convenience, M+ Messenger is also the safest IM application. It passes ISO27001, ISO27011, and ISO27018 information security certificates. It certainly the best communication tool for enterprise.

    Vulnerability Assessment Service

    Taiwan Mobile

    TWM’s Vulnerability Assessment Service can assist enterprise to find their system and web vulnerabilities, so enterprise can fix the vulnerabilities as soon as possible to prevent attacks.

    Intrusion Prevention System

    Taiwan Mobile

    Intrusion Prevention System can detect and block internet intrusion attacks instantly. By blocking internet attacks like virus, worm, Trojans, and DDoS attacks, Intrusion Prevention System can assist lower the risk of information security.

    ThreatVision

    TeamT5 Inc.

    ThreatVision is a cyber threat intelligence platform that helps customers to identify threats, know the adversary, and increase situational awareness. ThreatVision bridges TeamT5 analysts and clients to fusion of external and internal intelligence, integrates cyber threat intel and malicious sample identification mechanism. Customers can access TeamT5 intelligence database through ThreatVision's portal to search or request for an analysis of the threats about its malware families, adversary groups, and indicators.

    ThreatSonar

    TeamT5 Inc.

    TeamT5 offers an advanced threat hunting technology and platform - ThreatSonar. It is a very unique tool for defense on post-exploitation stage. With the leading intelligence of cyber espionage attackers, TeamT5 designed a unique technology and invented a methodology to help clients dealing with targeted attacks. It has already scanned more than 500K endpoints and kept helping people to discover threats that their existing security solutions couldn't see.

    Identity and Access Management Solution

    WeiCloud Technology

    One Identity Identity and Access Management (IAM) solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. With our solutions, you can enhance your organization’s agility while you address IAM challenges from on-premises, cloud and hybrid environments.

    Privileged Access Management Solution

    WeiCloud Technology

    One Identity Privileged Access Management solutions mitigate security risks and help you achieve compliance by securing, controlling, monitoring, analyzing and governing privileged access to critical organizational data and applications. Our privileged access management solutions enable you to provide the full credential when necessary or limit access with granular delegation for least privileged access. All privileged activity is recorded and all keystrokes are logged with real-time analyzation of activity and data. This eliminates shared credentials and assigns individual accountability to administrator activity with the ability to detect and halt unknown threats immediately. The result is enhanced security and easier compliance with more efficient administration and governance of privileged access.
     

    Active Roles

    WeiCloud Technology

    One Identity Active Roles delivers automated user account and group management that overcomes the shortcomings of native Microsoft Active Directory and Azure Active Directory tools. These enhanced identity-management capabilities enable you to do your job more efficiently, more accurately, and with less manual intervention. Active Roles is designed with a modular architecture, so your organization can easily meet your business requirements today and in the future. With Active Roles, you can automate tedious and error-prone administrative tasks and solve security issues by protecting and controlling all-important administrative access.

    One Identity Safeguard

    WeiCloud Technology

    One Identity Safeguard can reduce the stress and worry with your privileged accounts. This innovative privileged access management solution – available as an easily deployed, hardened appliance – gives your organization a secure way to store, manage, record and analyze privileged access. It is an integrated solution that combines a secured and hardened password safe, and a session-management and -monitoring solution with threat detection and analytics. Safeguard detects and shuts down threats while satisfying your auditors and admins.

    Change Auditor

    WeiCloud Technology

    Change reporting and access logging for Active Directory (AD) and enterprise applications is cumbersome, time-consuming and, in some cases, impossible using native IT auditing tools. This often results in data breaches and insider threats to AD and other Microsoft platforms, and can go undetected without protections in place.
    Fortunately, there's Change Auditor. With Change Auditor, you get complete, real-time IT auditing, in-depth forensics and comprehensive security monitoring on all key configuration, user and administrator changes for Microsoft Active Directory, Azure AD, Exchange, Office 365, Exchange Online, file servers and more. Change Auditor also tracks detailed user activity for logons, authentications and other key services across enterprises to enhance threat detection and security monitoring. A central console eliminates the need and complexity for multiple IT audit solutions.

    Syslog-ng

    WeiCloud Technology

    syslog-ng™ Store Box (SSB) is a high performance, high reliability log management appliance that builds on the strengths of syslog-ng™ Premium Edition. With SSB, you
    can collect and index log data, perform complex searches, secure sensitive information with granular access policies, generate reports to demonstrate compliance, and forward log data to 3rd party analysis tools.

    ArmorX APT - Anti-Malicious Mail Stronghold

    ArmorX

    Dogfight hackers in the cloud to secure vulnerable choke points and neutralize threat flows
    An impregnable Email IPS and APT Gateway
    Technological Adavantage
    Sandbox malicious hyperlink download analysis.
    APT attack connection counter Sandbox malware behavior analysis
    Double authentication whitelist.

    Next-gen AI unknown malicious threat program behavior analysis 
    A malicious program is a program that,from the perspective of a programmer, customizes the simulation program,recognizes and automatically classifies the language library, and defines the ratings of each type of project, including

    • Attachment type:attachment encryption, forged subfile name, bomb compression (ZIP Bomb), decompression times.
    • Characteristic database:complete (Md5), multi-segment (Ssdeep), loading (Imphash) sampling, original database.
    • Program behavior:Antidebug Antivm, CVE Vulnerability, encryption calculus, Exploit Kits, Packers Hidden, Webshells , email identification, malicious files, malware, mobile malware, malicious URLs.
    • Sandbox analysis (optional - independent dynamic sandbox simulation system):behavior analysis, network analysis.

    Forensic Report
    The schedule can be immediately sent, or sent on a specified month, week, day, and time;the content includes periods (starting with today, yesterday, this week, last week, this month, last month, this year, last year) and risk level;regular input comparison of sender, recipient, subject, source routing, message code;recipients can add their own, custom report format (supports webpage, text, PDF).
     

    ArmorX Spam – Spam Mail Control Force

    ArmorX

    Preemptively detect and analyze unknown threat behaviors
    Intercept and quarantine spam mail utilizing dual authentication whitelists

    Technological Adavantage
    Instant traceback tracking of malicious threat communication behavior analysis.
    15 million + (Taiwan attacks) static signatures Next-gen AI unknown malicious threat program behavior analysis.
    30 million+ (Taiwan attacks) hacker IPs and short-term domains Sandbox malicious hyperlink download analysis.

    Instant traceback tracking of malicious threat communication behavior analysis
    APT (Advanced Persistent Threat) is a common attack method that, after locking on its target, collects intelligence, designs bait, and performs various tasks. Some common baits include impersonating customers, government agencies, and other well-known service providers, such as Apple, Google, the State Administration of Taxation, the Health Insurance Bureau, and international express delivery agencies.
    Such socially engineered mail are not suspected as advertisements due to the content of the email, and the exploitation of traditional email gateway weaknesses to set the email address of the current unit as a system or personal whitelist, thereby removing any barriers against such fraudulent commercial email.
    Our system has the world's most cutting-edge fraudulent email identification technology, providing an exclusive dual-verification whitelisting mechanism, meaning that the sender's mailbox plus the sender's host must both be approved before the mail can be released; and our exclusive SMTP delay counter, prohibit the hacker from utilizing system resources for replies, forcing the hacker to respond.

    Proactive analysis of spammer communication behaviors
    Using the global exclusive patented technology "SMTP Instant Traceback" and "SMTP Hacker Behavior Analysis," you can effectively identify spam, illegal, anonymous, fraudulent, and other malicious mailing behaviors during the SMTP handshake phase.
    Determined, decisive, and efficient blocking of more than 90% of spam; cloud reputation blacklist, international blacklist, DNSRBL, content weight calculation, etc., all come together to bring the best and most complete protection for enterprises.

    Complete and multi-function organizational reporting
    SpamTrap provides self-learning, policy comparison, blacklist reporting, whitelist feedback, personal and group policy development and black and white lists, overdue unread management, agents, quarantine reports, resend reports, aliases, group merges, and other pinpoint functions.
    SpamTrap provides a variety of statistical charts and leaderboards, and can send statistics reports to department heads in a timely manner, according to the organizational structure.
     

    ArmorX Archive – Mail Archival System

    ArmorX

    ELM based high efficiency index algorithm to effectively and easily conduct full-text search of large data
    OEA enterprise sized cloud archival email system allowing for quick searches
    ELM Massive Data Management
    Supports local and network cluster management.
    Supports Journal SMTP/POP de-duplication archives.
    Supports .eml format (encrypted) storage and multiple restoration methods.
    Supports a wide range of archiving mechanisms, including local, web, CD, and tape.
    More than 50 attachment formats and 10 million emails searched in 5 seconds.
    Supports non-repudiation, efficient full-text search, Simplified and Traditional Chinese translation, and advanced search.
    OEA supports hierarchical organization development, mail preview, and attachment text quick search.
    OEA replaces mail storage, which helps to remove management receipts and improve work efficiency.

    Email Encryption Protection
    The strongest email encryption gateway ever.
    DLP protection and social fraud prevention are the best tools for eliminating fraud.
    PDF/ZIP/HTTPS mail and attachment conditional gateway encryption. 
    Flexible subject marking, compatible with existing systems, attain internal and external control. 
    Custom and random passwords, password database, extensive editing, personal settings.
     

    ArmorX DLP – Mail Audit Unit

    ArmorX

    A data loss prevention framework to protect your confidential trade secrets and invaluable personal information
    Employs personal data masking, drip leak stoppage, and cutting edge encryption technology

    Email remains a vital tool for communications
    between modern business transactions
    Based on corporate secrecy protection and compliance, such as national personal data protection laws (EU GDPR, ISO27001, BS10012, etc.), companies must fulfill and comply with their email filing and auditing Duties.

    Enterprise audits are divided into pre-audits and post-audits
    The main purpose of pre-audits is DLP data leakage prevention, which is divided into single excess and cumulative excess (meaning drip leakage prevention), that focuses on risk index and behavior analysis.
    The primary purpose of the post-audits are the normal post-management and case-review applications.
    BestFiler supports online release applications, online access applications, and various audit reports to implement paperless and strict audit management for enterprise efficiency.

    Pre-Audit
    excellent risk management tool

    • Legal compliance:pre-configure PII I standard and PII II behavior
    • Accurate:supports regular expression and program verification, custom exclusion
    • Completeness:32/64-bit applications, large and multi-blank attachments
    • Defensive power:supports single-capped over-range and interval cumulative excess (meaning drip leak prevention)
    • Data protection:supports email/attachment encryption, prohibit attachment encryption (avoid checks)
    • Customized mail:group-send but single-recipient display (better than BCC), subject/content replacement (time-saving individualization)
    • Flexible execution:online routine/individual whitelist, immediate supervisor notification and review release
    • Management Report:produce various statistical and analytical reports based on audit and management needs

    Post-Audit
    UBA Big Data Behavior Analysis

    • Normal post-audit management:set query conditions, query permissions, and valid period
    • Individual case access application:the reviewer applies to the auditor (can require multiple signatures)
    • Drip Report:when exceeds the upper limit, immediately report the maximum and total amount while display the details
    • Manage reports:schedule when to send a variety of user and group reports to supervisors and auditors
    • Mail log:display authentication account and source country code/city, supports forwarding and re-sends
    • System log:contains core log, authentication log, antivirus log, load log
    • Security log:record administrator actions, including searches, forwards, and setting changes, etc.
    • Queue management:configure queue re-transmission and delay, queue notification, periodic queue reports
       

    ArmorX Mail - Mail Collaboration

    ArmorX

    An impenetrable and fully secure email system serving as a reliable base for all your communications
    Comprehensive protections that address major weaknesses, unwanted infiltration, hijacking, and viruses

    Impenetrable Security

    •  Core Operation

        Intermediary program list-checking
        shut off useless instructions
        real-time vulnerability protection

    •  Identity Security

        Root PKI/ACL control
        (natural persons) certificate digital signature
        OTP security authentication

    • Static Encryption

        National security grade
        data leak prevention with maximum specification DLE dynamic length encryption

    • Dynamic Encryption

        Third-party or spontaneous certificate encryption
    SSH encrypted connection with zero successful cracks thus far

    Flexible Expansion

    •  Cluster Architecture

        HA Heartbeat automatic backup and reply
        AA SAN cluster anagement
        Rsync parameter synchronization
        DRBD local and Cyrus remote mailbox synchronization

    • High Efficiency Clustering LDAP

        Multi-domain management and advanced routing
        Password policy and online application
        Individual permissions for shared contacts
        AD/LDAP multiple integration
        SQL vacation agent integration

    • Various SOAP (XML) API Interface

    Forceful Innovation

    • Mailbox Service

    POP(S)/IMAP(S)/HTTP(S) ActiveSync read service, mailbox capacity, mailbox capacity expiration control, mailbox overview, mailbox cleanup, mailbox parameters, internal mail recycling, internal read tracking, consolidated post backup, news group, read letter control (account, internal/external/country, download subject/content/attachment), certification control (POP/IMAP password-guess defense).

    • Mail Transmission

    Advanced SMTP TLS, SMTP authentication forgery defense, SMTP success and failure authentication control, SMTP forwarding, SMTP proxy, advanced SMTP forwarding, domain authentication key, signature encryption proxy, fast backup, mail routing, email NIC IP binding (with IP name corresponding to multiple external IP facilitating large number of mail), mail replacement, error message replacement (avoiding closed network), code replacement (avoid garbled code), variable replacement (LDAP column position change to subject/content), outgoing address book, fake Postmaster bounce attack protection, restore winmail.dat mail format, special title (record all recipient mailbox and envelope sender mailbox), queue management (retransmission times/delayed transmission/inquiry/resend/notification/report).

    • Safety Controls

    Conditional forwarding backup, multi-domain disclaimer, outbound speed control (avoiding graylisting), advanced SMTP control (single/accumulated number of senders/number of recipients/size/total), sender domain restrictions, attachment backup, attachment removal, recipient exclusion, security level (configure account and email security level), (PDF/ZIP/HTTPS) email encryption, virus scanning.

    An email, contacts, and calendar app intentionally constructed for zero data loss or synchronization issues
    System controlled app for floating watermarks and PDF attachment watermarks
    Next Generation Cloud Data Center

    • Excessive capacity!

    Virtual mailbox, one mail one file, zero mailbox damage

    • Efficient space conservation!

    Mail deduplication, latest mail ID storage and index management technology

    • Extreme speeds!

    Latest Ajax/HML5 interactive web technology, near 100% bandwidth usage

    • Mobile business!

    Supports ActiveSync compatible standard sync email, contacts, and calendars
     

    ArmorX News – Professional Marketing Newsletter Network

    ArmorX

    EP newsletter – guaranteed delivery
    Specifically designed for superior delivery, opening, and click-through rates

    Effective email marketing
    not only ensures that customers receive messages, but also knows what kind of messages customers like.

    This way marketing professionals can continue to sell their products and improve marketing performance.

    Using the system's unique letter editing mechanism, the general letter content can be converted in to a variety of collection conditions, and various responses can be set in to different points to facilitate analysis and improve email marketing performance.

    • Types of Newsletters

    Can configure the: name; the option to make it as the subscription page; display names on the subscription page (Traditional Chinese, Simplified Chinese, English);
    permission (user, group); notes; whether you need to review, assign a reviewer (supervisor, types of supervisors, other custom classification);
    notification mailbox, notification mail language;
    whether the user can select more, select the upper limit, or cancel the subscription list’s application mode (in accordance with any, in line with all).

    • Mail Delivery

    Supports inline map transfer link, group-send single-recipient display, content variable replacement, online preview, unsubscribe, scheduled delivery, review. Web version of e-newsletter can display community website sharing links, etc. Supports queued mode delivery, number of re-sends, queue re-send time, DKIM/DomainKeys/SPF domain authentication key, outgoing speed, IP name, network card IP binding, etc.

    • Marketing Template

    Source contains the file and the URL. The file format supports
        automatic judgment
        RFC/822 format (.eml)
        MHTML format (.mht, .mhtml)
        HTML format (.htm, .html)
        ZIP format (.zip, including HTML and image files)
    The URL is limited to static web pages;
    JavaScript or complex CSS web content may be distorted.

    • Marketing List

    Includes: marketing list, rejection list, test list; users can delete the marketing list from the system; new list fields contain name contact, permissions, and notes; contacts can add new, edit, delete, import, and download template; import formats supported are the .csv format and .txt format; data column symbol supports commas, semicolons, and tabs; fields include mailboxes, display names, company names, titles, and etc.

    • Scheduling Management

    Query field includes: period (last N day/week/month, from year/month/day to year/month/day), user, subject, audit account, audit result (all, pending reviews, permissions, prohibited); supports comparison methods (partial comparison, full comparison, left-to-left comparison, right-to-right comparison), whether to display “has been deleted.”
    The list field contains: the time the letter was sent, the sender, subject, user, auditing supervisor, final decision-maker, audit result, audit opinion, audit time, and delivery status. Delivery status includes: re-editing, test sending, delivery initiation, submit for review, review (whether to agree, review opinion), and deleted.

    • Statistic Reports

    Query field contains: period (last N day/week/month, period), user (user, group), and newsletter type. List field contains: the user, number of transmissions, number of mailboxes, number of successes, number of failures, number of opened messages, number of clicks, success rate, and failure rate.

    • System Features

    Supports custom text and graphical RWD for unsubscribtion Can perform secondary marketing for query results Define recipient behavior scores for profit analysis Integrate APIs with third-party systems Synchronize with CRM Synchronize logs with CRM

    • Marketing Log

    Query field contains: the period (last N day/week/month, period), sender, subject; support comparison method (partial comparison, full comparison, left-to-left comparison, right-right comparison). List field includes: marketing activities, subject, number of mailboxes, unsubscribe rate, failure rate, success rate, open rate, click rate, subscription rate. Marketing activity information includes: marketing activities, newsletter type, account number, event time, subject matter, sender, system list, rejection list, other recipients, unsubscribe, total number of recipients, scheduled delivery, and message code. Delivery log display fields include: recipient, sent date, DSN code, delivery result. Query conditions include: support list screening, recipient, filter by delivery results (all, success, failure, queue), opened letters (all, open, unopened), clicked (all, clicked, unclicked).
     

    ATKey.Pro

    AuthenTrend

    Fingerprint enabled USB dongle for identity and authentications via FIDO, OTP or other protocols; 

    FIDO2 certificate, Validated by MISA(Microsoft Intelligent Security Associations) for Azure Active Directory Passwordless login;
     

    ATKey.Card

    AuthenTrend

    Fingerprint enabled smart badge, built-in NFC, BLE and USB for authentication(FIDO or OTP), and access control(NFC), plus location tracking(BLE).

    FIDO2 certificate, Validated by MISA(Microsoft Intelligent Security Associations) for Azure Active Directory Passwordless login;

    AT.Wallet

    AuthenTrend

    Fingerprint enabled card type blockchain Cold Wallet.

    Design by EAL 5+ SE + fingerprint sensor + E-ink to support USB, BLE interface, plus unique Standalone mode for secure cryptocurrency transactions;

    CES 2020 Innovation Award Honoree - Cybersecurity and Personal Privacy

    Billows OneMan SOC

    Billows

    Based on the big data platform of the Billows LogMaster, a large amount of relevant information from IT, OT, and IOT is collected and stored in accordance to comply with regulatory requirements. It also integrates with AT & T AlienVault USM , in which  combines with functions like intrusion detection, behavior monitoring, and vulnerability assessment , asset discovery and etc…Providing relevant SIEM's  correlation rules and characteristics of the latest information security attacks. Furthermore, our platform combined with AI analysis module of for the efficiency and accuracy of detecting malicious behavior.

    In addition to continuous internal monitoring and improving the credibility of incidents, our platform provides automatic updates or manually update correlation rules. Allowing tech administrators to find and solve the problems immediately, improving the internal monitoring in a timely manner. 

    Incident response is also integrated into our platform. For example, in order to improve the processing time, we have added communication APP function so that administrator will not miss anything. If there is new malicious IP / URL information, we can block it automatically through our proactive defense system . When emergency incident needs to be reported and handled immediately , You’ll be notified by our security notification and it’ll be handle accordingly through our forensics analysis. Our OneMan SOC platform assists in the entire 
    process management workflow: from generating notification forms to completing the entirety of each case. Helping customers to secure their internal monitoring.

    Billows LogMaster

    Billows

    This platform allows collecting, compressing and saving large volumes of raw logs. It 
    also allows for integration with other reporting software to maximize visibility and 
    allow effective visualization of internal information. Additionally, users can also 
    automatically forward security logs to their threat analysis platform based on their 
    custom cyber security analysis needs. LogMaster offers the following capabilities.
    Log Storage: collecting and normalizing logs while performing long-term log 
    storage and non-repudiation verification
    Threat analysis: Integrating analysis within inbuilt threat modules so as to detect 
    abnormal events
    Packet storage: automatically saving packets when a specific security incident 
    occurs, preserving the integrity of digital forensics
    Quick response: provisioning of an automated response mechanism that 
    effectively shortens response time and automatically generates the required event 
    messages, simplifying and shortening incident response steps.

    Billows ISAC Information Security Incident Notification System

    Billows

    In accordance with the requirements for reporting security incidents of the Cyber Security Management Act, when a security incident occurs, it must be reported to a higher-level unit. Therefore, thru this platform to receive incidents information and verify whether the incident needs to be reported. From generating the specific report format to comply with the standard procedure automatically, to process and complete the entirety of each case in accordance of the National Center for Cyber Security Technology’s standardized format. Enhancing the immediacy, correctness and integrity of information, while instant sharing the incident information in helping to secure and reinforce the overall response.

    ChkSender: E-Mail Preservation and Authenticity Verification

    BlockChain Security

    ChkSender is a browser extension that is easy to install and use, not interfering with user's normal usage habits. It, in essence, enables users to confirm email authenticity by verifying email’s hash value, and to validate email integrity by verifying sender's domain information.

    When transmitting crucial emails, email is both saved & sent out via a one-click action; its digital fingerprint is, thus, permanently stored on blockchain and its timestamp is recorded. For confidential content protection, email can first be encrypted by assigning it a password, before being sent out. As a result, In case of any future disputes such as remittance transfer issues, the stored evidence can be used in court aiding with legal defense.

    Received email is verified in one click, confirming email authenticity, including if the subject, sender, recipient, mail body & attachment file names match the original. If already encrypted, received ChkSender logo can be clicked to decrypt and view the original email details. In case of sender's email address being tampered with, the difference with the original sent-email is clearly shown, duly preventing falling victim to hackers. In addition, sender’s domain information such as domain registration information, domain website screenshot, etc., are displayed assuring the receiver of the sender's origin. User may then add relevant sender's email address or domain name into personal whitelist/blacklist, used for easy future identification.

    ID Expert Identity Authentication System

    CHANGING Information

    ID Expert is the authentication solution protects users' accounts from hacking. The dynamic verification with various tokens, such like finger print or One-Time Password that fulfill secured and safe access. 

    uSAFE Flash Drive Management System

    CHANGING Information

    uSAFE is a Flash Drive Management System innovated for enterprise. The internal scenario is secured by allowing only authorized Flash Drive and computers to read and write the files. Through smart and convenient setting, the system will generate unique “Secured Flash Drives” to avoid from uncertain files or programs being written to drives. The solution will efficiently keep the computes from virus invasion. Files in the drive are protected if the flash drive is missing because only authorized computer can read files to prevent malicious usage. uSAFE secures enterprise’s internal scenario, strengthens data security and be on a strict check of data sharing procedure.

    CYBAVO VAULT

    CYBAVO

    CYBAVO VAULT is a cryptocurrency storage and wallet management system designed to fulfill business accounts requirements, providing at the same time a top notch protection level to secure your digital assets. Our digital wallet manager and vault provides business owners and digital asset managers the ideal tool to manage multi-currency wallets, and to perform streamlined blockchain transactions in a secure way

    CYBAVO WALLET SDK

    CYBAVO

    CYBAVO Wallet App SDK allows your company to easily develop your own mobile cryptocurrency wallet to offer to your customers, secured with CYBAVO private key protection technology

    CYBAVO EXCHANGE SOLUTION

    CYBAVO

    Digital Asset Exchanges and other crypto companies require the best security to protect their customers cryptocurrency wallets without compromising in control flexibility and scalability. CYBAVO VAULT SOFA is a One-stop exchange solution for cryptocurrency exchanges and other companies working with digital assets. As a mass wallet management platform it is designed to integrate their end users’ wallets with the secure digital asset storage provided by CYBAVO VAULT.

    AuthSec Description

    CYBAVO

    AuthSec Description

    Passwords have become an obsolete authentication mechanism. Their limited security together with a lack of accountability and a high maintenance cost are not fit for current security challenges. 

    AuthSec allows companies to implement secure passwordless authentication to provide a safer approach to authentication, while adding further risk control and accountability for the service provider. 

    AuthSec enables Mobile as Identity for service providers, bind the users’ identity to their mobile device for a higher risk control and accountability, for a single or multiple services. By changing a password-based authentication by robust mechanisms like PushAuth or One-Time Password Authentication, AuthSec removes the risk of password reuse and account impersonation.

    AuthSec also offers a smart risk assessment system that evaluates users’ mobile and environmental information to determine if an authentication request is safe, protecting the company from fraudulent logins.

    CyCarrier AIR Platform

    Cycarrier

    Flexibly deploy from on-prem or the cloud, AIR inspects thousands of endpoints simultaneously, detects real-time threats, discovers the root cause, and instantly responds. Our Xensor agent-less mode scans the endpoints on a daily scheduled basis, while the agent mode constantly monitors the endpoints for any malicious activities.

    The collected raw report from Xensor is sent to CyCarrier (AI-powered forensic analytics center), where it investigates malware samples, commands in memory, and other suspicious activities that signatures-based or anti-virus fail to classify. To enrich the CyCarrier’s database, the Cybertotal (Threat Intelligence) platform integrates internal sources with updated multiple external CTI data sources to provide the unique business intelligence.

    Red Team Assessment

    DEVCORE

    Red team assessment is a process of using advanced tactics, techniques, and procedures to emulate a real-world threat to train and measure the effectiveness of process and technology used to defend an environment in a limited time period. Typically conducted by a third-party organization. We own the hacker's mindset and use world-class attack techniques to accurately identify the blind spots of corporates security defense. More often, corporates can also take stock of the accuracy and coverage of the security monitoring mechanism to make sure these controls are still effective. And experience a real-world attack in a safe way, instead of learning from real-world incidents to enforce internal consensus and awareness. 

    Fractal security storage

    DoQubiz Technology

        A smart contract storage system with fractal module and private blockchain forms an ultra-secured file storage management system.
    Secure data transfer solution
        No data will be transferred, only encrypted fragment pieces is passing. It is not only applying to file transfer, but also multimedia.
    Dynamic access authority management
        Both printed and digital publishing file can be real-time control the access authority with fractal engine and the e-paper reading module. 

  • Type:Encryption
  • ANCHOR (Ark of Network, Cyber Hamper for Operations Reliability)

    Global Wisdom

    ANCHOR(Ark of Network, Cyber Hamper for Operations Reliability) starts with the spirit of ISO and best practice experience. Each management link in the privileged account lifecycle (certification, application, review, activation, notification, connection, monitoring, reporting, auditing) corresponds to the managing process and auditing requirements and other functions that constitute a centralized managing platform to save the traditional high cost of implement and time costs.
    This product uses single portal to complete the privileged account lifecycle management, includes controlled device/group authorization management, temporary ID/connection/password application, audit, auto sign-in, live monitoring, playback, reporting and audit workflow. To exempt unnecessary risks and avoid maintenance disputes, the controlled-device does not need to be installed any software or opened catalogue (Agent-less). It is a solution with best security, best convenience, best initiative, best immediacy, best importability and best usability.

    eDetector

    iForensics

    eDectector is a practical and powerful remote malware-scanning and detecting tool. It detects the behavior of processes and assists users to find out and mark the malwares, even the unknown ones. With this function, you would never be helpless against APT attacks. Besides, eDetector can assist to build an Intranet Security Alarm System, which makes it possible to find the hiding zombie computers earlier. We could hence take the necessary actions against attacks in the shortest time, avoiding the enlarged tragedy of the information security issues.

    Sekret Messenger

    InfoBoom

    - Sekret: Secure, Instant and Professional
    Sekret adopts rigorous and comprehensive end-to-end encryption technology to avoid malicious attacks, eavesdropping and theft during the transmission of the encrypted messages.
    - Portable Encryption Key
    It prevents information from being tampered with or forged. Sender decryption confirms data integrity and provides non-repudiation, so as to ensure data security and correctness.
    - Encryption of Real-time Audio and Video
    Audio and video calls are end-to-end encrypted. The connection initiator can decide whether to save the audio and video. Only the participants or group members can use the private key to decrypt.

    Sekret-Form

    InfoBoom

    The encrypted form of Sekret that designs forms according to your needs, quickly creates questionnaires, forms and quizzes, and generates exclusive QR Codes. The instant notification and automatic collection and organization of questionnaires allow you to view the responses any time. Statistics and data analysis are just a click away, which can be exported as Excel.

  • Type:Encryption
  • Sekret-Lottery

    InfoBoom

    This encrypted lottery event is a safe and simple marketing campaign for enterprises. To participate, customers just need scan the QRcode. The system only records the ticket numbers of the lottery to prevent leakage of customer data. This effectively increases the willingness of customers to participate in the event, enhances credibility and consumer personal data protection, and establishes a good corporate image.

    KX906 Smart Token

    KeyXentic

    The fingerprint biometrics are used to replace the password to solve the current security risks caused by the account password mechanism. Users can manage the encryption keys, credentials and personal biometrics through their fingerprints.
    And applied to various credible service processing such as file encryption, digital signature or blockchain and other related applications. Achieve the use of personally controllable digital keys to create a secure network environment.

    InstantCheck® Cloud Security Gateway

    L7 Networks

    ■ Filtering Threats Inside https
    Nowadays cloud services and hacker C&C are all encrypted in https connections, causing traditional security solutions fail to filter the contents. Such services include Hacker Cloud (Botnet C&C / APT), WebMail Cloud (Gmail / Outlook / Yahoo Mail), Social Cloud (Facebook / Twitter / Google Plus), WebHD Cloud (Dropbox / Google Drive / One Drive), Messenger Cloud (Line / Skype / Google Hangout / Facebook Chat). Research reports indicate that at least 60% of the total traffic hides in https tunnels. Auditing, filtering, and forensics the content of traffic is not easy anymore. It’s time to face the truth.

    ■ Ransonware & Confidential Data Leakage
    Recently many computers are locked by ransomware, meaning anti-virus is not fast enough to defend vulnerabilities. Stopping botnet’s command and control return path with malware sandbox are the last defend line for enterprises. InstantCheck® has integrated Google Safe Browsing® malicious website database, Malware Patrol® ransonware C&C prediction, NICST blacklists. Moreover, decrypted malicious files can be sent to InstantTrace® sandbox cloud for further analysis. 

    ■ Regulatory Compliance
    Corporate scandals and breakdowns such as the Enron case have increased calls for stronger compliance and regulations in different kinds of industries, such as Sarbanes–Oxley, ISO27000, PCI-DSS, HIPAA, SEC, FINRA, FSA, IIROC, FERC, NERC, CFTC, NFA. They all require electronic communications to be logged for years for auditing. Of course, it is a must to audit https traffic since most crime activities hide themselves in encrypted https tunnels. 

    ■ User-Unaware Installation and Digital Forensics
    User-unaware installation is extremely important for such auditing tools. InstantCheck® employs transparent mode or proxy mode to install without changing your network architecture. Currently InstantCheck® can filter detailed behaviors and reconstruct mainstream webmail contents (Gmail / Outlook / YahooMail ) webhd contents (Dropbox / One Drive / Google Drive), messenger contents (Line / WeChat / Facebook Chat / Gmail Chat), social contents (Facebook / Twitter) for network data forensics.

    ■ Professional Apps For Further Analysis
    After SSL decryption, InstantCheck® can call the following apps:
    (1) Built-in AegisLab® virus signatures who has been listed in VirusTotal® since 2013
    (2) Built-in Google Safe Browsing® service for blocking malicious malware URL/IP
    (3) Built-in Malware Patrol® ransomware C&C domain prediction engine
    (4) Built-in IP/URL blacklists from FireHOL®, Cisco Talos®, NICST®, AegisLab®, ...
    (5) Optional InstantAudit® End-Point for audting messages / files of Line/Skype/WeChat
    (6) Optional InstantLock® DLP engine for recognizing privacy / confidential data / intellectual properties
    (7) Optional InstantTrace® malware analysis for sandboxing unknown threats
     

    AS-Advanced Crypto lab

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NTU-AI & Data Science

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NTUST-IoT-based End-to-End System Security

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NCTU-Cutting-Edge Technologies for Malware Vetting, Network Attack & Defense

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NTHU-Cyber security in finance and financial software security

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NCHU-Resilient and Privacy-Preserving Mechanism for Critical Information Infrastructures

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NCKU-Security Operation Center & ISMS Technology Development

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NSYSU-Secure and Intelligent Next-Generation Communications and Computation Technologies

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    NCHC-Multilayer Cybersecurity Defense Service and System Development

    MOST InfoSec-TWISC+CDX

    National Applied Research Laboratories National Center for High-performance Computing
    1. CDX is to provide an environment for long periods of time in coordination with school courses, including the simulation of a real company's network environment with randomly selected vulnerabilities in cyber defense contests. 
    2. Honeynet and Malware Knowledge Base simulates system and application vulnerabilities and then monitors the cyber-attacks and the corresponding traffic flow.

    HERCULES SecDevice

    Onward Security Corporation

    HERCULES SecDevice is a security assessment tool designed for connected products that provides automated features to save time and man power during testing. 
    Function Feature:  
    1. Automatic target identification and testing 
    2. Intelligent analysis of vulnerabilities 
    3. Fuzzing test to find unknown vulnerabilities
    4. Supports known vulnerability test cases 
    5. Detailed test result reports 
    Supporting Devices: 
    1. Embedded Devices 
    2. IoT Devices 
    3. ICS/SCADA/IED/PLC Devices 
    4. Other, support operated on Ethernet/IP Device
     

    HERCULES SecFlow

    Onward Security Corporation

    HERCULES SecFlow assists users to manage software security development life cycle (SSDLC) related tasks and provides functions such as "security development process management", "security vulnerability database" and "active product security event monitoring". During the requirements, design, development, testing, deployment and maintenance stages, HERCULES SecFlow can be used to meet the requirements of the SSDLC and further to comply with compliance standards such as ISO 27001, ISO 27034, NIST SP 800-64 and IEC 62443.
     

    Openfind Secure Cloud Service

    Openfind

    OSecure Cloud Security Service is cloud service brand by Openfind. It provides additional Email security services for corporate, especially good for Office 365/G Suite. OSecure offers advanced prevention with precision filtering technology, upgraded mail protection to ensure the security of corporate communications. Also it offers adjustable filtering settings and comprehensive review of corporate security requirements and with high-speed interception and report generation for optimal management efficiency. 

    MailGates Mail Protection System

    Openfind

    The MailGates mail protection system is deployed in front of corporate mail servers. To provide users with comprehensive anti-spam protection, global and local samples are analyzed on the mail cloud to identify all e-mail attack behaviors and threats, provide real-time anti-virus protection, as well as automatic detection and filtering of spam.
    The reliable and high-performance system environment, clear and succinct statistics reports and logs, as well as comprehensive and user-friendly administration functions with industrial-level mail management requirements. The MailGates mail protection system will continue to refine its mail protection functions and build the most secure, smooth and reliable channel for e-mail delivery and receiving.
    More Information:https://www.openfind.com.tw/english/downloads/MailGates_EN.pdf

    Mail Archive and Management System

    Openfind

    MailBase Replication Mode makes the archiving of e-mails easy and requires absolutely no changes to the existing network structure and mail process. Its high level of compatibility with cloud mail and mail servers makes deployment fast and easy. Mail life cycle management can store archived e-mails on the local server, cloud service or other external storage media based on access frequency. If there are hundreds of millions of e-mails, a distributed architecture can be used to process all e-mails, speed up searches and carry out mail browsing and auditing tasks. 
    More Information:https://www.openfind.com.tw/english/downloads/MailBase_EN.pdf

    RUITING RKMS Key Management System 2.0

    Ruitingtech

  • Type:Encryption
  • Sol-DISC Integrated Digital Intelligence Platform

    SWT Solutions Inc.

    "One-Stop-Shop" platform for digital Investigation that allows you to discover unexpected personal connections, similarity  between individual cases, and correlations among seemingly unrelated individuals and cases.

    Big Data hidden in overwhelming numbers of devices will need not just one but many tools for discovery and analysis. In order to uncover evidence, acquire critical information, or investigate inside an organization, a "Toolbox" approach with multiple digital forensics tools is essential. However, this approach inadvertently presents a challenge: How do you examine different reports from a variety of forensics tools at the same time? How do you discover insights and correlations out of the mass amount of data?

    Sol-DISC Integrated Digital Intelligence Platform

    SWT Solutions Inc.

    Enter Sol-DISC.

    Sol-DISC was created by SWT Solutions to solve this challenge. It integrates multiple forensics reports on one platform for review and analysis. Information is structured into case management and POI management categories for cross examinations among individuals and cases in order for actionable insight discovery.

    QUARK Android-An Obfuscation-Neglect Android Malware Scoring System

    Telecom Technology Center

    Android malware analysis engine is not a new story. Every antivirus company has their own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.

    We have an order theory of criminal which explains stages of committing a crime. For example, crime of murder consists of five stages, they are determined, conspiracy, preparation, start and practice. The latter the stage the more we’re sure that the crime is practiced.

    According to the above principle, we developed our order theory of android malware. We develop five stages to see if the malicious activity is being practiced. They are 1. Permission requested. 2. Native API call. 3. Certain combination of native API. 4. Calling sequence of native API. 5. APIs that handle the same register. We not only define malicious activities and their stages but also develop weights and thresholds for calculating the threat level of a malware.

    Malware evolved with new techniques to gain difficulties for reverse engineering. Obfuscation is one of the most commonly used techniques. In this talk, we present a Dalvik bytecode loader with the order theory of android malware to neglect certain cases of obfuscation.

    Our Dalvik bytecode loader consists of functionalities such as 1. Finding cross reference and calling sequence of the native API. 2. Tracing the bytecode register. The combination of these functionalities (yes, the order theory) not only can neglect obfuscation but also match perfectly to the design of our malware scoring system.

    Gateway Solution Service

    TRADE-VAN

    Our “Gateway Solution Service” provides domestic and foreign cyber security information, blacklists, websites, various Trojans and viruses, and real-time blocking, as well as 24/7 monitoring and threat warning and 24-hour professional customer service consulting services. We use a monthly rent model, so SMEs can easily have national-level security protection.

    TrustView Full-Scale Data Protection Solution

    TrustView

    We adopt the exclusive patented technology of DRM/Area DLP/CASB to provide a full-scale data protection solution for endpoint, file server, web application and cloud environment. This helps directly protect a variety of important files, pictures, web content and source coded. The most brilliant part of the TrustView solution is the three-tier file protection design. The company can introduce a solution on its own to meet its special requirements and create most suitable data security for the operation.

    TWISC Research Centers

    TWISC

    TWISC has established seven affiliated regional centers respectively across Taiwan since then with the headquarters (TWISC@AS) established within and funded by the Research Center of Information Technology Innovation, Academia Sinica. The research activities in TWISC include cryptology, network & software security, data protection, and critical information infrastructure protection, etc..

    International Collaborations

    TWISC

    Coordinate international cooperation planning, including relevant security research units in the United States, Germany, Japan, and Israel.

    Education

    TWISC

    Assisted seven affiliated regional centers to handle seed training and education promotion.

    Projects

    TWISC

    For emerging technologies, explore security threats and issues that have occurred or may be derived in the future.

    AgileLink-Wan load balance

    UGuard

    UGuard AgileLink family of appliance and virtual devices delivers failover and load balancing across multiple WAN connec- tions , help to ensure greater reliability , bandwidth and redundancy network services for the enterprise , improved applica- tion performance , raising traffic visibility and reduce complexity of WANs cost.
    By leveraging multiple connections(T1, xDSL, Cable, 3G/4G etc.), AgileLink provides highest reliable Internet access and remain VoIP quality. Furthermore, allows traffic across multiple Internet or service provider networks for redundant link connectivity, real-time failover. This enables customers to shift to a broadband WAN whether site-by-site, or via a hybrid WAN approach that leverage MPLS and broadband Internet connectivity.

    UAC-Unified Access Controller

    UGuard

    Powered by our custom DPI engine and I.D. centric design, the Unified Access Controller - "UAC" provides a comprehensive Layer 7 trace management mechanism that allows IT administrators to effectively manage, monitor and secure their network resources. Whether it is for individual, department or company wide access to internet services, UAC can precisely enforce network policies compliance and control while provides  extensive monitoring reports for daily operations.
    No matter by using wireless or wired network got access of internet connection, and what type of device (Laptop, PAD, Smart Phone, etc), UAC would guiding people through its diversely authentication rules to making proper control and keep such access log for further auditing purpose. Even though one person has couple devices keeping online with traces, UAC can bonding to one single account, thus , to fully control impossible becomes possible and achievable.

    Penetration Testing

    Zuso

    In the aspects of hackers, we attempt to invade a corporate's website and information system, from exterior to interior, in purpose of doxing the possibility of potential threats for issuance of complete report and advice of improvement.

    Red Team

    Zuso

    Our red team use zero-day vulnerabilities into  potential attack paths, business impact of the breach, remediation steps and analysis to understand root causes of security failures.

  • Type:Red Team
  • Cyber Security Incident

    Zuso

    Cyber Security Incident
    Cyber Attacks Anywhere Are a Threat Everywhere.Our team has a lot of experience in investigating security incidents, allowing companies to quickly understand the overall incident, All to help you get back to business as usual with confidence- quickly and efficiently.

    Data Science

    Zuso

    A sure way to victory is to know both your strength and the enemy's. " We exploit an unique technique for analyses, spot your most desirable outcome and render you the most concrete recommendation.

    Consultation Service

    Zuso

    The thinking pattern of a singular aspect is out in terms of information security and data analyses. Multiple perspectives ace! With sincerity, we provide you the panorama of circumnavigation-wide visions and assist your corporate in advancing to better prosperity.

    CyCarrier AIR Platform

    Cycarrier

    Flexibly deploy from on-prem or the cloud, AIR inspects thousands of endpoints simultaneously, detects real-time threats, discovers the root cause, and instantly responds. Our Xensor agent-less mode scans the endpoints on a daily scheduled basis, while the agent mode constantly monitors the endpoints for any malicious activities.

    The collected raw report from Xensor is sent to CyCarrier (AI-powered forensic analytics center), where it investigates malware samples, commands in memory, and other suspicious activities that signatures-based or anti-virus fail to classify. To enrich the CyCarrier’s database, the Cybertotal (Threat Intelligence) platform integrates internal sources with updated multiple external CTI data sources to provide the unique business intelligence.

    Allot

    Allot

    Allot is a leading provider of innovative network intelligence and security solutions that empower communications service providers (CSPs) and enterprises worldwide to enhance the value they bring to their customers. With over 20 years of proven success, our solutions turn network, application, usage and security data into actionable intelligence that make our customers’ networks smarter and their users more secure.

    Allot network-based visibility, control and security solutions are deployed globally by the world’s leading service providers and enterprises to improve network performance, ensure optimal QoE and deliver value added security services. Our leading network security solutions achieve unmatched results.

    See. Control. Secure.
    Your network and your customers are your assets. With Allot Intelligence, Control and Security at the heart of your network, you gain the visibility and power needed to improve business decisions, target customers better, and protect any device connected to your network right from within. With Allot you can truly be much more than just a network.
     

    Billows OneMan SOC

    Billows

    Based on the big data platform of the Billows LogMaster, a large amount of relevant information from IT, OT, and IOT are collected and stored in accordance to comply with regulatory requirements. It also integrates with AT & T AlienVault USM , in which  combines with functions like intrusion detection, behavior monitoring, and vulnerability assessment , asset discovery, Threat intelligence and etc…Providing relevant SIEM's  correlation rules and signatures of the latest information security attacks. Furthermore, our platform combined with AI analysis module for the efficiency and accuracy of detecting malicious behavior.
     
    In addition to continuous internal monitoring and improving the credibility of security incidents, our platform provides automatic or manual updated correlation rules. Allowing security administrators to detect and respond to security incidents immediately, improving the status of security in a timely manner.
     
    Incident response is also integrated into our platform. For example, in order to improve the processing time, we have added communication APP function so that administrator will not miss anything. If there is a new malicious IP / URL information, we can block it automatically through our proactive defense system .
     
     When an emergency incident needs to be reported and handled immediately, you can use our platform to share information with ISAC and record all the incident response procedures. Our OneMan SOC platform assists in the entire process management workflow: from generating notification forms to completing the entirety of each case. Helping clients to automatic their internal process and secure their system.

    AT&T Cybersecurity-AlienVault USM

    Billows

    AT & T Cybersecurity’s AlienVault USM is an all-in-one platform. Unlike traditional SIEM or security point products. The USM Appliance platform provides five security essential s in a single console, giving you everything you need to manage both compliance and threats. Including: 

    Asset discovery, 
    Vulnerability assessment, 
    Intrusion detection
    Behavioral monitoring
    SIEM

    The main capability of USM comes from Open Threat Exchange(OTX). The world's largest open threat intelligence community that enables collaborative defense with actionable, community-powered threat data. OTX has gathered more than 80,000 users from 140 countries around the world. Through the platform, more than 19 million potential threats are shared daily. The USM is updated every 15 minutes and audited OTX information, so it can detect almost all kinds of real-time threats flowing around the world.

    In addition, AT & T joins the Global Telco Security Alliance consisting of Softbank, Etisalat, Singtel, and Telefónica. 
    Alliance combines resources and capabilities of telecom operators to help protect all types of businesses from the growing threat of sophisticated cyber-attacks.

    The inclusion of AT&T heightens the Alliance’s ability to share insights and best practices for customers globally by harnessing the expertise of more than 6,000 security experts and a global network of more than 28 Security Operations Centers. Combined, the members of the Alliance now cover more than 1.2 billion customers in more than 60 countries across Asia-Pacific, Europe, the Middle East and the Americas.

    Billows LogMaster

    Billows

    This platform allows collecting, compressing and saving large volumes of raw logs to fulfill all the basic requirements of regulation. It can integrate with other reporting software to effectively visualize the internal information. Additionally, users can also automatically forward security logs to their threat analysis platform based on their cyber security analysis requirements.
    Log Management: collecting, preserving normalized/ unnormalized log data and non-repudiation verification. Keep track all the data lifecycle. Make sure all the necessary data will be preserved as the regulation asks.
    Threat analysis: Integrating analysis within inbuilt threat intelligence modules so as to detect abnormal events.
    Integration module: This module can help administrator integrated with other SIEM or Reporting software.

    Billows ISAC Information Security Incident Notification System

    Billows

    In accordance with the requirements for reporting security incidents of the Cyber Security Management Act, when a security incident occurs, it must be reported to a higher-level unit. Therefore, with this platform receiving incident information and verify whether the incident needs to be reported. From generating the specific report format in compliance with the standard procedure automatically to process and complete the entirety of each case in accordance with National Center for Cyber Security Technology’s standardized format. Enhancing the immediacy, correctness and integrity of information, while instant sharing the incident information in helping to secure and reinforce the overall response.

    Cellopoint Secure Email Gateway (SEG)

    Cellopoint

    Cellopoint Secure Email Gateway (SEG) is an integrated email security gateway solution deployed in front of the Mail Server. It uses the original CelloOS technology and the industry-leading CelloCloud, a Cloud online security system, with a multi-layer scanning mechanism to effectively block the threats of Advanced Malware、Ransomware、Businese Email Compromise、Spam、Virus、Phishing Emails、Spyware、Mail Bombs, and Springboard attacks from entering your network and protecting the email security infrastructure, while improving the performance of the mail server.

    Email Data Loss Prevention(DLP) for auditing and encryption

    Cellopoint

    Cellopoint mail policy engine can pre-establish DLP detection conditions and execution actions of enterprise organization's outbound mail, in order to detect and protect personal information、business secrets and company intellectual property. Outbound mail encryption provides PDF which is easy to use,  HTTPs encryption, and S/MIME encryption that emphasizes strict protection, both practical, convenient and also for highly sensitive information protection. Email encryption is no longer a high-tech technology, which providing organizations with flexible planning of email security.

    CTI Cellopoint Threat Intellgence Service

    Cellopoint

    Cellopoint provide Sender IP reputation lists、the latest malicious email with malware MD5 or fingerprint、new url malicious database and phishing emails patterns through customize service.

    Citrix Workspace

    Citrix

    Citrix Workspace is a flexible platform that delivers a personalized, digital work experience. Simplify complex enterprise applications by streamlining functionality and provide a single point of access to content, managed, web, SaaS, Windows and Linux apps and desktops.
    Only Citrix has the unique ability to securely deliver at every layer of your technology stack. We provide industry-leading solutions for endpoint management, content collaboration, access control, virtual apps and desktops, workspace intelligence and analytics so IT has end-to-end visibility and control.

    The Internet Security, Performance, and Reliability company

    Cloudflare

    Security 
    1) Advanced DDoS Protection
    Fast, globally distributed and intelligent protection against sophisticated DDoS attacks
    Protect your Internet properties with a cloud-based, always-on DDoS protection, powered by the intelligence harnessed from Cloudflare’s always learning global network. 
    2) Data Breach Prevention
    Protect applications from attacks resulting in sensitive customer data compromise
    A data compromise can result in the leak of sensitive customer information, such as credit cards, passwords, and other personally identifiable information (PII), from an application's data store. Attackers often use several attack vectors when attempting to compromise customer data, such as DNS spoofing, snooping of data in transit, brute force login attempts, or malicious payload exploits.
    The global cost of a data breach on average, per lost or stolen record, is $141 in 2017, and the average total cost of a data breach in the US is $3.62 million. With heightened scrutiny by governments and media, companies are facing severe repercussions from even the smallest data compromise. Business impacts include lost customers and revenues, degraded trust, damaged brand, or regulatory penalties.
    Websites and applications require the resilience and intelligence of a scalable network to combat the most sophisticated and newest attacks. Protecting against threats should not degrade performance caused by security induced latencies, and security services must be easy to configure to eliminate misconfigurations, which introduce new vulnerabilities.

    Performance
    1) Accelerate Mobile Experiences
    Increase engagement and conversions, regardless of distance to origin servers, device type, or network health
    Mobile visitors expect fast, rich online experiences. Mobile device and cellular network limitations can degrade a users mobile experience, resulting in lower conversions, loss of revenue, and degraded brand perception.
    Mobile applications and web pages require the speed and scale of a global network to combat mobile-induced latencies and globally dispersed users with poor connectivity. Cloudflare optimizes image files for mobile consumption and provides developers with tools to improve native mobile app performance on challenging networks.
    2) Accelerate Internet Applications to Increase Conversion Rates
    Deliver fast, rich user experiences for Internet applications that increase engagement and conversions, while reducing costs.
    Consumers expect web pages to load quickly. Slow page load times can lead to high bounce rates, page abandonment, and lower conversion rates. Web pages are becoming increasingly complex and users are more globally dispersed; which degrades the user experience. Cloudflare brings content closer to your users by caching static web content on its network. Image files can be optimized to significantly improve load times, and dynamic content can be compressed and routed on the fastest, least congested path to the end-user.

    Intention Prediction as a Service, IPaaS

    Core Cloud

    Core Cloud IPaaS combines full spectrum threat detection, predictive analytics and automated mitigation to eliminate advanced threats.

    Cubro EXA8

    Cubro Network Visibility

    A FLEXIBLE HARDWARE PLATFORM FOR ENDLESS NETWORK APPLICATIONS
    Enterprises need a more intelligent network security and monitoring approach which provides granular visibility down to the link layer. The EXA8 is the first packaged hardware and software solution in the market that addresses the needs of enterprise customers and network engineers for a fail-safe network tapping, traffic capture, and troubleshooting platform.

    It is possible to manage the EXA8 not only remotely but wirelessly with the addition of 4G or Satellite modems. Given the small, portable form factor, low power consumption, and economical cost of the EXA8, it becomes a very compelling option for remote and distributed deployments.

    Cubro PACKETMASTER EX32/32+

    Cubro Network Visibility

    The EX32 series Network Packet Broker is a cost-effective solution for high port density 10G networks and offers expanded features over the previous Packetmasters such as packet slicing and user-defined filters.

    The EX32 features 32 x 1 or 10G SFP+ interfaces offering exceptional port density and features at a very compelling price point. The EX32+ model also adds an additional 2 x 40G QSFP ports. These QSFP ports also support breakout cables to individual 4 x 1/10G connections bringing the 1/10G link capacity up to a possible 40 x 1/10G interfaces.

     

    Cubro SESSIONMASTER EXA24160

    Cubro Network Visibility

    The EXA24160 is a next-generation network packet broker capable of filtering up to OSI Layer 7. The EXA24160 is capable of advanced functionality such as deduplication, time-stamping, and session-based filtering on a keyword (search the payload of a packet for specific keyword match) or regular expression matching (search the payload for a pattern match). This is accomplished by a pair of powerful x86 processors that handle L5-7 filtering.

     

    Cubro AGG-32100

    Cubro Network Visibility

    The AGG-32100 series Network Packet Broker is a cutting edge solution for environments with high densities of 100G links. The AGG-32100 is part of the Fifth Generation (G5) network packet brokers from Cubro. The architecture in these devices is a programmable switching fabric that offers unparalleled performance and throughput for extremely high-bandwidth installations.

    The AGG-32100 features 32 x 40/100G QSFP/QSFP28 interfaces and also supports 10G/25G coverage via breakout cables providing an extensive and flexible level of connectivity.

     

    CyberArk

    Cyberview

    Since CyberArk established in 1999, we have been focused on assisting customers organizing high-level account security management, to provide all-round solution to internal arrangement, cloud, and ICS environment. Not only provides extensive support to applications and devices at business level, including important server, AP and DB system and internet security, but also released Endpoint Privilege Manager(EPM), a control system integrating "highest authorized account of local machine" and "application programs", protecting the security of window machine(PC, NB, Macbook) and Windows Server, providing an effective "cyber security protection" system to the overall environment.

    CyberArk Core PAS – Privileged Access Security Solution includes the following characteristics:
    . According to organizational privileged access security principles, focus on protection and control of access right on privileged password
    . Able to view privileged user’s connection real time, can remotely end all suspicious connections.
    . Saves complete record of privileged connection, make it easier for the auditor
    . Automatic identification, warns of irregular activities

    Endpoint Privilege Manager (EPM) includes the following characteristics:
    . Self-learning/ establishes policy according to business needs
    . Minimal exquisite privileged principles enforced on Windows system manager
    . May raise user authority according to business needs
    . Identifies and blocks malware application software promptly
    . Detects and blocks behaviors trying to steal authentication
    . Unknow application software are to be executed safely in restricted mode
    . Integrates with threat detection tool, to analyze unknown application programs
    . To find all application programs in the environment

    《2018/Nov Gartner Magic Quadrant for Privileged Access Management》

    Enterprise Immune System

    Darktrace

    The Enterprise Immune System is a self-learning cyber AI technology that detects novel attacks and insider threats at an early stage.

    Modeled on the human immune system, the Enterprise Immune System learns and understands ‘self’ for everyone and everything in the business, and can spot the subtle signals of an advanced attack — without relying on rules, signatures, or prior assumptions.

    Industrial Immune System

    Darktrace

    The Industrial Immune System is a fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time.

    This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations.

    Darktrace Antigena

    Darktrace

    Darktrace Antigena is the world’s first Autonomous Response solution. Powered by award-winning Cyber AI, it responds to cyber-attacks in a matter of seconds — when security teams are overwhelmed or simply aren’t around.

    The technology works like a digital antibody, intelligently generating a targeted and proportionate response whenever a threatening incident arises in network, email or cloud environments.

    Allot

    Envinex

    Allot is a leading provider of innovative network intelligence and security solutions that empower communications service providers (CSPs) and enterprises worldwide to enhance the value they bring to their customers. With over 20 years of proven success, our solutions turn network, application, usage and security data into actionable intelligence that make our customers’ networks smarter and their users more secure.

    Allot network-based visibility, control and security solutions are deployed globally by the world’s leading service providers and enterprises to improve network performance, ensure optimal QoE and deliver value added security services. Our leading network security solutions achieve unmatched results.

    See. Control. Secure.
    Your network and your customers are your assets. With Allot Intelligence, Control and Security at the heart of your network, you gain the visibility and power needed to improve business decisions, target customers better, and protect any device connected to your network right from within. With Allot you can truly be much more than just a network.

    Xena

    Envinex

    Xena SAFIRE

    Enterprise Firewall Performance Tester

    Enterprise firewalls improve network security by segmenting corporate LANs. However, each of the advanced security functions (e.g. antivirus, app-control, IPS and SSL decryption) has a performance penalty. Combined, these features can seriously reduce network performance (in some instance up to 90%) – frustrating users and reducing business performance.

    Safire is the only solution on the market that solves this problem quickly and cost-effectively.

    TECHNOLOGIES:  Network Security

    USED BY:
    Enterprise IT
    Network Security
    System Integrators
    Data Centers
    Finance
    Government
    Defense

    Cubro EXA8

    Envinex

    A FLEXIBLE HARDWARE PLATFORM FOR ENDLESS NETWORK APPLICATIONS
    Enterprises need a more intelligent network security and monitoring approach which provides granular visibility down to the link layer. The EXA8 is the first packaged hardware and software solution in the market that addresses the needs of enterprise customers and network engineers for a fail-safe network tapping, traffic capture, and troubleshooting platform.

    It is possible to manage the EXA8 not only remotely but wirelessly with the addition of 4G or Satellite modems. Given the small, portable form factor, low power consumption, and economical cost of the EXA8, it becomes a very compelling option for remote and distributed deployments.

    Cubro PACKETMASTER EX32/32+

    Envinex

    The EX32 series Network Packet Broker is a cost-effective solution for high port density 10G networks and offers expanded features over the previous Packetmasters such as packet slicing and user-defined filters.

    The EX32 features 32 x 1 or 10G SFP+ interfaces offering exceptional port density and features at a very compelling price point. The EX32+ model also adds an additional 2 x 40G QSFP ports. These QSFP ports also support breakout cables to individual 4 x 1/10G connections bringing the 1/10G link capacity up to a possible 40 x 1/10G interfaces.

     

    Cubro SESSIONMASTER EXA24160

    Envinex

    The EXA24160 is a next-generation network packet broker capable of filtering up to OSI Layer 7. The EXA24160 is capable of advanced functionality such as deduplication, time-stamping, and session-based filtering on a keyword (search the payload of a packet for specific keyword match) or regular expression matching (search the payload for a pattern match). This is accomplished by a pair of powerful x86 processors that handle L5-7 filtering.

     

    Cubro AGG-32100

    Envinex

    The AGG-32100 series Network Packet Broker is a cutting edge solution for environments with high densities of 100G links. The AGG-32100 is part of the Fifth Generation (G5) network packet brokers from Cubro. The architecture in these devices is a programmable switching fabric that offers unparalleled performance and throughput for extremely high-bandwidth installations.

    The AGG-32100 features 32 x 40/100G QSFP/QSFP28 interfaces and also supports 10G/25G coverage via breakout cables providing an extensive and flexible level of connectivity.

     

    FINIKA

    EQIT

    A platform to integrate network data residing in different sources and provide real-time network status, access control and end-point security.

    SYNESIS

    EQIT

    SYNESIS Portable provides mobility for big data packet capture needs without sacrificing high fidelity lossless packet capture performance at any Ethernet speed: 1G/10G/100G. The rugged SYNESIS Portables are ideal for lab, offsite locations, and data centers as temporary big data packet collectors. SYNESIS Portables are self-contained units with their own monitor, keyboard, and mouse trackpad and all of the necessary software.
    The rackmount SYNESIS, with its higher performance and larger storage capacity, is designed to monitor critical links for long-term forensic needs.
     

    Uila

    EQIT

    Enterprise Data center architecture has evolved dramatically in recent years, enabling it to e¬ectively run large-scale, distributed, multi-tier applications across public, private and hybrid cloud environments. To support and ultimately ensure delivery of business-critical applications and services, an elastic data center architecture and agile development model has emerged to share workloads, data and resources across the multi-cloud environment. However, IT monitoring solutions have not kept pace with this new wave of multi-cloud dynamics and the agile DevOps model. Current tools have reinforced the established silos that separate applications, virtual infrastructure, physical infrastructure and blind to public cloud resources. As a result, IT Ops teams have no inter-silo correlation across clouds and are unable to e ciently plan, migrate, optimize, right-size and solve problem on hand. There is also a lack of a single console across the multiple cloud providers and on-premise deployments for ubiquitous visibility for the workload and its dependencies. 
    Uila solution aligns business applications and IT Operations in a single product with application visibility and correlated network, compute and storage insights across clouds boundaries.
     

    Unified Threat Prevention Platform

    ESI Taiwan

    The Morphisec Unified Threat Prevention Platform, built on moving target defense, is architected to deterministically block advanced threats such as fileless malware, exploits, and zero-day attacks without needing to detect signatures or relying on behavioral analysis.

    Flowmon Probe

    Flowmon Network

    Flowmon Monitoring Center: Analyzes and visualizes NetFlow statistics
    Flowmon ADS: The Anomaly Detection System protects against unknown threats
    Flowmon APM: The Application Performance Monitor delivers a smooth user experience
    Flowmon DDoS Defender: Detects DDoS and other volumetric attacks
    Flowmon Traffic Recorder: Saves complete network traffic data
    Appliances – Cloud / Virtual / HW
    Flowmon Probe: Generates data about network traffic
    Flowmon Collector: Provides highly scalable data storage and analysis

    Flowmon Collector

    Flowmon Network

    Flowmon Monitoring Center: Analyzes and visualizes NetFlow statistics
    Flowmon ADS: The Anomaly Detection System protects against unknown threats
    Flowmon APM: The Application Performance Monitor delivers a smooth user experience
    Flowmon DDoS Defender: Detects DDoS and other volumetric attacks
    Flowmon Traffic Recorder: Saves complete network traffic data
    Appliances – Cloud / Virtual / HW
    Flowmon Probe: Generates data about network traffic
    Flowmon Collector: Provides highly scalable data storage and analysis
     

    https://tw.linkedin.com/company/fortinet

    FORTINET

    Fortinet NSS Labs Recommended for SD-WANFortiGate next-generation firewalls (NGFWs) utilize purpose-built security processors and threat intelligence security services from AI-powered FortiGuard labs to deliver top-rated protection, high performance inspection of clear-texted and encrypted traffic. Next-generation firewalls reduce cost and complexity with full visibility into applications, users and networks and provides best of breed security. As an integral part of the Fortinet Security Fabric next-generation firewalls can communicate within Fortinet’s comprehensive security portfolio as well as third-party security solutions in a multivendor environment to share threat intelligence and improve security posture.

    https://www.fortinet.com/products/sd-wan.html

    FORTINET

    As the use of business-critical, cloud-based applications and tools continue to increase, distributed organizations with multiple remote offices are switching from performance-inhibited wide-area networks (WANs) to software-defined WAN (SD-WAN) architectures. SD-WAN offers business application steering, cost savings, and performance for Software-as-a-Service (SaaS) applications, as well as unified communication services. However, SD-WAN has its own shortcomings—especially when it comes to security with direct internet access.

    Fortinet FortiGate Secure SD-WAN includes best-of-breed next-generation firewall (NGFW) security, SD-WAN, advanced routing, and WAN optimization capabilities, delivering a security-driven networking WAN edge transformation in a unified offering. Fortinet received second consecutive NSS Labs “Recommended” rating in the SD-WAN Group Test. Fortinet Secure SD-WAN delivered lowest Total Cost of Ownership (TCO) per Mbps among all eight vendors.

    FortiGate IPS

    FORTINET

    FortiGate IPS Overview

    Whether part of a firewall solution or a separate standalone appliance, Intrusion Prevention Systems (IPS) technology is becoming an increasingly ubiquitous part of network security defenses. Fortinet, well known for its next-generation firewall (NGFW) solution, has built IPS technology for more than ten years. Fortinet customers expect and depend on high performance from FortiGate firewalls and FortiGate IPS benefits from this legacy, delivering pound-for-pound, the best IPS performance available in the market today. FortiGate IPS, following a different evolution path than traditional IPS, innovates in ways that other standalone IPS products do not.

    SWG

    FORTINET

    Secure Sockets Layer (SSL) adoption is on the rise, with  at least 60% of internet sites using it as of January 2018. While this provides confidentiality, it’s also a great place for cybercriminals to hide malware. Industry reports indicate that 41% of malicious traffic leverages encryption. In addition, administrators lose visibility of data leaving the enterprise and can’t enforce data loss policies.

    Fortinet firewalls with Gateway Security protects enterprises against web attacks with URL filtering, visibility and control of encrypted web traffic via SSL inspection, and application of granular web application policies. Fortinet is the first and only gateway security vendor to earn Virus Bulletin’s VBWeb certification for web filtering effectiveness.

    FortiSandbox

    FORTINET

    With the increasing volume and sophistication of cyber-attacks, it takes only one threat to slip through security for a data breach to occur. CISOs have adopted sandboxing as an essential component of their security strategies to help combat previously unknown threats.

    While attack surfaces are becoming more dynamic due to the rise of IoT and cloud-based services, a continuing shortage of cyber security talent is driving organizations to integrate sandboxing with greater controls and a high degree of automation.

    Fortinet management

    FORTINET

    Fortinet management and analytics provides powerful and simplified network orchestration, automation, and response for on-premises, cloud, and hybrid environments. Fortinet management and analytics technologies have been tested for more than a decade and is deployed by thousands of customers around the world across all major industry verticals.         

    As enterprise networks morph and change with digital transformation, once relied upon tools have become outdated and obsolete. Yet, many are still deployed alongside newer technology stacks, creating a complex environment that does not interoperate. Enterprises deploy an average of 75 different vendor solutions that lack shared threat intelligence—a cybersecurity hurdle that is often compounded with a lack of skilled cybersecurity personnel to manage these networks.

    Simplified network orchestration, automation, and response helps consolidate complex point products, and is compatible with Fortinet solutions and all Security Fabric-ready partners.

    Multi-Cloud Security

    FORTINET

    Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises own the security for everything that is built, deployed, or stored in the public cloud. Due to multi-cloud adoption, most enterprises maintain heterogeneous environments, with tools from each cloud platform differing significantly.

    FortiDDoS

    FORTINET

    Distributed Denial of Service (DDoS) attacks are ever-evolving and use a variety of technologies. To successfully combat these attacks, you need a dynamic, multi-layered security solution. FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.

    GigaSECURE® Security Delivery Platform

    Gigamon

    GigaSECURE® is purpose-built to reduce architectural complexity, stop tool sprawl and contain costs. Deliver relevant network data to downstream inline threat prevention tools at the rate they can consume.

    GigaVUE Visibility Appliances

    Gigamon

    GigaVUE® Visibility Appliances deliver consistent insight into data that travels across your network, including data centers and remote sites. With the Gigamon solution, you will have the coverage and control you need to safeguard critical network and business assets.

    GigaVUE-HC3

    Gigamon

    The GigaVUE-HC3 visibility node offers up to 25Tbps of traffic intelligence processing across 32 clustered nodes. The GigaVUE-HC3 enables global 2000 enterprises, government agencies and service providers to gain deeper insight into network traffic, minimize traffic overload and provide more effective options to deploy both inline and out-of-band security tools.

    Flowmon Probe

    JNSUN

    Flowmon Monitoring Center: Analyzes and visualizes NetFlow statistics
    Flowmon ADS: The Anomaly Detection System protects against unknown threats
    Flowmon APM: The Application Performance Monitor delivers a smooth user experience
    Flowmon DDoS Defender: Detects DDoS and other volumetric attacks
    Flowmon Traffic Recorder: Saves complete network traffic data
    Appliances – Cloud / Virtual / HW
    Flowmon Probe: Generates data about network traffic
    Flowmon Collector: Provides highly scalable data storage and analysis

    Flowmon Collector

    JNSUN

    Flowmon Monitoring Center: Analyzes and visualizes NetFlow statistics
    Flowmon ADS: The Anomaly Detection System protects against unknown threats
    Flowmon APM: The Application Performance Monitor delivers a smooth user experience
    Flowmon DDoS Defender: Detects DDoS and other volumetric attacks
    Flowmon Traffic Recorder: Saves complete network traffic data
    Appliances – Cloud / Virtual / HW
    Flowmon Probe: Generates data about network traffic
    Flowmon Collector: Provides highly scalable data storage and analysis

    ObserveIT

    JSLead

    ObserveIT- Insider Threats Management Solution

     

    LogRhythm

    JSLead

    LogRhythm - NextGen SIEM Platform

     

    Thycotic

    JSLead

    Thycotic - Privileged Access Management Solution

     

    SQream

    JSLead

    SQream - The GPU-Accelerated Data Warehouse for Massive Data

     

    LogRhythm

    LogRhythm

    LogRhythm - The NextGen SIEM Platform - Align your team, technology, and process to see broadly across your environment, uncover threats, and minimize risk — all within a single, unified platform. It’s at the center of thousands of SOCs worldwide.  
    For more information visit: https://logrhythm.com/

    2019 Awards & Recognition
    2019 Gartner Peer Insights Customers' Choice - Gold Award
    2019 SC Media Best SIEM Solution
    2019 InfoSec Awards Market Leader for User Behavior Analytics
    2019 InfoSec Awards Market Leader for Security Information Event Management (SIEM)

    Unified Threat Prevention Platform

    Morphisec

    The Morphisec Unified Threat Prevention Platform, built on moving target defense, is architected to deterministically block advanced threats such as fileless malware, exploits, and zero-day attacks without needing to detect signatures or relying on behavioral analysis.

    NAKIVO Protects Your Business Data and Applications

    NAKIVO

    NAKIVO Backup & Replication offers an integrated approach to data protection, ensuring that your critical data and applications are safe.

    Netfos Cyber Security Solution

    NetFos Technology Corporation

    ObserveIT

    ObserveIT

    The ObserveIT platform correlates activity and data movement, empowering security teams to identify user risk, detect to insider-led data breaches, and accelerate security incident response.  Leveraging a powerful contextual intelligence engine and a library of over 400 threat templates drawn from customers and leading cybersecurity frameworks, ObserveIT delivers rapid time to value and proven capability to streamline insider threat programs.
    . Protect from Data Loss 
    . Identify User Risk
    . Accelerate Incident Response
    . Bridge Compliance Gaps
    For more information visit: https://www.observeit.com/

    2019 Awards & Recognition
    2019  Black Unicorn Awards
    2019  Best Product Insider Threat Detection
    2019  InfoSec Awards Best Product for Insider Threat Detection
    2019  Info Security Products Guide Global Excellence Awards「Gold Winner for Insider Threat Solution」

    HERCULES SecDevice

    Onward Security

    HERCULES SecDevice is a security assessment tool designed for connected products that provides automated features to save time and man power during testing. 
    Function Feature:  
    1. Automatic target identification and testing 
    2. Intelligent analysis of vulnerabilities 
    3. Fuzzing test to find unknown vulnerabilities
    4. Supports known vulnerability test cases 
    5. Detailed test result reports 
    Supporting Devices: 
    1. Embedded Devices 
    2. IoT Devices 
    3. ICS/SCADA/IED/PLC Devices 
    4. Other, support operated on Ethernet/IP Device
     

    HERCULES SecFlow

    Onward Security

    HERCULES SecFlow assists users to manage software security development life cycle (SSDLC) related tasks and provides functions such as "security development process management", "security vulnerability database" and "active product security event monitoring". During the requirements, design, development, testing, deployment and maintenance stages, HERCULES SecFlow can be used to meet the requirements of the SSDLC and further to comply with compliance standards such as ISO 27001, ISO 27034, NIST SP 800-64 and IEC 62443.
     

    OWL TECHNOLOGY

    Owl Cyber Defense

    Data diodes are hardware based, bound by the laws of physics and not susceptible to zero day vulnerabilities or any other hacks. These solutions are data and network agnostic, have been deployed across a range of industries and are recommended by the Department of Homeland Security. 
    Being data agnostic we can move files, streaming video, TCP/IP, UDP, database records, historians, sensor data, high-res images, system backups, personnel records and many other types of data; along with industrial protocols like Modbus and OPC.  And our network independence lets us work on unclassified, secret and top secret networks for government solutions and IT and OT (Operations Technology) networks for our commercial and industrial customers.

    We offer all-in-one solutions with a standard 19” 1U rackmount form factor and a DIN rail form factor for industrial environments.  We also offer server based solutions that utilize off-the-shelf servers populated with our data diode cards.

    Designed to be scalable, new software licenses and modules allow end-users to increase bandwidth, add-on new interfaces, and support new protocols.

    Thales SafeNet Luna7 Network HSM

    Paysecure Technology

    Secure your sensitive data and critical applications by storing, protecting and managing your cryptographic keys in SafeNet Luna Network Hardware Security Modules (HSMs) - high-assurance, tamper-resistant, network-attached appliances offering market-leading performance.

    Easily integrate these network-attached HSMs into a wide range of applications to accelerate cryptographic operations, secure the crypto key lifecycle, and act as a root of trust for your entire crypto infrastructure.

  • Type:Encryption
  • PA File Sight

    PowerAdmin

    Ransomware Protection

    PA File Sight can detect and protect against ransomware attacks caused by infected client computers that encrypt server files.

    Detection happens via simple detection methods used by other products, as well as more advanced options. Once a ransomware attack is detected, the server is protected and information is shared with other servers so they are protected as well.


    Information Leaks - File Copy Detection, Data Loss Prevention (DLP)

    PA File Sight can see what files clients are interacting with on the server, and can alert when a client is reading an unusually large number of files.

    If the File Sight Endpoint is installed on the client, external (USB) drives can be blocked, and file copying can be detected more accurately which helps in Data Loss Prevention (DLP) efforts.

    OWL TECHNOLOGY

    Simpro Technology Inc

    Data diodes are hardware based, bound by the laws of physics and not susceptible to zero day vulnerabilities or any other hacks. These solutions are data and network agnostic, have been deployed across a range of industries and are recommended by the Department of Homeland Security. 
    Being data agnostic we can move files, streaming video, TCP/IP, UDP, database records, historians, sensor data, high-res images, system backups, personnel records and many other types of data; along with industrial protocols like Modbus and OPC.  And our network independence lets us work on unclassified, secret and top secret networks for government solutions and IT and OT (Operations Technology) networks for our commercial and industrial customers.

    We offer all-in-one solutions with a standard 19” 1U rackmount form factor and a DIN rail form factor for industrial environments.  We also offer server based solutions that utilize off-the-shelf servers populated with our data diode cards.

    Designed to be scalable, new software licenses and modules allow end-users to increase bandwidth, add-on new interfaces, and support new protocols.

    PRIVILEGED ACCESS MANAGEMENT.

    Simpro Technology Inc

    When you need to know and control everything within your organization. When you need to intervene at a moment’s notice- that’s when Fudo PAM’s proactive monitoring gives you the power to detect and terminate any suspicious activity.

    ReaQta

    Simpro Technology Inc

    ReaQta was founded by an elite team of offensive and defensive cyber security experts as well as machine learning researchers. Combining these varied expertise, our team has built a powerful Active Defense Intelligence Platform. Our solution provide clients with advanced detection and response capabilities, without requiring additional or highly skilled personnel. This innovative approach applies the latest A.I. algorithms to automate and simplify the process of detecting and handling new threats.

    On this single, highly integrated active intelligence platform, our clients gain flexibility and speed in performing complex analyses that were only possible with large and highly specialized teams. It is a dynamic approach that doesn’t just protect organisations in the here and now, but also far into the future. With ReaQta, businesses are empowered to pursue growth and ambition fearlessly.

    Fidelis

    Simpro Technology Inc

    Fidelis helps you outperform, outmaneuver and outfight cyber attackers at every step to keep your business operations and data safe. Enterprises are at a disadvantage against their cyber adversaries. Threats come from every angle and many organizations lack complete visibility of their cyber terrain, allowing cyber attackers to lurk undetected as they take aim at sensitive data or look to disrupt business operations. To gain the decisive advantage, security teams need to think like their adversary. This means having greater visibility across the different layers within their environment as well as the automation to scale detection and response capabilities.

    CyberFlood Data Breach Assessment

    思博倫通信股份公司

    CyberFlood Data Breach Assessment is designed to simplify and streamline assessment of security vulnerabilities and provide users with information to harden network security policies. 

    By harnessing an emulation approach and providing continuous, accurate assessment, it enables security teams to find the holes in protections before attackers do. 

    It also provides clarity and confidence in the enterprise’s security posture, and by extracting complexity from data breach assessments it unburdens teams of very time-consuming activities so they can focus on addressing holes in the threat landscape.

    SecurityLabs

    思博倫通信股份公司

    The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization. 

    Dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis. 

    SQream

    SQream

    SQream - The GPU-Accelerated Data Warehouse for Massive Data: Redefined big data analytics with SQream DB, a complementary SQL data warehouse harnessing the power of GPU to enable fast, flexible, and cost-efficient analysis of massive datasets of terabytes to petabytes. 

    For more information visit: https://sqream.com/"

    Magic Folder

    SuperC-Touch

    Magic Folder is a fingerprint-authenticated encryption dongle for the confidential files. It is secure, easy-to-use, reliable. The fingerprint sensor module of Magic Folder, SCT-S10C, had been proved by FBI PIV. The capture area is designed to meet FAP10 specification, which can acquire a full fingerprint image at one touch.
            In addition, Magic Folder uses AES-256 chip encryption technology. Not only is it fast in encryption and decryption, but it also keeps your important data secure from hacker attacks. The security is up to national defense level. Magic Folder simplified the user-interface operations and is very intuitive. Administrators can authorize other people to enroll their fingerprints for team usage. Because the encrypted data cannot be encrypted by other Magic Folders with different gold keys, it can prevent the entire company data from theft, and it is safe to transmit encrypted data in cloud. Furthermore, Magic Folder provides the password management function.
            Magic Folder provides the comprehensive technology, helping individuals, teams, enterprises, organizations to build a more secure, reliable, cost-effective, efficient and easy-to-use information security protection net.

    Advance Penetration Test

    Talent-Jump Technologies, Inc.

    Penetration Scanning tool is a rigid tool, but the hacker is live with thousands of unpredictable minds. The way we can discover hidden vulnerabilities is relying on the white-hat hacker to perform the advanced penetration testing, so we can actually understand our risk and know how to fix them.

    APT Threat Intelligence Detection & Response.

    Talent-Jump Technologies, Inc.

    Our professional security consultant are expert on handling hacking incident, bundle with Threat Sonar APT Intelligence detection platform, we can react to APT challenge and response before the incident.

    Vulnerability Assessment

    Talent-Jump Technologies, Inc.

    There is always a security flaw that could be lead to be exploit but we never know, we could perform vulnerability assessment periodicity to find out vulnerabilities which we did not noticed, and our professional consulting service could also provide the most suitable solution for further improvement plan.

    CyberFlood Data Breach Assessment

    Terilogy Taiwan

    CyberFlood Data Breach Assessment is designed to simplify and streamline assessment of security vulnerabilities and provide users with information to harden network security policies. 

    By harnessing an emulation approach and providing continuous, accurate assessment, it enables security teams to find the holes in protections before attackers do. 

    It also provides clarity and confidence in the enterprise’s security posture, and by extracting complexity from data breach assessments it unburdens teams of very time-consuming activities so they can focus on addressing holes in the threat landscape.

    Security Labs

    Terilogy Taiwan

    The Spirent SecurityLabs’ services are structured to produce high-impact results with minimal impact on the client organization.

    Dedicated teams of experienced security professionals offer comprehensive scanning, penetration testing and monitoring services for networks, applications and devices, as well as source code analysis.

    Allot

    Terilogy Taiwan

    Allot states “See, Control, Secure” as its value proposition. 

    Not only provide full visibility on network utilization, application and user behavior, it can also align network performance to business priorities, increase productivity, reduce the attack surface and protect your operations and users against Ransomware, Denial of Service attacks, Bot infection and other web threats.

    momentum

    Terilogy Taiwan

    momentum is like a traffic recorder for the data flow, it can record all of the packets that pass through it. Strengths of momentum are monitoring and security. 

    The current mechanism of it is to collect the traffic data first, and by installing our exclusive Apps, the data can be analyzed, finally made into report, etc. 

    It can be interact with other cyber security products from other brands, and response to customers in real time.

    Thales SafeNet Luna7 Network HSM

    Thales

    Secure your sensitive data and critical applications by storing, protecting and managing your cryptographic keys in SafeNet Luna Network Hardware Security Modules (HSMs) - high-assurance, tamper-resistant, network-attached appliances offering market-leading performance.

    Easily integrate these network-attached HSMs into a wide range of applications to accelerate cryptographic operations, secure the crypto key lifecycle, and act as a root of trust for your entire crypto infrastructure.

  • Type:Encryption
  • Tufin Orchestration Suite (TOS)

    Tufin

    Tufin Orchestration Suite (TOS) provides end-to-end visibility and control of an enterprise’s network security, spanning the data center to the hybrid cloud. Tufin Orchestration Suite includes three products – SecureTrack, SecureChange, and SecureApp. 
    Tufin reduces the enterprise’s attack surface and minimizes disruptions to critical applications. Our solution uses policy to automatically analyze risk, and design, provision, and audit network security changes. 
    Using network security automation, our customers are able to implement security changes in minutes instead of days with continuous compliance and increased agility. 
    Tufin Orchestration Suite provides multi-vendor device support for leading enterprise networks, including finance, telecom, energy and utilities, healthcare, retail, education, government, manufacturing, transportation and auditing. 
    We partner with leading technology vendors such as Amazon Web Services, Check Point Software, Cisco, Fortinet, Microsoft Azure, Palo Alto Networks, VMware, and more.

    AgileLink-Wan load balance

    UGuard

    UGuard AgileLink family of appliance and virtual devices delivers failover and load balancing across multiple WAN connec- tions , help to ensure greater reliability , bandwidth and redundancy network services for the enterprise , improved applica- tion performance , raising traffic visibility and reduce complexity of WANs cost.
    By leveraging multiple connections(T1, xDSL, Cable, 3G/4G etc.), AgileLink provides highest reliable Internet access and remain VoIP quality. Furthermore, allows traffic across multiple Internet or service provider networks for redundant link connectivity, real-time failover. This enables customers to shift to a broadband WAN whether site-by-site, or via a hybrid WAN approach that leverage MPLS and broadband Internet connectivity.

    UAC-Unified Access Controller

    UGuard

    Powered by our custom DPI engine and I.D. centric design, the Unified Access Controller - "UAC" provides a comprehensive Layer 7 trace management mechanism that allows IT administrators to effectively manage, monitor and secure their network resources. Whether it is for individual, department or company wide access to internet services, UAC can precisely enforce network policies compliance and control while provides  extensive monitoring reports for daily operations.
    No matter by using wireless or wired network got access of internet connection, and what type of device (Laptop, PAD, Smart Phone, etc), UAC would guiding people through its diversely authentication rules to making proper control and keep such access log for further auditing purpose. Even though one person has couple devices keeping online with traces, UAC can bonding to one single account, thus , to fully control impossible becomes possible and achievable.

    GREYCORTEX MENDEL

    V2

    A Network Traffic Analysis tool helps enterprise, government, and critical infrastructure users make their IT operations secure and reliable through advanced artificial intelligence, machine learning, and big data analysis.
    #Provides round-the-clock security monitoring
    #Gives you powerful rapid detection & response capabilities
    #Take advantage of the solution’s powerful detection capabilities
    #Let’s you gain a deep visibility into the internal network
    #Powerful and easy to use
     

    ESET ENTERPRISE INSPECTOR

    V2

    An Endpoint Detection & Response tool designed to exploit ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real time endpoint data. The result is complete prevention, detection and response solutions for quick analysis and remediation of any security issue in the network enabling organizations to take immediate action to:Detect advanced persistent threats/Stop file less attacks/Block zero-day threats/Protect against ransomware/Neutralize state-sponsored attacks

    ESET THREAT INTELLIGENCE SERVICE

    V2

    Get in-depth, up-to-date global knowledge about specific threats and attack sources, traditionally difficult to detect for security engineers, who access information only within their own networks. Enable your organization to:Block targeted attacks/Protect against phishing/Stop botnet attacks/Detect advanced persistent threats

    ESET DYNAMIC THREAT DEFENSE

    V2

    Provides another layer of security for ESET products like Mail Security and Endpoint products by utilizing a cloud-based sandboxing technology to detect new, never before seen type of threats. Future proof your company IT security with:Behavior-based Detection/Machine Learning/Zero-day Threats Detection/Cloud Sandbox

    ESET ENDPOINT SECURITY

    V2

    Leverages a multilayered approach that utilizes multiple technologies in dynamic equilibrium to constantly balance performance, detection and false positives enabling organizations to:Protect against ransomware/Block targeted attacks/Prevent data breaches/Stop file-less attacks/Detect advanced persistent threats

    ESET FILE SECURITY

    V2

    Provides advanced protection for your company’s data passing through all general servers, network file storage including OneDrive, and multi-purpose servers to ensure business continuity via:Ransomware prevention/Zero-day threats detection/Data breaches prevention/Botnet protection

    ESET MAIL SECURITY

    V2

    Provides an additional layer of security to organizations who are interested in stopping threats from ever reaching their users – multilayered security of the host itself with:Anti-malware/Anti-spam/Anti-phishing/Optional Cloud Sandbox analysis

    ESET GATEWAY SECURITY

    V2

    #Low System Demands. Leaves more system resources free while still delivering complete protection
    #Remote Management. Fully manageable via ESET Remote Administrator 6
    #Employs ESET's award-winning LiveGrid® scanning engine
     

    ESET SECURITY MANAGEMENT CENTER (V7)

    V2

    Provides real-time visibility for on-premise and off-premise endpoints as well as full reporting for ESET enterprise-grade solutions from a single pane of glass securely deployed on premise or in cloud

    ESET ENDPOINT ENCRYPTION

    V2

    A simple to use encryption application providing full remote control of endpoint encryption keys and security policy for files on hard drives, portable devices and emails. Ensures:Zero data breaches/Compliance with requirements/Seamless encryption

  • Type:Encryption
  • ESET SECURE AUTHENTICATION

    V2

    A simple, effective way for businesses of all sizes to implement multi-factor authentication across commonly utilized systems. Enables your organization to:Prevent data breaches/Meet compliance requirement/Easily manage authenticati/Secure mobile devices

    ESET VIRTUALIZED SOLUTIONS _ESET SHARED LOCAL CACHE (AGENT-BASED)

    V2

    With ESET Shared Local Cache and the protection of an ESET security product, one of which must be present on each virtual machine, you get the same full set of tools and security features that you would have in a physical environment, plus significantly boosted scanning speed.

    ESET VIRTUALIZED SOLUTIONS _FOR VMware ESET VIRTUALIZATION SECURITY FOR VMware

    V2

    By leveraging VMware agentless technology, protecting compatible hypervisors is as simple as using ESET Virtualization Security Appliance. The solution is natively compatible with ESET Remote Administrator 6, ESET’s web-based console for rapid task execution and complete endpoint security management.

    MOBILE DEVICE SECURITY_ESET ENDPOINT SECURITY FOR ANDROID

    V2

    Leverages a multilayered approach to provide complete protection and secure device management of your Android mobile devices. Enables:Protection against ransomware/Data loss prevention/Application control/Remote management

    MOBILE DEVICE SECURITY_ESET MOBILE DEVICE MANAGEMENT FOR APPLE iOS

    V2

    Set-up, configure and monitor all company iOS devices from a single pane of glass. Enables:Anti-theft/Web content filtering/Applications white/black listing/Device security

    NAKIVO Protects Your Business Data and Applications

    VBUSTER Technology

    NAKIVO Backup & Replication offers an integrated approach to data protection, ensuring that your critical data and applications are safe.

    PA File Sight

    VBUSTER Technology

    Ransomware Protection

    PA File Sight can detect and protect against ransomware attacks caused by infected client computers that encrypt server files.

    Detection happens via simple detection methods used by other products, as well as more advanced options. Once a ransomware attack is detected, the server is protected and information is shared with other servers so they are protected as well.


    Information Leaks - File Copy Detection, Data Loss Prevention (DLP)

    PA File Sight can see what files clients are interacting with on the server, and can alert when a client is reading an unusually large number of files.

    If the File Sight Endpoint is installed on the client, external (USB) drives can be blocked, and file copying can be detected more accurately which helps in Data Loss Prevention (DLP) efforts.

    Votiro

    Votiro

    ■  Disarmer for EMAIL
    1. Function
    (1) Supports all mail system 
    (2) Retains complete email content and attachment
    (3) Easy to deploy and integrate with email server
    2. Context of Use
    (1) Prevent Email extortion scams 
    (2) Ensure the URL Link in the email and attachement is safe

    ■ Disarmer For WEB
    1. Function
    (1) Provides security for browser downloads
    (2) Prevent weaponized files to be loaded to endpoint
    2. Context of Use
    (1) Security protection on "save as" in web browser

    ■ Disarmer For File Transfer
    1. Function
    (1) Integrats with current file server
    (2) Supprts internet isolation  structure
    (3) Achieve seamless file transfer
    2. Context of Use
    (1) Security on file transfer between internet and intranet
    (2) High security files/ Quarantined files

    ■ Disarmer For Removable Device
    1. Function
    (1) Security protection on importing files from portable media devices
    (2) User-friendly interface 
    (3) Can be established according to unit protection policy
    2. Context of Use
    (1) Safety control on imported files
    (2) Record on exported files

    ■ Disarmer API
    1. Function
    (1) Integrates with existing programs
    (2) Safe REST API 
    (3) Supports complexed file quarantine and exchange structure
    2. Context of Use
    (1) Security protection on program file exchange (For example, submit for publication, quiz contest, public opinion mailbox, questionnaire, project plan documents)

    PRIVILEGED ACCESS MANAGEMENT.

    Wheel Systems

    When you need to know and control everything within your organization. When you need to intervene at a moment’s notice- that’s when Fudo PAM’s proactive monitoring gives you the power to detect and terminate any suspicious activity.

    KVHSM

    WISECURE

    KeyVault Hardware Security Module (KVHSM) is a physical device in the PCIe form that stores and manages cryptographic keys. KVHSM provides a robust environment for cryptographic operations. It is designed in reaction to compromising, physical intrusion, tampering, etc. The military-grade secure element, with CC EAL 5+ certification, mitigates risks of key leakage and dismisses the threat posed by side channel attack (SCA). Applications include high-speed cloud encryption and cryptographic functions such as digital signature, hash function, identification, and key management.

    ▲Cryptocurrency Exchange Key Management 
    KVHSM provides a highly customizable platform, leaving room for flexible application design. It manages the entire life cycle of private keys, including generation, distribution, storage, destruction and archiving, and the core engine executes encryption, decryption, signing, verification and hashing for cryptocurrency transactions. It also strikes a commensurate balance between security and performance. Furthermore, KVHSM can detect physical intrusion and activate countermeasures in response; side-channel attack, reverse engineering, tampering are within the scope of data protection.

    ▲Authentication Server (IoT Ecosystem) & Cloud Crypto Service
    Internet of Things (IoT) ecosystem comprises a data center (public or private cloud), gateways (intermediary communication gateways), and endpoint devices (distributed IoT devices). For the data center, it receives collected data communicated by gateways, in the path of which lies two conspicuous risks, eavesdropping and tampering. In this regard, data encryption prior to communication and authentication are integral to secure and sustainable operation. KVHSM can be embedded onto the cloud for data protection, identification, blockchain, digital signature for authorized devices, management of firmware update and master key lifecycle.

    ▲Bring Your Own Key (BYOK)
    While cloud service features many advantages, a major disadvantage has been security, because encrypted data and keys are physically stored and managed by cloud service providers (CSP) and out of the control of the owners. 
    Bring Your Own Key (BYOK) is a way for enterprises to retain control and management of their encryption keys. Storing strong keys in KVHSM and establishing secure channels allow enterprises to utilize cloud service without concerns and control important digital assets

    μSD/X

    WISECURE

    μSD/X is a hardware security module coming in the form of a microSD card. It provides security services driven by hardware-based crypto engines, including encryption, key generation and life cycle management, digital signature, authentication and other crypto functions. It is used in secure authentication, sensitive data encryption, secure communication and secure mobile payment.

    ▲Network authentication 
    The mechanism built for μSD/X can be used for firmware OTA (over-the-air) upgrade, parameter update, device management and other applications. It provides end devices with cryptographic services, featuring public key certificates or private key verification to mitigate risks of counterfeit or hijacking.

    ▲Data storage encryption 
    μSD/X enables flexible space usage, allowing users to set open areas and encrypted areas. Only when authentication succeeds are data inside encrypted areas accessible. Customizable hardware cryptographic engines are adopted for disk encryption, ensuring optimal encryption service. Some competitive products are vulnerable to cyberattack due to software-based security design. Still some are equipped with hardware-based security design but deficient in performance, failing to satisfy the need for smooth data operation. μSD/X resolves the dilemma by accelerating storage encryption based on hardware-based security, intensely protecting users’ digital assets without compromising performance.

    ▲End-to-end secure communication 
    μSD/X's feasibility enables high-speed data encryption. Its protocol can also be tailored for private messengers such as Telegram and Signal in order to meet users’ communicative security requirements. In software-based secure communication exist risks and vulnerabilities while the hardware-based one built inside μSD/X strengthens the client side’s resistance to spoofing or tampering attacks. To make the solution more user-friendly and accessible, software development kits (SDK) are available for Telegram and other applications. Onto every platform and device can it be deployed with easy adjustment, saving considerable time and operation cost.

    ▲Cryptocurrencies’ private key protection 
    μSD/X protects cryptocurrencies’ private keys and operates digital signature for transaction. Inserted into a mobile device, μSD/X makes it function as a cold wallet, enabling users to transact without physical tokens in the form of cards or USB. As to security level, it is equipped with a CC EAL 5+ certified secure element, effectively resisting side-channel attack and reverse engineering.

    XCome EMM (Enterprise Mobility Management) solution - SkyMDM

    XCome Technology

    XCome EMM(Enterprise Mobile Management)solution - SkyMDM, includes the following main functions:
    Mobile device basic function management and control:

    • Device function management: Camera, microphone, screen capture restriction...
    • Date and time restriction: Date and time setting restriction.
    • Password policy: Rules and strength of password setting.
    • Certificate Management Policy: Upload, install, and manage digital certificates as a basis for authorizing network or service access.
    • Security management: Device white/black list, remote execute factory reset, remote lock...

    Wi-fi and Networks management:

    • Mobile network management: Mobile network, outgoing call, SMS, data roaming restriction...
    • Wi-Fi restriction and management: Wi-Fi config, Wi-Fi state(always on/off) restriction.
    • Tethering restriction.
    • APN setting and management.
    • Chrome browser setting: website white/black list, proxy setting...

    File transfer and storage management:

    • Bluetooth state(on/off), Bluetooth share restriction.
    • USB file transfer, physical media restriction.
    • Out-going beam restriction.

    Location service and tracking

    • Location share restriction.
    • Location tracking.
    • Location map, Latitude and longitude.

    Kiosk mode setting

    • Setting Kiosk mode.
    • Kiosk mode app setting.

    Application Management:

    • APP store management: APP list, APP upload, APP delete…
    • APP white list.
    • APP runtime permission setting.
    • Remote Silent install, remote un-install.
    • APP install, APP un-install restriction.

    FOTA Management(Requires customized mobile device)

    • Device Firmware update management.
    • Group of devices firmware upgrade.
    • Device Firmware upgrade status statistics and report.

    Advanced Management

    • Dashboard: SkyMDM dashboard can clearly show the current status, compliance status, policy delivery status, etc. of the mobile device.
    • Report and Log management: Provide system and device status report and log. Clearly understand the effectiveness of mobile device configuration and follow-up review.

    Xena

    Xena Networks

    Xena SAFIRE

    Enterprise Firewall Performance Tester

    Enterprise firewalls improve network security by segmenting corporate LANs. However, each of the advanced security functions (e.g. antivirus, app-control, IPS and SSL decryption) has a performance penalty. Combined, these features can seriously reduce network performance (in some instance up to 90%) – frustrating users and reducing business performance.

    Safire is the only solution on the market that solves this problem quickly and cost-effectively.

    TECHNOLOGIES:  Network Security

    USED BY:
    Enterprise IT
    Network Security
    System Integrators
    Data Centers
    Finance
    Government
    Defense